Vulnerabilities / Threats
04:55 PM
Connect Directly

Successful Attacks On Oil And Gas Companies Increasing, Survey Shows

What remains unclear is how many of them actually impact critical industrial control systems

The rate of cyberattacks and the number of successful attacks against organizations in the oil and gas industries are both continuing to increase, even as the ability to detect and respond to them is dropping, a new survey sponsored by Tripwire shows.

The security vendor commissioned Dimensional Research to survey IT professionals in the energy, utilities and gas industries and the results are based on responses from the over 150 professionals who participated in the study.

Eighty-two percent of the survey respondents said the number of successful attacks against their organizations had increased in the last 12 months. About 53 percent said the rate of cyberattacks, or attacks that were attempted but failed, increased between 50 percent and 100 percent during the same period.

At the same time, nearly seven in 10 of the respondents also expressed a lack of confidence in the ability of their organization to detect and stop such attacks.

The survey does not specify the attack types so no breakdown is available on how many of the successful attacks involved data theft, malware infections, distributed denial-of-service attacks, insider theft or sabotage.

The survey also leaves unclear how consequential the attacks were for the impacted organizations. Though reports about increasing attacks against organizations in the critical infrastructure sector often evoke wide concern, not all attacks are the same. A successful cyberattack on an industrial control system controlling critical equipment at an oil and gas company, for instance, would have far more damaging consequences than an attack on a front-end business server.

Even so, the numbers in the Tripwire report are significant. Unlike in the past, many industrial control systems these days are connected to the Internet and are therefore accessible externally. So a successful attack on a corporate network could potentially give attackers a way to also access the backend systems controlling critical equipment and infrastructure.

“One is a path to the other,” says Tim Erlin, director of IT security and risk strategy for Tripwire. “We know critical systems are connected to the Internet. So, in many cases, an initial attack may be a precursor to an attack on a more critical industrial control system,” he said.

According to Erlin, the survey results offer a couple of key takeaways. The increase in attacks against companies in the oil and gas sector shows that the threat environment has gotten a lot more dangerous while the increase in successful attacks shows that organizational ability to stop them is not keeping pace.

Companies in the oil and gas sector need to be thinking about how to reduce the attack surface so they are no longer an attractive target for threat actors. Just like car owners use the Club -- a physical locking mechanism that makes steering wheels immobile -- to make their vehicles harder to steal, organizations need to be installing controls that make them harder to break into, Erlin says. “By installing the Club, all you are doing is making your car less attractive than the next car down the line.”

Organizations in this sector should also consider implementing common security precautions like the principle of least privilege, log monitoring, and anomalous behavior detection capabilities, he said.

The results of the Tripwire survey echo concerns raised in a PricewaterhouseCoopers report as long as two years ago on growing attacks against organizations in the energy sector.

That report had warned about organized and well-funded threat actors increasingly launching targeted attacks to pilfer trade secrets and other data from companies in the oil and gas sector. While most attacks do not result in physical damage, some have, the report noted, pointing to the 2012 destruction of some 30,000 PCs at oil company Saudi Aramco by the Shamoon virus.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
1/19/2016 | 4:59:23 AM
Cyber attacks will always continue to grow

The drop in economy greatly affected the oil corporation recently and it has effected globally as well. The reason behind increasing cyber attacks is the development in technology. Nowadays, we can hear a lot of news that related to cyber attacks and network security breaking. I don't think that we can get rid of these treats. The hackers and attackers makes use of the advncement in technology. The only way to make sure our security is to set up multi security systems in organizations. This will block the cyber attacks regularly after every stage. The One-Security system will not work in this technically advanced world.




Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.