• 4 minutes England Running Out of Water?
  • 7 minutes Trump to Make Allies Pay More to Host US Bases
  • 10 minutes U.S. Shale Output may Start Dropping Next Year
  • 14 minutes Washington Eyes Crackdown On OPEC
  • 6 hours One Last Warning For The U.S. Shale Patch
  • 1 day Modular Nuclear Reactors
  • 1 min Dutch Populists Shock the EU with Election Victory
  • 1 day Once Upon A Time... North Korea Abruptly Withdraws Staff From Liaison Office
  • 11 hours Oil Slips Further From 2019 Highs On Trade Worries
  • 13 mins Climate change's fingerprints are on U.S. Midwest floods
  • 2 days Chile Tests Floating Solar Farm
  • 9 hours Telsa Sales in Europe
  • 48 mins 3 Pipes: EPIC 900K, CACTUS II 670K, GREY OAKS 800K
  • 1 day Poll: Will Renewables Save the World?
  • 11 hours Read: OPEC THREATENED TO KILL US SHALE
  • 7 hours The Political Debacle: Brexit delayed
  • 2 days US-backed coup in Venezuela not so smooth

Is This Cyber Attack An Indirect Hit At Saudi Aramco?

Saipem

Italy’s oil services group Saipem has said that the cyber attack that hit its servers in the Middle East earlier this week is a variant of the notorious Shamoon malware that was used in a crippling attack on Saudi Aramco in 2012, which raises questions over whether the attack on Saipem was an indirect cyber breach targeting the Saudi oil giant—Saipem’s biggest customer.

“The cyber attack hit servers based in the Middle East, India, Aberdeen and, in a limited way, Italy through a variant of Shamoon malware,” Saipem said in a statement on Wednesday.

On Monday, when Saipem first reported that it had suffered a cyber attack, Saipem’s head of digital and innovation, Mauro Piasere, told Reuters that Saipem’s servers in Saudi Arabia, the United Arab Emirates (UAE), and Kuwait had been attacked and the attack originated in Chennai, India.

On Wednesday, Piasere told Reuters that Saipem didn’t know who was responsible for the cyber attack.

Adam Meyers, vice president at U.S. cybersecurity firm CrowdStrike, told Reuters, however, that he believed Iran was responsible for the attack because early technical scrutiny showed that the new Shamoon malware variant had similarities to the 2012 attack, which security experts widely believe was perpetrated by people working for the Iranian government. 

Just as news broke about Saipem’s servers in the Middle East being targeted, reports emerged that a variant of the Shamoon malware is back, Axios reported this week, citing a release from the cybersecurity unit of Alphabet, Chronicle. According to the Chronicle release, the company had detected a file infected with Shamoon in its database VirusTotal.

The malware, Chronicle said, was uploaded from Italy and is different from the previous two variants. Those moved through networks via pre-programmed credentials while this one stays on the computer it is installed on first. There is no command and control infrastructure that would allow the attackers to communicate with the virus, and what the virus does this time is encrypt all files irreversibly rather than replacing them with politically significant images, Axios reports.

By Tsvetana Paraskova for Oilprice.com

More Top Reads From Oilprice.com:



Join the discussion | Back to homepage

Leave a comment

Leave a comment

Oilprice - The No. 1 Source for Oil & Energy News