http://feedproxy.google.com/~r/Securityweek/~3/joXhO0g49n4/shamoon-2-used-rudimentary-method-network-distribution