Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:00 AM
Connect Directly

Four Gas Pipeline Firms Hit in Attack on Their EDI Service Provider

Attack a warning on vulnerabilities in energy networks, security analysts say.

Several cybersecurity experts this week cautioned against underestimating the seriousness of a cyberattack on an EDI service provider that disrupted data communication services at four major US interstate gas pipeline companies in the last few days.

The attack does not appear to have interrupted gas pipeline operations or cause any damage to operational systems at any of the four organizations. So far there is no information on motive or whether the attack was targeted in nature or merely opportunistic. Even so, it would be a mistake to treat the attack with anything other than the most serious attention, say several security analysts.

"Due to interdependencies in the energy sector organizations should be extremely concerned," says Tom Kellermann, chief cybersecurity officer at Carbon Black. "Attacks like these create systemic risk and foreshadow nefarious campaigns." 

Oneok Inc, Boardwalk Pipeline Partners, Energy Transfer Partners, and Eastern Shore Natural Gas had to discontinue using their Electronic Data Interchange system for communicating with customers following a cyberattack on Latitude Technologies, their third-party service provider, Bloomberg News reported Tuesday.

The attack did not impact any operational systems, and to date no customer data is believed compromised. Energy Transfer Partners and Eastern Shore Natural reported restoring EDI services Monday evening. A Boardwalk spokesman says customers are conducting business via a company customer activities website until EDI service is fully operational.

Oneok did not respond immediately to a Dark Reading request for a status update. But in a statement on its website, the company said it had temporarily disabled EDI services as a precautionary measure and had advised customers to use alternate communication methods for gas scheduling purposes.

Latitude — a subsidiary of Energy Service Group — alsodid not respond immediately to a Dark Reading request seeking more details on the attack and its efforts to restore impacted services. The company touts its EDI services as being used by dozens of interstate gas pipeline companies, energy marketers, data aggregators, and management firms to protect, translate and track key energy transactions.

The attack comes amid heightened concerns about government-sponsored actors in Russia and China targeting US organizations in critical infrastructure sectors. Just last month, the US government in a rare move, formally accused Russian operatives of targeting energy companies in the US while slapping sanctions on several of them.

Some executives, including Patrick McBride, a vice president at ICS security vendor Claroty, think what happened to Latitude most likely was financially motivated. Attackers may have been hoping to hijack Latitude's network or systems and extort money from the company as happens with any ransomware attack. Another possibility is that they could have been hoping to find information of value they could monetize in the EDI streams.

The third, and most troubling, possibility is that they were hoping to find a way into the energy companies via a third-party network. "All of these industrial environments have vendors that support different aspects of the control system," McBride says. Not all of those vendors "are driving their cars out to the pumping station or water treatment plant. They are logging in from a remote location," which attackers can target, he says.

It's not so much a matter of attacking EDI communications specifically. It's more about looking for any open attack vector in which to gain a foothold for jumping into a broader network or set of critical systems adds Mike Kail, CTO at CYBRIC. "Think of it as squeezing through a pet door in order to gain access to an entire house and more valuable assets."

Kellermann believes the attackers went after Latitude in order to gather information on the energy strategies and operational dependencies of organizations using the company's EDI services. "This was the first stage of an attack campaign. This attack was focused on recon," Kellermann says. "They are discerning the vulnerability of gas distribution networks to cyberattack. This is very concerning as a non-rational actor like a rogue regime might decide to light the cyber match." 

The attack — and its impact on the four companies — is sure to prompt a greater review of the security risks posed by third-party support services in the energy sector as elsewhere. Networks belonging to suppliers, partners, and service providers typically have trusted access to enterprise networks but are very often far less protected. Unsurprisingly, attackers have repeatedly targeted these networks to try and gain access to their ultimate targets.

In fact, according to penetration-testing firm IOActive, almost three-quarters of attacks targeting industrial control systems have their initial point of entry via a third-party system. In penetration tests that the company has conducted within the energy sector, most often its testers have been able to break into a network via a third-party connector, according to Bryan Singer, director of security services at IOActive. 

In one instance, IOActive gained access into an industrial network at a refinery via old websites belonging to companies that the organization no longer even worked with. "And these attack paths bypassed most security controls such as IDS and firewalls," he says.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop ITX and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jim, stop pretending you're drowning in tickets."
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-07-17
In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis r...
PUBLISHED: 2019-07-17
In ONOS 1.15.0, apps/yang/web/src/main/java/org/onosproject/yang/web/YangWebResource.java mishandles backquote characters within strings that can be used in a shell command.
PUBLISHED: 2019-07-17
NSA Ghidra before 9.0.1 allows XXE when a project is opened or restored, or a tool is imported, as demonstrated by a project.prp file.
PUBLISHED: 2019-07-16
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
PUBLISHED: 2019-07-16
A vulnerability in various versions of Iomega and LenovoEMC NAS products could allow an unauthenticated user to access files on NAS shares via the API.