Credential Theft: The Keystone of The Shamoon 2 Attacks

Since late November 2016, the Shamoon 2 attack campaign has brought three waves of destructive attacks to organizations within Saudi Arabia. Our investigation into these attacks has unearthed more details into the method by which the threat actors delivered the Disttrack payload. We have found evidence that the actors use a combination of legitimate tools and batch scripts to deploy the Disttrack payload to hostnames known to the attackers to exist in the targeted network.


 

VM-Series Specsheet

The VM-Series has been optimized and expanded to deliver industry-leading performance of up to 16Gbps of App-ID-enabled firewall throughput across five models.
  • 5
  • 51880

VM-Series on VMware

Key features, performance capacities and specifications of VM-Series for VMWare.
  • 4
  • 23184

AWS Reference Architecture

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud.
  • 4
  • 5635

Azure Reference Architecture

This document provides architectural guidance for solution architects and engineers who are familiar with the next-generation firewall but not Azure.
  • 2
  • 4801

Palo Alto Networks Logging Service

Download the Logging Service datasheet to learn the features and benefits of scalable log storage delivered from the cloud. Find out how Logging Service can simplify log management and power an ecosystem of innovative Application Framework apps.
  • 2
  • 3556

VM-Series on VMware NSX

Key features, performance capacities and specifications of VM-Series on VMware® NSX.
  • 3
  • 3994