• 3 minutes Australian power prices go insane
  • 7 minutes Wind droughts
  • 11 minutes  What Russia has reached over three months diplomatic and military pressure on West ?
  • 22 mins Is Europe heading for winter of discontent with extensive gas shortages?
  • 2 days The United Nations' AGENDA 2030 - The vision for One World Governance ...an article by the famous Dr Robert Malone
  • 1 day 87,000 new IRS agents, higher taxes, and a massive green energy slush fund... "Here Are The Winners And Losers In The 'Inflation Reduction Act'"-ZeroHedge
  • 8 mins GREEN NEW DEAL = BLIZZARD OF LIES
  • 3 days Hopes Are Dashed For International Oil Companies In North Iraq
  • 19 hours "Mexico Plans to Become an Export Hub With US-Drilled Natural Gas" - Bloomberg - (See image)
  • 5 days "The Global Digital ID Prison" by James Corbett of CorbettReport.com
  • 4 hours "How to Calculate Your Individual ESG Score to ensure that your Digital ID 'benefits' and money are accessible"
  • 2 days The Federal Reserve and Money...Aspects which are not widely known

Is This Cyber Attack An Indirect Hit At Saudi Aramco?

Italy’s oil services group Saipem has said that the cyber attack that hit its servers in the Middle East earlier this week is a variant of the notorious Shamoon malware that was used in a crippling attack on Saudi Aramco in 2012, which raises questions over whether the attack on Saipem was an indirect cyber breach targeting the Saudi oil giant—Saipem’s biggest customer.

“The cyber attack hit servers based in the Middle East, India, Aberdeen and, in a limited way, Italy through a variant of Shamoon malware,” Saipem said in a statement on Wednesday.

On Monday, when Saipem first reported that it had suffered a cyber attack, Saipem’s head of digital and innovation, Mauro Piasere, told Reuters that Saipem’s servers in Saudi Arabia, the United Arab Emirates (UAE), and Kuwait had been attacked and the attack originated in Chennai, India.

On Wednesday, Piasere told Reuters that Saipem didn’t know who was responsible for the cyber attack.

Adam Meyers, vice president at U.S. cybersecurity firm CrowdStrike, told Reuters, however, that he believed Iran was responsible for the attack because early technical scrutiny showed that the new Shamoon malware variant had similarities to the 2012 attack, which security experts widely believe was perpetrated by people working for the Iranian government. 

Just as news broke about Saipem’s servers in the Middle East being targeted, reports emerged that a variant of the Shamoon malware is back, Axios reported this week, citing a release from the cybersecurity unit of Alphabet, Chronicle. According to the Chronicle release, the company had detected a file infected with Shamoon in its database VirusTotal.

The malware, Chronicle said, was uploaded from Italy and is different from the previous two variants. Those moved through networks via pre-programmed credentials while this one stays on the computer it is installed on first. There is no command and control infrastructure that would allow the attackers to communicate with the virus, and what the virus does this time is encrypt all files irreversibly rather than replacing them with politically significant images, Axios reports.

By Tsvetana Paraskova for Oilprice.com

More Top Reads From Oilprice.com:



Join the discussion | Back to homepage



Leave a comment

Leave a comment

EXXON Mobil -0.35
Open57.81 Trading Vol.6.96M Previous Vol.241.7B
BUY 57.15
Sell 57.00
Oilprice - The No. 1 Source for Oil & Energy News