• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity  /  How one computer ended up corrupting an entire company
How one computer ended up corrupting an entire company
08 June 2017

How one computer ended up corrupting an entire company

Written by Seqrite
Seqrite
Cybersecurity

2012 witnessed one of its kind cyber-attack where a single infected computer led to a massive wipe out of data from 35000 computers. It all happened at Saudi Aramco, a leading petroleum and natural gas company. Let’s look in detail of what happened.

It was August 15th, 2012, when suddenly the computers at Saudi Aramco started behaving weird. Files started disappearing and many computers just shut down on their own. Within a matter of hours, the virus, later known as Shamoon or Disttrack, had spread across the organization impacting almost 35000 machines most of which underwent either partial or total irreparable damage. Shamoon is a self-replicating virus that deletes data from a computer’s hard drive making it unusable.  Such widespread was the impact of the virus that Aramco technicians had to physically remove cables from all servers and unplug the entire system from the Internet.

In a couple of hours, they were cut off from the rest of the world and it impacted their business in such a manner that the company had to go back to three-decade-old technology of using typewriters and faxes. They had to temporarily stop selling oil in domestic market and later give it out for free. Further, they had to spend a huge amount of money to procure almost 50000 new hard drives to get back to their business. While the drilling and pumping worked fine, most other operations were crippled. A group called “Cutting Sword of Justice” claimed responsibility of the attack and it is believed that they were never caught or identified. It took them almost two weeks to restore their services and about five months to get back a secure network and a larger cyber security team to protect them in future.

And do you know how it all happened?

Because one computer technician, opened a wrong email and clicked a wrong link! That is all it took for attackers to get into the system and cause massive destruction to the entire company’s system in no time. Well, that was Aramco’s story. Experts say that had it been any smaller firm, it would have become bankrupt with this type of an attack.

None of the organizations in today’s world are safe from cyber-attacks. In fact, the rate at which cyber attacks occur and the complexity of such attacks are only increasing by the day. It is thus important for organizations whether small, medium or large, to make sure their systems and networks always stay protected against such threats with the help of latest technology in the market. Organizations are vulnerable to cyber-threats and if a robust cyber security strategy backed up by equally strong tools is not in place, you are at a very high risk that can be not just damaging but devastating for your business.  So, a simple word of caution, don’t cut corners in ensuring cyber-security for your organization. You never know where the next attack is coming from.

Seqrite, the enterprise arm of Quick Heal, was formed specially to provide sturdy solutions to SMEs and larger enterprises. Our products simplify the security needs of companies with Endpoint Security, Server Security and Gateway Security solutions. Seqrite products can secure your desktop, laptop and all handheld devices. Our security solutions include the best of antivirus, firewall and web-filters clubbed together in a power packed solution. Additionally, Seqrite offers services like Real-time monitoring, SOC Operations, Technical Audit, Compliance Audit, Security Management and Consulting, Investigation and Forensics.

Connect with us today, to see how we can help your organization stay safe!

Experience the best-in-class solutions offered by Seqrite

seqrite_cta1

 Previous PostDealing with Evolving Cyber Attacks
Next Post  Cyber Security – Do Manufacturing Firms Need to Bother?
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies