Shamoon 2 Used Rudimentary Method for Network Distribution

Palo Alto Networks researchers have continued to analyze the Shamoon 2 attacks and determined that the method used by the malware to spread on the targeted organizations’ networks is rudimentary, but efficient.

read more

Read more: Shamoon 2 Used Rudimentary Method for Network Distribution

Story added 28. March 2017, content source with full text you can find at link above.