• 30 mins OPEC Oil Deal Compliance Falls To 86%
  • 16 hours U.S. Oil Production To Increase in November As Rig Count Falls
  • 18 hours Gazprom Neft Unhappy With OPEC-Russia Production Cut Deal
  • 20 hours Disputed Venezuelan Vote Could Lead To More Sanctions, Clashes
  • 22 hours EU Urges U.S. Congress To Protect Iran Nuclear Deal
  • 24 hours Oil Rig Explosion In Louisiana Leaves 7 Injured, 1 Still Missing
  • 1 day Aramco Says No Plans To Shelve IPO
  • 4 days Trump Passes Iran Nuclear Deal Back to Congress
  • 4 days Texas Shutters More Coal-Fired Plants
  • 4 days Oil Trading Firm Expects Unprecedented U.S. Crude Exports
  • 4 days UK’s FCA Met With Aramco Prior To Proposing Listing Rule Change
  • 4 days Chevron Quits Australian Deepwater Oil Exploration
  • 4 days Europe Braces For End Of Iran Nuclear Deal
  • 5 days Renewable Energy Startup Powering Native American Protest Camp
  • 5 days Husky Energy Set To Restart Pipeline
  • 5 days Russia, Morocco Sign String Of Energy And Military Deals
  • 5 days Norway Looks To Cut Some Of Its Generous Tax Breaks For EVs
  • 5 days China Set To Continue Crude Oil Buying Spree, IEA Says
  • 5 days India Needs Help To Boost Oil Production
  • 5 days Shell Buys One Of Europe’s Largest EV Charging Networks
  • 5 days Oil Throwback: BP Is Bringing Back The Amoco Brand
  • 5 days Libyan Oil Output Covers 25% Of 2017 Budget Needs
  • 5 days District Judge Rules Dakota Access Can Continue Operating
  • 6 days Surprise Oil Inventory Build Shocks Markets
  • 6 days France’s Biggest Listed Bank To Stop Funding Shale, Oil Sands Projects
  • 6 days Syria’s Kurds Aim To Control Oil-Rich Areas
  • 6 days Chinese Teapots Create $5B JV To Compete With State Firms
  • 6 days Oil M&A Deals Set To Rise
  • 6 days South Sudan Tightens Oil Industry Security
  • 7 days Over 1 Million Bpd Remain Offline In Gulf Of Mexico
  • 7 days Turkmenistan To Spend $93-Billion On Oil And Gas Sector
  • 7 days Indian Hydrocarbon Projects Get $300 Billion Boost Over 10 Years
  • 7 days Record U.S. Crude Exports Squeeze North Sea Oil
  • 7 days Iraq Aims To Reopen Kirkuk-Turkey Oil Pipeline Bypassing Kurdistan
  • 7 days Supply Crunch To Lead To Oil Price Spike By 2020s, Expert Says
  • 7 days Saudi Arabia Ups November Oil Exports To 7-Million Bpd
  • 7 days Niger Delta State Looks To Break Free From Oil
  • 8 days Brazilian Conglomerate To Expand Into Renewables
  • 8 days Kurdish Independence Could Spark Civil War
  • 8 days Chevron, Total Waiting In The Wings As Shell Mulls Majnoon Exit

Breaking News:

OPEC Oil Deal Compliance Falls To 86%

Alt Text

Oil Markets Fear An OPEC Compliance Collapse

Oil prices have fallen back…

Alt Text

Oil Markets Brace For Another Hurricane

Oil prices drew back this…

Alt Text

The Geopolitical Consequences Of U.S. Oil Exports

The United States has ramped…

Ronke Luke

Ronke Luke

Ronke Luke has experience advising senior executives (including at the ministerial level) on initiatives to develop and increase uptake of advanced energy and environmental technologies…

More Info

Successful Cyber Attack In Ukraine Raises Fears Of Further Threats

Successful Cyber Attack In Ukraine Raises Fears Of Further Threats

It’s finally happened. A theoretical major scenario that has worried governments and industry in U.S. and Western Europe has occurred. Power was cut, through a hacker attack, to up to 80,000 customers in Ukraine’s Ivano-Frankivsk region for several hours on December 23, 2015.

Security firm ESET has identified known malware - “BlackEnergy” - as the probable cause. Per, ESET several Ukrainian electricity distribution companies were targeted in the December attack.

