Shamoon 2 Used Rudimentary Method for Network Distribution

Palo Alto Networks researchers have continued to analyze the Shamoon 2 attacks and determined that the method used by the malware to spread on the targeted organizations' networks is rudimentary, but efficient.

read more

Article Link: http://feedproxy.google.com/~r/Securityweek/~3/joXhO0g49n4/shamoon-2-used-rudimentary-method-network-distribution