A new Trojan horse tries to covers its tracks by crippling the victim's computer after stealing data, a security researcher said today.
Dubbed "Shamoon" by most antivirus companies, the malware has been used in targeted attacks aimed at specific individuals or firms, including at least one in the energy sector.
According to Israeli security company Seculert, Shamoon relies on a one-two punch, first taking control of a system connected to the Internet before spreading to other PCs on an organization's network.
The second stage -- which kicks off after the malware has done its dirty work -- overwrites files and the Master Boot Record (MBR) of the machine. The latter makes the PC unbootable.
"They are looking for ways to cover their tracks," said Aviv Raff, CTO and co-founder of Seculert, in a Friday interview.
Seculert and other security companies, including Moscow-based Kaspersky Lab and U.S. antivirus vendor Symantec, have not yet figured out kind of data Shamoon is looking for, then stealing. They assume that because the malware uses a second infected system to communicate with a hacker-controlled command-and-control (C&C) server, Shamoon is copying files from pillaged PCs and sending that information to its masters.
Malware rarely destroys files or wipes the MBR. Most threats try to work quietly to avoid detection as long as possible. Crippling a computer only brings unwanted attention.
"Threats with such destructive payloads are unusual and are not typical of targeted attacks," said Symantec on a Thursday post to its security response team's blog.
Because a list of overwritten files is transmitted to the C&C server, Raff speculated that Shamoon's makers wanted to "know what and how much got wiped."
The destructiveness of Shamoon -- its distinguishing trait, really -- brought up memories of an attack against Iranian computers earlier this year that also wiped hard drives.
Investigations into that malware by Kaspersky led it to uncover Flame, the sophisticated cyber-spying tool that most have linked to Stuxnet, the worm discovered in 2010 that sabotaged Iran's nuclear program.
Kaspersky was convinced that there was no connection between Shamoon and the data-wiping malware that hit Iran last April, and cited several differences between the two.
"It is more likely that [Shamoon] is a copycat, the work of a script kiddies inspired by the [earlier] story," said a Kaspersky researcher yesterday on the company's blog.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed. His email address is email@example.com.
Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.