{
	"id": "74d79436-5e44-49c8-978b-8116974fc7de",
	"created_at": "2026-04-13T02:22:30.430999Z",
	"updated_at": "2026-04-13T02:23:13.775296Z",
	"deleted_at": null,
	"sha1_hash": "84f0d576ea1aab5fefa9ff99d11ae997c2a9be1f",
	"title": "Cyber Operations Tracker",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 34918,
	"plain_text": "Cyber Operations Tracker\r\nArchived: 2026-04-13 02:00:34 UTC\r\nCyber Operations Home\r\nShamoon 2.0\r\nDate of report\r\nDec 2016\r\nAffiliations\r\nChrysene\r\nA threat actor used malware known as Shamoon 2.0 to exfiltrate and delete data from computers in the Saudi\r\ntransportation sector.\r\nSuspected victims\r\nGeneral Authority of Civil Aviation of Saudi Arabia\r\nType of incident\r\nData destruction\r\nTarget category\r\nGovernment\r\nVictim government reaction\r\nUnknown\r\nRead more\r\nhttps://www.cfr.org/cyber-operations/shamoon\r\nPage 1 of 4\n\nDestructive Hacks Strike Saudi Arabia, Posing Challenge to Trump\r\nhttps://www.cfr.org/cyber-operations/shamoon\r\nPage 2 of 4\n\nFireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region\r\nhttps://www.cfr.org/cyber-operations/shamoon\r\nPage 3 of 4\n\nFrom Shamoon to StoneDrill\r\nSource: https://www.cfr.org/cyber-operations/shamoon\r\nhttps://www.cfr.org/cyber-operations/shamoon\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MISPGALAXY"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.cfr.org/cyber-operations/shamoon"
	],
	"report_names": [
		"shamoon"
	],
	"threat_actors": [],
	"ts_created_at": 1776046950,
	"ts_updated_at": 1776046993,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/84f0d576ea1aab5fefa9ff99d11ae997c2a9be1f.pdf",
		"text": "https://archive.orkl.eu/84f0d576ea1aab5fefa9ff99d11ae997c2a9be1f.txt",
		"img": "https://archive.orkl.eu/84f0d576ea1aab5fefa9ff99d11ae997c2a9be1f.jpg"
	}
}