Ukraine immediately pointed the finger at Russia. iSIGHT Partners ties SandWorm, the group behind BlackEnergy, to Russia, but no links to the Russian government or specific organizations have yet been made.

The success of this cyber attack on electricity infrastructure raises the stakes and has security and intelligence experts worried.

Two concerns about the Ukraine attacks are first that malware was able to compromise industrial controls, and second the BlackEnergy Trojan appears to have been delivered simply through a spear-phishing email containing compromised Microsoft Office attachments. When one or more email recipients opened the attached Microsoft files, the malicious code executed.

As office automation and industrial control systems have converged, the vulnerabilities of unprotected SCADA and other systems increase. In Europe, the push to adopt smart meters has introduced new weaknesses into power systems.

It is unclear how malicious code delivered through the Ukrainian utilities’ business IT systems affected the industrial controls leading to the power failures. U.S. Department of Homeland Security’s (DHS) ICS-CERT issued an alert that named GE’s Cimplicity HM product, a known vulnerability since 2012, as the “probable initial infection vector for systems running GE’s Cimplicity HMI with a direct connection to the Internet.” Per DHS, GE issued guidance for remediating the flaw in 2013. It’s unclear if any of the Ukrainian utilities had Cimplicity or had fixed the vulnerability. Related: Crashing Oil Prices And Dropping Rig Count Take Their Toll On U.S. Output

So could such an attack happen in the U.S. or Western Europe? Theoretically, yes.

The U.S. government and industry has focused on hardening the power grid and other critical infrastructure. The country is more secure than in 2007 when the threat potential was first demonstrated in a test.

In November 2015, the U.S. completed GridEx III - its third simulated exercise of physical and cyber attacks on U.S. electricity infrastructure. Nearly 10,000 individuals and 315 organizations including power generators, transmission firms, and government and law enforcement agencies participated in the two day test. A public report is expected in January 2016.

But the government has taken note of the Ukraine hack attack. Per Reuters, The Electricity Information Sharing and Analysis Center (E-ISAC), a U.S. government – industry organization, last week issued an advisory describing the Ukraine black out as the result of "coordinated effort by a malicious actor" and urging its members to "do a better job at implementing multiple layers of defense against potential cyber attacks.” Related: Rig Count: Capitulation?

The UK’s Chancellor of the Exchequer, George Osborne, announced in November 2015 that his country would spend £1.9 billion over five years to build new cyber defenses and offensive capabilities. In his remarks to GCHQ, one of the country’s intelligence agencies, Osborne made note of the need to protect the U.K.’s electricity infrastructure stating that "If the lights go out, the banks stop working, the hospitals stop functioning or government itself can no longer operate, the impact on society could be catastrophic."

Executives prefer to invest in power delivery capabilities and services. Cyber investments, which compete against other capital expenditures, are rather like insurance, however. A utility that suffers a catastrophic cyber attack could face a high bar to explain that it invested sufficiently against a known risk.

Utilities in Europe and the U.S. have been ramping up their protections, but events in Ukraine suggest they may have to pick up their pace, or at a minimum retest the robustness of what they’ve done to-date. Since 2011, the SEC has required U.S. publicly traded firms to disclose cyber incidents and risk. Related: Shocking: ISIS Attacks On Libyan Oil Facilities Visible from Space

It would be surprising if C-Suites and Boardrooms are not taking a second look.

iSIGHT Partners reports that SandWorm has been targeting NATO; U.S. and European government organizations; U.S. academic organizations; and European telecom and energy sector with BlackEnergy. With the success in Ukraine’s power sector, it will likely continue to probe. Utilities are keen to stay ahead of such determined cyber adversaries.

As typically happens after a cyber breach, cyber product vendors and service firms are probably in high demand as companies rush to check and patch all known vulnerabilities. Vendors don’t have a hard sell to showcase new solutions and services. As the Ukraine episode demonstrates, humans can be the weakest link in the cyber security. Insufficient cyber-related education for staff in the utility sector has been noted as a weakness. Firms that offer solutions (training, technology and services) that limit the potential havoc of seemingly innocent employee actions such as inadvertently opening malicious emails should find an eager, welcome audience.

By Ronke Luke of Oilprice.com

More Top Reads From Oilprice.com:

Back to homepage

Leave a comment

Leave a comment

Oilprice - The No. 1 Source for Oil & Energy News