Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:05 PM
Connect Directly

Destructive Attacks On Oil And Gas Industry A Wake-Up Call

Cyberattacks could have real-world economic consequences in the oil and gas markets, even at the pump

First installment in a series on cyberthreats to the oil and gas industry

Some 30,000 or so hard drives were scrapped and replaced with new ones last year on Saudi Aramco's internal corporate network after a massive cyberattack destroyed data on the oil and natural gas company's Windows machines. While the massive attack didn't directly affect Saudi Aramco's oil production and exploration systems, it raised the stakes for the increasingly targeted oil and gas industry and also raised concerns of possible market fallout from such attacks.

The oil and gas industry today is in the bull's eye of nation-states, hacktivists, and even cybercriminals, and, like other energy sectors, its industrial control systems are about a decade behind the security curve of the traditional IT environment. While Saudi Aramco said the attack was isolated to its corporate network and didn't directly affect its hydrocarbon exploration and production systems -- which run on isolated networks -- the reality is that a successful cyberattack could have ripple effects and ultimately result in real-world economic consequences in the oil and gas markets, security and oil and gas industry experts say. It could either directly or indirectly disrupt production, competition, and, ultimately, prices at the pump, they say.

If Stuxnet were the tipping point for ICS/SCADA attacks, then the data-destruction attacks on Saudi Aramco and on Qatar's RasGas gas company last year represent a major shift from cyberspying on oil and gas companies to more widespread destruction of their operations.

"I wonder if that's their Estonia moment," says Richard Bejtlich, CSO at incident response provider Mandiant, who says his company has been getting more inquiries from Middle East organizations lately. "We're moving beyond the stage of, 'This is a problem, and how do we fix it?'"

A recent Council on Foreign Relations report warns that future cyberattacks on the oil and gas industry could threaten the competitiveness of the U.S. oil and gas industry, pointing to the Saudi Aramco, Qatar RasGas, and cyberespionage attacks on Chevron and other U.S. oil companies, as warning shots.

"Some damage was done in each of these cases, but the costs of future breaches could be much higher, whether to corporate assets, public infrastructure and safety, or the broader economy through energy prices. Successful cyberattacks threaten the competitiveness of the U.S. oil and gas industry, one of the nation’s most technically advanced and economically important sectors," the report said. "While intrusions previously focused on the theft of intellectual property and business strategies, the malware attack on Saudi Aramco reflects a worrying qualitative change toward attacks with the potential for causing physical disruptions to the oil and gas supply chain."

But a widespread energy catastrophe would be difficult to execute electronically. Plant systems, indeed, are not as well-fortified electronically as IT systems in many cases, but they also are not as homogenous, which actually makes them more difficult to penetrate on a larger scale. "There are adversaries trying to get to those systems," says Patrick Miller, president emeritus of EnergySec and managing partner at The Anfield Group. "But it's not like you get into one Windows [machine there] to get into [others]. It's difficult to cause widespread catastrophic damage. You can do pockets, like Stuxnet [did]."

That doesn't mean, however, that a high-profile targeted attack couldn't still incur some economic damage. "Any market has an element of confidence built into it. If you erode confidence in the supply or any of its elements," it could affect the market, he says.

"A long and slow [attack] could cause quality issues with some of these ... it doesn't necessarily take a frontal assault to [hit] the bottom line. This is an ecosystem," he says.

Could gas prices be affected? "That's not even a stretch -- yes," Miller says.

But physical attacks against the energy sector are the biggest worries today, Miller says. "There's a greater opportunity for cyberattack than there was four or five years ago. The physical attack threat is constant," he says. "The ability to cause long-term catastrophic damage is far greater from a physical perspective."

Eyal Aronoff, co-founder of the Fuel Freedom Foundation, says cyberattacks on the oil and gas industry are more than just "a nuisance" anymore. The biggest threat, he says, is domestic terrorism, typically politically or economically motivated.

Aronoff maintains that the U.S. market is probably safest from economic injury because it's so decentralized, while centralized, government-run oil and gas providers in other nations are sitting ducks. "The U.S. is the most protected because there are hundreds of large companies -- billions of dollars in companies -- in this space ... they are all large enough to overcome any difficulties of a shutdown," he says. "However, companies like Pemex [in Mexico], centralized government companies, are great risk because of their centralized nature."

