• 5 minutes Oil prices forecast
  • 8 minutes Nuclear Power Can Be Green – But At A Price
  • 11 minutes Projection Of Experts: Oil Prices Expected To Stay Anchored Around $65-70 Through 2023
  • 16 minutes Europe Slipping into Recession?
  • 10 hours *Happy Dance* ... U.S. Shale Oil Slowdown
  • 4 hours Socialists want to exorcise the O&G demon by 2030
  • 2 hours Emissions from wear of brakes and tyres likely to be higher in supposedly clean vehicles, experts warn
  • 3 hours UK, Stay in EU, Says Tusk
  • 1 day Germany: Russia Can Save INF If It Stops Violating The Treaty
  • 1 day Connection Between Climate Rules And German's No-Limit Autobahns? Strange, But It Exists
  • 2 days Conspiracy - Theory versus Reality
  • 4 hours How Is Greenland Dealing With Climate Change?
  • 2 days Chevron to Boost Spend on Quick-Return Projects
  • 1 day Maritime Act of 2020 and pending carbon tax effects
  • 2 days U.S. Treasury Secretary Mnuchin Weighs Lifting Tariffs On China
  • 2 days Regular Gas dropped to $2.21 per gallon today
Oil Rises After Choppy Start To The Week

Oil Rises After Choppy Start To The Week

Oil prices rose by roughly…

U.S. ‘Tough Line’ On Iran Depends On Crude Prices

U.S. ‘Tough Line’ On Iran Depends On Crude Prices

As the White House compliments…

Is This Cyber Attack An Indirect Hit At Saudi Aramco?

Saipem

Italy’s oil services group Saipem has said that the cyber attack that hit its servers in the Middle East earlier this week is a variant of the notorious Shamoon malware that was used in a crippling attack on Saudi Aramco in 2012, which raises questions over whether the attack on Saipem was an indirect cyber breach targeting the Saudi oil giant—Saipem’s biggest customer.

“The cyber attack hit servers based in the Middle East, India, Aberdeen and, in a limited way, Italy through a variant of Shamoon malware,” Saipem said in a statement on Wednesday.

On Monday, when Saipem first reported that it had suffered a cyber attack, Saipem’s head of digital and innovation, Mauro Piasere, told Reuters that Saipem’s servers in Saudi Arabia, the United Arab Emirates (UAE), and Kuwait had been attacked and the attack originated in Chennai, India.

On Wednesday, Piasere told Reuters that Saipem didn’t know who was responsible for the cyber attack.

Adam Meyers, vice president at U.S. cybersecurity firm CrowdStrike, told Reuters, however, that he believed Iran was responsible for the attack because early technical scrutiny showed that the new Shamoon malware variant had similarities to the 2012 attack, which security experts widely believe was perpetrated by people working for the Iranian government. 

Just as news broke about Saipem’s servers in the Middle East being targeted, reports emerged that a variant of the Shamoon malware is back, Axios reported this week, citing a release from the cybersecurity unit of Alphabet, Chronicle. According to the Chronicle release, the company had detected a file infected with Shamoon in its database VirusTotal.

The malware, Chronicle said, was uploaded from Italy and is different from the previous two variants. Those moved through networks via pre-programmed credentials while this one stays on the computer it is installed on first. There is no command and control infrastructure that would allow the attackers to communicate with the virus, and what the virus does this time is encrypt all files irreversibly rather than replacing them with politically significant images, Axios reports.

By Tsvetana Paraskova for Oilprice.com

More Top Reads From Oilprice.com:



Join the discussion | Back to homepage

Leave a comment

Leave a comment

Oilprice - The No. 1 Source for Oil & Energy News