• 4 minutes Energy Armageddon
  • 6 minutes How Far Have We Really Gotten With Alternative Energy
  • 10 minutes Russia Says Europe Will Struggle To Replace Its Oil Products
  • 40 mins GREEN NEW DEAL = BLIZZARD OF LIES
  • 53 mins Reality catching up with EV forecasts
  • 6 days "Natural Gas Price Fundamental Daily Forecast – Grinding Toward Summer Highs Despite Huge Short Interest" by James Hyerczyk & REUTERS on NatGas
  • 8 hours 87,000 new IRS agents, higher taxes, and a massive green energy slush fund... "Here Are The Winners And Losers In The 'Inflation Reduction Act'"-ZeroHedge
  • 6 days A Somewhat Realistic View of the Near Future for Electric Vehicles Worldwide
  • 11 days The Federal Reserve and Money...Aspects which are not widely known
  • 16 days US Oil Independence is a myth and will always be a myth
  • 16 days Oil Stocks, Market Direction, Bitcoin, Minerals, Gold, Silver - Technical Trading <--- Chris Vermeulen & Gareth Soloway weigh in

Is This Cyber Attack An Indirect Hit At Saudi Aramco?

Italy’s oil services group Saipem has said that the cyber attack that hit its servers in the Middle East earlier this week is a variant of the notorious Shamoon malware that was used in a crippling attack on Saudi Aramco in 2012, which raises questions over whether the attack on Saipem was an indirect cyber breach targeting the Saudi oil giant—Saipem’s biggest customer.

“The cyber attack hit servers based in the Middle East, India, Aberdeen and, in a limited way, Italy through a variant of Shamoon malware,” Saipem said in a statement on Wednesday.

On Monday, when Saipem first reported that it had suffered a cyber attack, Saipem’s head of digital and innovation, Mauro Piasere, told Reuters that Saipem’s servers in Saudi Arabia, the United Arab Emirates (UAE), and Kuwait had been attacked and the attack originated in Chennai, India.

ADVERTISEMENT

On Wednesday, Piasere told Reuters that Saipem didn’t know who was responsible for the cyber attack.

Adam Meyers, vice president at U.S. cybersecurity firm CrowdStrike, told Reuters, however, that he believed Iran was responsible for the attack because early technical scrutiny showed that the new Shamoon malware variant had similarities to the 2012 attack, which security experts widely believe was perpetrated by people working for the Iranian government. 

ADVERTISEMENT

Just as news broke about Saipem’s servers in the Middle East being targeted, reports emerged that a variant of the Shamoon malware is back, Axios reported this week, citing a release from the cybersecurity unit of Alphabet, Chronicle. According to the Chronicle release, the company had detected a file infected with Shamoon in its database VirusTotal.

The malware, Chronicle said, was uploaded from Italy and is different from the previous two variants. Those moved through networks via pre-programmed credentials while this one stays on the computer it is installed on first. There is no command and control infrastructure that would allow the attackers to communicate with the virus, and what the virus does this time is encrypt all files irreversibly rather than replacing them with politically significant images, Axios reports.

By Tsvetana Paraskova for Oilprice.com

More Top Reads From Oilprice.com:



Join the discussion | Back to homepage

ADVERTISEMENT


ADVERTISEMENT


Leave a comment

Leave a comment

EXXON Mobil -0.35
Open57.81 Trading Vol.6.96M Previous Vol.241.7B
BUY 57.15
Sell 57.00
Oilprice - The No. 1 Source for Oil & Energy News