The cyber attack on Saudi Aramco in August 2012 is the latest in a
growing number of cybercrimes against the oil and gas industry. As
contracts and technology grow in value, hackers are becoming more
attracted to inside information. Denis Edgar-Nevill, chair of cybercrime
forensics with the British Computer Society, explains how the sector
can defend its assets.
Saudi Aramco may be back in business after clearing 30,000 of its computers of a malicious virus in August, but the attack should serve as a stark warning that the oil and gas industry is becoming increasingly attractive to digital thieves.
Continual
innovation in the sector means that hackers, whether they are greedy
competitors or corrupt employees, are on the prowl for information
regarding new patents, technologies, systems or devices.
Details surrounding multimillion-dollar contract bids and acquisitions are also open to attacks as oil and gas supplies slowly diminish.
For the Saudi Arabian oil major, workstations were shutdown and hydrocarbon production remained unaffected, but other companies may not get off so lightly.
Here, Denis Edgar-Nevill, chair of cybercrime forensics with the British Computer Society, discusses the greatest cyber threats to the oil and gas industry and explains how firms can prevent attacks.
Sarah Blackman: Is cybercrime is the new biggest threat to the energy industry?
Denis Edgar-Nevill: Well, cybercrime is a threat to all industries and it's a threat not only to the industrial sector but also to the government, public works and private individuals. So, yes it is a major threat.
Anything to do with energy is to do with critical infrastructure, particularly because some of the systems which energy providers provide are critical to life.
SB: Are oil and gas companies well prepared for cyber threats?
DE: It's wrong to think that one size fits all. Because of the existing safety procedures and policy procedures which are inherent in a high-tech industry such as oil and gas exploration, they are better prepared than many.
There are something like a couple of million new virus strains in the world and variants come out every year, but a small number (in the dozens) are what we call zero-day weapons where you don't know anything about them - they are using a new technique and they are using a clever idea, which somebody has come up with.
SB: Aside from attacking websites what other cyber threats to the energy are out there?
DE: It's really only limited to the imagination of the people who would want to attack you.
It might be stealing new technologies, processes, devices or patents which will give people competitive advantage, or it could be an attempt just to disrupt and damage.
It really depends on who your friends and enemies are, but nobody should feel secure because nobody is secure.
For anybody who has some means of communicating information to the outside world and accepting information from the outside world there is a potential for some sort of attack.
SB: Is social media also a threat?
DE:
It's a huge threat, absolutely huge. The thing that has astonished is
that when the Data Protection Act was introduced in the UK, companies
had to spend a lot of money making sure they weren't holding the wrong
information about people that they weren't lawfully allowed to store,
and then social media came along and people are putting unbelievable
things about themselves, for anybody to look at.
It's when social media is used within the employees of an organisation you'll find all sorts of things leaking out, where somebody makes references to secure projects, for example.
I've even seen, in one or two cases, people actually sharing passwords, which is crazy.
SB: Should companies worry about internal sabotage?
DE: The weakest element of security is the people we employ - the human firewall. We tell people what the acceptable process is and we are really at their mercy about whether they follow that process.
People are awfully easy to manipulate and that's where I do a lot of work, which involves talking to people involved in penetration testing, where a company might employ a firm to test their own defences.
Nine out of ten times the successful attacks which penetration testers will apply to an organisation are against the people. They fool people to into believing they are somebody who should be given detailed information or somebody with legitimate access to a resource.
SB: Reports have shown that digital theft is now a greater threat to the energy industry than terrorist attacks. Do you agree?
DE: It's a question of if somebody is going to attack you, what's in it for them? A terrorist organisation might attempt to attack the energy infrastructure to further a political cause, but they'd have to be very sure it has big impact.
With
energy, particularly the oil and gas industry, it's hard to have an
immediate impact - you'd have to do something big to cause the industry
to stop and generate lots of publicity for their cause. I think
terrorists might attack the oil and gas industry if there is an
opportunity there, but economic crime is always going to be there. There
will always be money to be made.
Oil and gas is one of the areas where there is continual innovation and whether somebody does very well may depend on their new technique for exploiting a particular avenue to make money is available to them.
Oil and gas is also prone to situation where the systems are held to blackmail because whenever something stops, money starts getting wasted. The stakes are very high in oil and gas exploration - a day's inactivity can mean millions of dollars.
SB: What specific steps can the oil and gas industry take to improve their cyber security?
DE: The trouble is, it's always the boring things which are most effective and it's the boring things which actually will solve 95% of the problems. It's making sure that staff aren't allowed to bring in software, discs or thumb-drives which you haven't adequately scanned beforehand.
That's really one of the biggest threats. It's always a balance between trying to make you computer system as usable and as easy to access as possible, compared with trying to make sure that those accesses are legitimate. If you take the example of the Stuxnet attack on the Iranian nuclear industry, Stuxnet was actually introduced on thumb-drives.
It's easy to say let's ban all thumb-drives, but you've got the other problem of how you are going to get information on to these machines and off these machines.
