Manufacturing News from the Engineered Designer Perspective

Three Out of Four Energy Companies Hit by Cyber-Attacks in the Last Year

Global hacking attempts have become increasingly more prevalent over the past few years. Governments, companies, and individuals alike have been victims of these attacks. Hackers targeting governments and political figures often intend to leak classified information, expose corruption, or even attack a candidate in order to see their side win.

Hackers who target large corporations often seek monetary gain, attempt to wipe out systems, gain access to sensitive data, steal intellectual property, commit fraud, or steal services.

 

 

One country or agency may hack another in order to discover information relating to potential sources of oil so they can get there and begin drilling first.

Exxon, Telvent and others hit by hackers

Whatever the reason for these attacks, many of them have been aimed at a variety of industries, including energy companies. According to a report released by industry consultant Deloitte LLP, three out of four oil and natural gas companies were victims of such attacks. Some of these attacks include the following:

  • Cyber-attack known as Night Dragon stole exploration and bidding data from major oil companies such as Exxon Mobil and BP in 2011.
  • Advanced Trojan viruses and other disk-wiping malware devastated companies throughout the Middle East and Europe in 2012 and 2014.
  • In March 2012, three alerts were issued by the U.S. Department of Homeland Security. These alerts warned of attacks against natural gas pipeline companies in the United States and Canada.
  • In September 2012, Telvent Canada Ltd. experienced an attack that compromised security systems. This threat was especially problematic, considering the company manages 60 percent of all oil and gas pipelines in the Western hemisphere.
  • Hackers targeted power plants, energy grid operators, gas pipeline companies, and industrial equipment manufacturers in the United States, Spain, and across Europe in 2014 cyber-attacks. The malware used in these attacks stole documents, usernames, and passwords.

Gas and power plant company hacks represent a safety risk

These attacks and others have shone a light on the potential risk faced by oil and gas companies as well as others. This is a frightening thought for a number of reasons. Once they are in, they can access information and systems in ways that could cripple the company and even the country. In addition to gaining access to sensitive and classified information, hackers who break into these systems can potentially use their programs and abilities for nefarious purposes. If someone hijacks system controls, they could shut the entire operation down. They could shut down the power grid and disrupt the industry, crippling the economy and causing widespread chaos.

Unfortunately, many attacks go unnoticed and unreported. Hackers have been increasing their ability to obtain access to various systems without being detected. Hackers typically begin by accessing the office environment before working their way through production networks and safety systems.

The vulnerabilities can be fixed

According to Offshore Energy Today, companies typically become vulnerable to cyber threats due to:

  • lack of cyber security awareness and training among employees, vendors, suppliers, and contractors
  • insufficient separation of data networks and physical security of data rooms and cabinets
  • vulnerable software
  • outdated control systems
  • the use of mobile devices and storage devices
  • remote work during operations and maintenance
  • and the use of standard IT products with known vulnerabilities.

Monitoring of information systems and additional security measures are necessary to safeguard against potential cyber-attacks. The fixes are:

  • implement password standard: no shared passwords, change passwords monthly, mix of characters
  • update all software at least monthly
  • implement guidelines on downloadable software employees can run (many viruses come in via downloadable free software)
  • run robust firewall and security, virus protection and monitor
  • minimize access to vulnerable systems via mobile devices. Any mobile devices used for this purposes should be password protected and encrypted
  • train teams on protocols for email attachments and links (another major pathway for viruses and hackers).

Latest Stories

“I will destroy humans” says life-like robot: Elon Musk’s claim that artificial intelligence poses a threat to mankind may be justified?

“I will destroy humans” says life-like robot: Elon Musk’s claim that artificial intelligence poses a threat to mankind may be justified?

It may have been a glitch, but during a media interview, a “smart learning” robot named Sophia declared: “Okay, I will destroy humans.”     Although this was in response to an interview question from a journalist, it came across as a little jarringly frightening — rather than as the joke that might have been…

Smart winery? Environmental Health Monitoring Technology to boost plant production; pilot with Ontario winery with Bell in partnership with Huawei

Smart winery? Environmental Health Monitoring Technology to boost plant production; pilot with Ontario winery with Bell in partnership with Huawei

Bell announced a new partnership with Ontario-based BeWhere, an Internet of Things (IoT) solutions company, and China-based tech company Huawei, the world’s largest telecommunications equipment maker. Huawei worked with Bell to develop “an environmental monitoring solution to help improve the health and quality of plants at the vineyard.” Steve Lu, President of Huawei Canada said:…

$6.5 million Small Business Innovation Challenge to develop technologies in “Vehicle Occupancy Detection” and “Digital Identity”

$6.5 million Small Business Innovation Challenge to develop technologies in “Vehicle Occupancy Detection” and “Digital Identity”

