Shamoon 2 Used Rudimentary Method for Network Distribution
Palo Alto Networks researchers have continued to analyze the Shamoon 2 attacks and determined that the method used by the malware to spread on the targeted organizations’ networks is rudimentary, but efficient.
Read more: Shamoon 2 Used Rudimentary Method for Network Distribution
Story added 28. March 2017, content source with full text you can find at link above.