Also, when people find that there is a mechanism that is difficult for them to use, they try and work around security measures and that's exactly when malware will actually strike and cause damage.
SB: What can firms do to stop cyber threats from spiralling out of control?
DE: It's about education. You've got to have systems in place to stop obvious threats and above all you've got to police them - you've got to continually make sure that people are following procedures. Making people security conscious is probably the most cost-effective thing you can do.
http://www.offshore-technology.com/
Saudi Aramco may be back in business after clearing 30,000 of its computers of a malicious virus in August, but the attack should serve as a stark warning that the oil and gas industry is becoming increasingly attractive to digital thieves.
Details surrounding multimillion-dollar contract bids and acquisitions are also open to attacks as oil and gas supplies slowly diminish.
For the Saudi Arabian oil major, workstations were shutdown and hydrocarbon production remained unaffected, but other companies may not get off so lightly.
Here, Denis Edgar-Nevill, chair of cybercrime forensics with the British Computer Society, discusses the greatest cyber threats to the oil and gas industry and explains how firms can prevent attacks.
Sarah Blackman: Is cybercrime is the new biggest threat to the energy industry?
Denis Edgar-Nevill: Well, cybercrime is a threat to all industries and it's a threat not only to the industrial sector but also to the government, public works and private individuals. So, yes it is a major threat.
Anything to do with energy is to do with critical infrastructure, particularly because some of the systems which energy providers provide are critical to life.
SB: Are oil and gas companies well prepared for cyber threats?
DE: It's wrong to think that one size fits all. Because of the existing safety procedures and policy procedures which are inherent in a high-tech industry such as oil and gas exploration, they are better prepared than many.
There are something like a couple of million new virus strains in the world and variants come out every year, but a small number (in the dozens) are what we call zero-day weapons where you don't know anything about them - they are using a new technique and they are using a clever idea, which somebody has come up with.
SB: Aside from attacking websites what other cyber threats to the energy are out there?
DE: It's really only limited to the imagination of the people who would want to attack you.
"The problem is, we can prepare for things we know about, but it's hard to prepare for things which haven't been invented yet."
With
the type of high stakes you are playing with in oil and gas, companies
might want to mount attacks on each other or do a little industrial
espionage just to find out information about their dealings with
individual customers.It might be stealing new technologies, processes, devices or patents which will give people competitive advantage, or it could be an attempt just to disrupt and damage.
It really depends on who your friends and enemies are, but nobody should feel secure because nobody is secure.
For anybody who has some means of communicating information to the outside world and accepting information from the outside world there is a potential for some sort of attack.
SB: Is social media also a threat?
It's when social media is used within the employees of an organisation you'll find all sorts of things leaking out, where somebody makes references to secure projects, for example.
I've even seen, in one or two cases, people actually sharing passwords, which is crazy.
SB: Should companies worry about internal sabotage?
DE: The weakest element of security is the people we employ - the human firewall. We tell people what the acceptable process is and we are really at their mercy about whether they follow that process.
People are awfully easy to manipulate and that's where I do a lot of work, which involves talking to people involved in penetration testing, where a company might employ a firm to test their own defences.
Nine out of ten times the successful attacks which penetration testers will apply to an organisation are against the people. They fool people to into believing they are somebody who should be given detailed information or somebody with legitimate access to a resource.
SB: Reports have shown that digital theft is now a greater threat to the energy industry than terrorist attacks. Do you agree?
DE: It's a question of if somebody is going to attack you, what's in it for them? A terrorist organisation might attempt to attack the energy infrastructure to further a political cause, but they'd have to be very sure it has big impact.
Oil and gas is one of the areas where there is continual innovation and whether somebody does very well may depend on their new technique for exploiting a particular avenue to make money is available to them.
Oil and gas is also prone to situation where the systems are held to blackmail because whenever something stops, money starts getting wasted. The stakes are very high in oil and gas exploration - a day's inactivity can mean millions of dollars.
SB: What specific steps can the oil and gas industry take to improve their cyber security?
DE: The trouble is, it's always the boring things which are most effective and it's the boring things which actually will solve 95% of the problems. It's making sure that staff aren't allowed to bring in software, discs or thumb-drives which you haven't adequately scanned beforehand.
That's really one of the biggest threats. It's always a balance between trying to make you computer system as usable and as easy to access as possible, compared with trying to make sure that those accesses are legitimate. If you take the example of the Stuxnet attack on the Iranian nuclear industry, Stuxnet was actually introduced on thumb-drives.
It's easy to say let's ban all thumb-drives, but you've got the other problem of how you are going to get information on to these machines and off these machines.
Also, when people find that there is a mechanism that is difficult for them to use, they try and work around security measures and that's exactly when malware will actually strike and cause damage.
SB: What can firms do to stop cyber threats from spiralling out of control?
DE: It's about education. You've got to have systems in place to stop obvious threats and above all you've got to police them - you've got to continually make sure that people are following procedures. Making people security conscious is probably the most cost-effective thing you can do.
http://www.offshore-technology.com/