Funded by the Ontario Government, the Small Business Innovation Challenge is helping companies develop new technologies in Vehicle Occupancy Detection — used to detect how many people are in an automobile for high occupancy toll roads (HOT) — and Digital Identity to help secure government services. To date, $6.5 million has been allocated, with $3.76…

Ontario launches Autonomous Vehicle Innovation Network in Stratford to highlight privonce as the “go to” for Autonomous tech

Ontario launches Autonomous Vehicle Innovation Network in Stratford to highlight privonce as the “go to” for Autonomous tech

Ontario is reinforcing its status as a go-to destination for developing automated vehicles by launching AVIN, the Autonomous Vehicle Innovation Network, in Stratford. This unique demonstration zone is among the first of its kind in Canada and will allow researchers to hone the technology and test an AV in a wide range of everyday, real-life…

GO Transit may deploy hydrogen-power rather than electric; consults with Canadian fuel cell technology company that worked on world’s first hydrogen-powered train

GO Transit may deploy hydrogen-power rather than electric; consults with Canadian fuel cell technology company that worked on world’s first hydrogen-powered train

  Canadian hydrogen generation and fuel cell products developer Hydrogenics Corporation will formally undertake feasibility study for GO Transit to potentially deploy hydrogen-powered trains for Ontario. These trains have aleady proven successful in Europe, using technology developed in Canada at Hydrogenics. The Ontario Government announced the consultation yesterday, as part of its $13.5 billion RER…

100,000 watt laser firing 10,000 pulses per second would “deorbit” tons of dangerous space debris

100,000 watt laser firing 10,000 pulses per second would “deorbit” tons of dangerous space debris

The Extreme Univese Space Observatory telescope, originally built to detect cosmic rays, could be used to target space debris in orbit. According to scientists, a powerful laser can then be used to de-orbit space junk that endangers the International Space Station and other satelites. The laser system would be armed with a 100,000 wat ultraviolet…

Women will represent 50% of leadership positions at Oath (AOL-Yahoo merger) says CEO Tim Armstrong

Women will represent 50% of leadership positions at Oath (AOL-Yahoo merger) says CEO Tim Armstrong

In a move toward equality and inclusivity, Oath CEO Tim Armstrong has announced a mission to fill at least half of the company’s leadership positions with women by 2020. He had the opportunity to discuss this mission in a recent episode of CNN’s Boss Files with Poppy Harlow.     The CEO of Oath —…

Latest Update on KRACK (Key Reinstallation Attack): the flaw in WPA2 protocal for WIFI systems

Latest Update on KRACK (Key Reinstallation Attack): the flaw in WPA2 protocal for WIFI systems

Belgian researchers, Mathy Vanhoef and Frank Piessens — who recently issued warnings concerning a bug in the WPA2 protocol, a widely used system for securing Wi-Fi communications — have made tools available to “detect whether an implementaiton of the 4-way handshake… is vulnerable to key reinstallation attacks.” Standard protocols, such as “changing the password” will…

Bill Gates betting we can invent our way to a clean energy world

Bill Gates betting we can invent our way to a clean energy world

One of the world’s wealthiest businessmen and philanthropists hopes to serve as a catalyst in finding speedier solutions to the world’s climate change problems. Bill Gates of Microsoft has teamed with Mark Zuckerberg and a dozen or so other billionaires and high-profile institutions to launch the Breakthrough Energy Coalition. Gates has pledged $2 billion of…

A cloaking device possible? Stealth technology studies virtual invisibility through “irradiating with its own specific pattern”

A cloaking device possible? Stealth technology studies virtual invisibility through “irradiating with its own specific pattern”

Every kid has dreamed of being invisible at some point. Whether that stemmed from the desire to escape awkward encounters or dreams of being a spy and finding dirt on those around us, we have all been there. While true invisibility may not be possible, a recent study claims that we may be closer than…

1 2 3 73Next →

Other Popular News and Stories

  • Volkswagen to produce super-efficient hybrid
  • Economy managed slight growth in Q4, but shrank in December
  • RV industry has growing role in Canada's economy: study
  • DART Aerospace re-branding itself to reach wider markets
  • Canadian business, except energy, had profitable Q4: Statistics Canada
  • Skilled labour shortage in world oil industry: report
  • SPPCA's new landing gear facility opening in Mississauga
  • Pratt & Whitney Canada announces helicopter engine contracts
  • Japex to buy into west coast LNG development
  • FTG Aerospace to supply avionics to Rockwell Collins
  • Canadian oil production up; producers turning to railways for shipment
  • Bombardier nearly ready to flight test CSeries
  • Canada keeping up pressure on US for Keystone XL approval
  • GM investing $250 million at Ingersoll plant
  • Clean energy expected to surge as pv costs drop
  • Manufacturing the sole industry showing job losses in February
  • Miners struggling with higher costs, lower prices
  • BC refinery close to financing deal
  • Bombardier holds update on CSeries aircraft
  • Russian leasing company orders 42 CSeries jets from Bombardier