BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

The SHAMOON Virus is Back and it is Preventable

January 26, 2017

  • Blog
  • Archive
Shamooon is back If enterprise security is so important, why aren’t more companies doing it better? Every day we read articles about a hack or breach that, in many cases, could have been mitigated with simple best practices. It’s time to stop worrying about how much work it will take to secure the enterprise and more about what happens when you don’t.

Shamoon is back!...

Case in point. As reported in a recent U.S.News article, the Shamoon Virus (aka W32.DistTrack), first discovered by Seculert in 2012, made its return. The virus is highly destructive to infected systems and can easily transfer over networked devices. It has one purpose – cyber espionage – something every company in the world understands the impact of. It is also preventable.

… and preventable

Because Shamoon requires the use of an administrative account to infect a system, implementing least privilege, part of privileged access management, negates its ability to gain a foothold. This is a core competency of BeyondTrust. Our PowerBroker for Windows, Unix/Linux and Mac solutions assist with the operational roadblocks enterprises hit when removing admin rights from users. Attackers have also been known to steal admin credentials to use with Shamoon. Understanding which users have access to these credentials and under what conditions is a fundamental component in preventing this, and other breach attacks. PowerBroker Password Safe addresses this need by controlling access to accounts and systems within your network, and identifying misuse. To prevent the effects of Shamoon and Shamoon-like attacks, consider a step-wise deployment of privileged access management solutions, targeting your most at-risk accounts and users first. Download our free privileged account discovery tool and start scanning for at-risk accounts. Then, check out our guide to help you get started on your privileged access management path. If going to the Shamoon isn’t in your travel plans, contact us today.
Photograph of Jason Silva

Jason Silva, Sr. Solutions Engineer, BeyondTrust

Jason Silva brings over 25 years of solutions and management experience to the industry. Currently serving as Senior Solutions Engineer for BeyondTrusts' Universal Privilege Management Platform, he uses this knowledge to help customers realize the value of our solutions throughout the product lifecycle. Earlier in his career, he found success as a software developer in a global consulting company and spent over four years managing IT and Regulatory Compliance in the banking industry.

Specialties: Microsoft Active Directory, Microsoft Group Policy, Pre and Post Sales Training, Sales Engineering, Enterprise Security Tools, Privileged Access Management

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Capabilities to NIST SP 800-207

Whitepapers

Mapping BeyondTrust Solutions to the Identity, Credential, and Access Management (ICAM) Architecture

Whitepapers

Four Key Ways Governments Can Prepare for the Growing Ransomware Threat

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.