The combination of a physical and digital attack on a government-owned oil company could have long-lasting effects on the oil markets, such as temporary shortages and a price hit, he says. "That could be devastating and could last for very long time ... it would definitely affect prices at the pump and might create temporary shortages."

An engineer for a U.S. oil and gas company who requested anonymity says the chances of a cyberattack affecting petroleum production and gas prices in the U.S. are "pretty slim."

"We should prepare and mitigate for it, but the [chances] are still slim," he says. "It would have to be a really big facility" hit that would result in driving up gasoline prices, he says. "And even big plants are somewhat divided into individual units," which decentralizes the target, he says.

The U.S. has fairly diversified production, he says, with pipelines "moving around," so the supply issue wouldn't be as much of a risk. It would more likely result in bad PR and embarrassment for the breached company, he says, which could have a ripple effect on the stock market, for instance.

"There is more flexibility in supply," he says. But there are exceptions: "There are a couple of facilities of offshore crude [oil] that, if taken down, would cause major problems," he says.

A lesser-understood and more insidious threat is the manipulation of the oil trading market by nefarious actors, the Freedom Fuel Foundation's Aronoff says. "Jacking up the price of gas can cause a recession in the U.S.," he says.

Some anomalies in the oil market have raised concerns that organized cybercrime may be attempting to manipulate the market for profit, EnergySec's Miller notes. "There have been some minor situations where just oddities have happened, and the market has reacted ... My Spidey sense is that the blips we're seeing are those parties seeing how the market would react to certain situations."

Miller says the end game could be bankrupting a company, or "devaluing" one. "You might see the transfer of wealth across international borders. If you wanted to buy a company, you would devalue them" surreptitiously and then buy them, he says.

[Old-school but painful data-destroying malware attacks in the Middle East a red flag to revisit incident response, recovery. See The Data-Annihilation Attack Is Back.]

Meanwhile, there's the Iran factor. The reported U.S. involvement in Stuxnet and its destruction of the Natanz nuclear facility's centrifuges could come back to haunt it, experts worry. Cyberespionage against oil and gas firms by the Chinese could be just the calm before the storm: "Say what you will about the Chinese and their cyberactivity, but they are very polite in at least they only steal data. I'm a little worried if Iran turns around and says, 'It's payback time,'" says Nick Levay, CSO at Bit9. "It's pretty easy to break into organizations."

Levay says while some energy firms are working hard to close security holes in their infrastructures, others aren't there yet. And that leaves the door open for a determined adversary to do some damage, he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
10/23/2013 | 3:59:58 PM
re: Destructive Attacks On Oil And Gas Industry A Wake-Up Call
OPSWAT's Metadefender is widely deployed by Nuclear Operators in the states to validate the integrity of external media that should enter a plant or corporate office via contractors, vendors or even employees.

I would encourage you to read how OPSWAT helps these Operators comply with NEI 08-09 Revision 6, which guides nuclear facilities in complying with cyber security regulations for IT infrastructure.

Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now this is the worst micromanagment I've seen.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-07-20
An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. The core components that create and launch a print job do not perform complete verification of the session cookie that is supplied to them. As a result, an attacker with guest/pseudo-guest level permissions can bypass t...
PUBLISHED: 2019-07-20
An issue was discovered in the wp-code-highlightjs plugin through 0.6.2 for WordPress. wp-admin/options-general.php?page=wp-code-highlight-js allows CSRF, as demonstrated by an XSS payload in the hljs_additional_css parameter.
PUBLISHED: 2019-07-20
An issue was discovered on AudioCodes Mediant 500L-MSBR, 500-MBSR, M800B-MSBR and 800C-MSBR devices with firmware versions F7.20A to F7.20A.251. An internal interface exposed to the link-local address allows attackers in the local network to access multiple quagga VTYs. Attackers can...
PUBLISHED: 2019-07-19
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
PUBLISHED: 2019-07-19
A SQL injection vulnerability exists in the Icegram Email Subscribers & Newsletters plugin through 4.1.7 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system.