Vulnerabilities / Threats
04:55 PM
Connect Directly

Successful Attacks On Oil And Gas Companies Increasing, Survey Shows

What remains unclear is how many of them actually impact critical industrial control systems

The rate of cyberattacks and the number of successful attacks against organizations in the oil and gas industries are both continuing to increase, even as the ability to detect and respond to them is dropping, a new survey sponsored by Tripwire shows.

The security vendor commissioned Dimensional Research to survey IT professionals in the energy, utilities and gas industries and the results are based on responses from the over 150 professionals who participated in the study.

Eighty-two percent of the survey respondents said the number of successful attacks against their organizations had increased in the last 12 months. About 53 percent said the rate of cyberattacks, or attacks that were attempted but failed, increased between 50 percent and 100 percent during the same period.

At the same time, nearly seven in 10 of the respondents also expressed a lack of confidence in the ability of their organization to detect and stop such attacks.

The survey does not specify the attack types so no breakdown is available on how many of the successful attacks involved data theft, malware infections, distributed denial-of-service attacks, insider theft or sabotage.

The survey also leaves unclear how consequential the attacks were for the impacted organizations. Though reports about increasing attacks against organizations in the critical infrastructure sector often evoke wide concern, not all attacks are the same. A successful cyberattack on an industrial control system controlling critical equipment at an oil and gas company, for instance, would have far more damaging consequences than an attack on a front-end business server.

Even so, the numbers in the Tripwire report are significant. Unlike in the past, many industrial control systems these days are connected to the Internet and are therefore accessible externally. So a successful attack on a corporate network could potentially give attackers a way to also access the backend systems controlling critical equipment and infrastructure.

“One is a path to the other,” says Tim Erlin, director of IT security and risk strategy for Tripwire. “We know critical systems are connected to the Internet. So, in many cases, an initial attack may be a precursor to an attack on a more critical industrial control system,” he said.

According to Erlin, the survey results offer a couple of key takeaways. The increase in attacks against companies in the oil and gas sector shows that the threat environment has gotten a lot more dangerous while the increase in successful attacks shows that organizational ability to stop them is not keeping pace.

Companies in the oil and gas sector need to be thinking about how to reduce the attack surface so they are no longer an attractive target for threat actors. Just like car owners use the Club -- a physical locking mechanism that makes steering wheels immobile -- to make their vehicles harder to steal, organizations need to be installing controls that make them harder to break into, Erlin says. “By installing the Club, all you are doing is making your car less attractive than the next car down the line.”

Organizations in this sector should also consider implementing common security precautions like the principle of least privilege, log monitoring, and anomalous behavior detection capabilities, he said.

The results of the Tripwire survey echo concerns raised in a PricewaterhouseCoopers report as long as two years ago on growing attacks against organizations in the energy sector.

That report had warned about organized and well-funded threat actors increasingly launching targeted attacks to pilfer trade secrets and other data from companies in the oil and gas sector. While most attacks do not result in physical damage, some have, the report noted, pointing to the 2012 destruction of some 30,000 PCs at oil company Saudi Aramco by the Shamoon virus.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
1/19/2016 | 4:59:23 AM
Cyber attacks will always continue to grow

The drop in economy greatly affected the oil corporation recently and it has effected globally as well. The reason behind increasing cyber attacks is the development in technology. Nowadays, we can hear a lot of news that related to cyber attacks and network security breaking. I don't think that we can get rid of these treats. The hackers and attackers makes use of the advncement in technology. The only way to make sure our security is to set up multi security systems in organizations. This will block the cyber attacks regularly after every stage. The One-Security system will not work in this technically advanced world.




Register for Dark Reading Newsletters
White Papers
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.