text
stringlengths 4
429
|
---|
BAE Systems 2014. |
All rights reserved. BAE SYSTEMS, the BAE SYSTEMS Logo and the product names referenced herein are trademarks of BAE |
Systems plc. BAE Systems Applied Intelligence Limited registered in England & Wales (No.1337451) with its registered office at |
Surrey Research Park, Guildford, England, GU2 7RQ. No part of this document may be copied, reproduced, adapted or redistributed |
in any form or by any means without the express prior written consent of BAE Systems Applied Intelligence. |
SECURITY RESPONSE |
Targeted Attacks Against |
the Energy Sector |
Candid Wueest |
Version 1.0 |
January 13, 2014, 14:00 GMT |
The energy sector has become a major focus for targeted |
attacks and is now among the top five most targeted sectors |
worldwide. |
Follow us on Twitter Visit our Blog |
@threatintel http://www.symantec.com/connect/symantec-blogs/sr |
CONTENTS |
OVERVIEW...................................................................... 3 |
Introduction................................................................... 5 |
Exposed systems: Online and offline............................. 7 |
Smart grid: A new potential avenue of attack |
History of discovered attacks...................................... 10 |
2013....................................................................... 10 |
2008....................................................................... 10 |
2003....................................................................... 10 |
2001....................................................................... 10 |
2000....................................................................... 10 |
Stuxnet................................................................... 11 |
Night Dragon.......................................................... 11 |
Shamoon/Disttrack................................................ 12 |
Spear phishing attacks in the energy sector |
New Year |
s campaign............................................. 14 |
Greek oil campaign................................................. 14 |
Motivation and origin................................................... 16 |
Protection and mitigation............................................ 16 |
Conclusion.................................................................... 19 |
Appendix...................................................................... 21 |
A. Spear phishing .................................................. 21 |
B. Visualization with TRIAGE.................................. 24 |
C. Phases of targeted attacks................................ 25 |
Resources..................................................................... 28 |
OVERVIEW |
The energy sector has become a major focus for targeted attacks and is now among the top |
five most targeted sectors worldwide. Companies in the sector are facing a growing risk |
of having their services interrupted or losing data. The threat to energy firms is only likely |
to increase in the coming years as new developments, such as further extensions of smart |
grids and smart metering expose more infrastructure to the Internet. Equipment that is |
not connected to the Internet and other networks is not immune to threats and there has |
already been a number of successful attacks against isolated systems. Operators of critical |
infrastructure, as well as energy utility companies, need to be aware of these threats and |
prepare accordingly. |
The threat to energy firms comes from several different sources. In some cases, espionage |
from competitors is the primary motive, with data on new projects, exploration and finances |
being targeted. Disruption and destruction are the goals of other attacks. Some instances |
appear to be state sponsored, such as the disruption of the Iranian nuclear program by |
the Stuxnet worm in 2010, one of the attacks that began this trend. Others appear to |
be the work of hacktivists with political or environmental agendas. Internal attackers, |
like disgruntled employees, are also a major source of attacks that often lead to service |
disruption. The majority of the actors behind these attacks have grown more sophisticated |
in the way they attack. |
During the monitoring period from July 2012 to June 2013, we observed an average of 74 |
targeted attacks per day globally. Of these, nine attacks per day targeted the energy sector. |
Accounting for 16.3 percent of all attacks, the energy sector was the second most targeted |
vertical in the last six months of 2012, with only the government/public sector exceeding it |
with 25.4 percent of all attacks. The high ranking was mainly due to a major attack against |
a global oil company, which we observed in September 2012. However, in the first half of |
2013 the energy sector continued to attract a high proportion of attacks, ranking in fifth |
place with 7.6 percent of targeted attacks. |
Not all of the attacks analyzed used highly sophisticated tools. Most of them could have |
been prevented by following best practice guidelines for protecting the IT infrastructure and |
the industrial components, indicating that despite high revenues and strategic importance, |
many energy sector companies are not prioritizing cybersecurity. |
INTRODUCTION |
Many power |
utilities companies |
fear disruptive |
attacks the most, |
regardless of |
whether it is done |
by internal or |
external attackers. |
Targeted Attacks Against the Energy Sector |
Introduction |
The number of targeted cyberattacks in general has risen in the past few years. In addition to this, the rate of |
attack exposure has also risen, with more companies becoming aware of attacks, expecting them and searching |
for indications of compromise. It is not a new phenomenon, but its importance has grown. The Council on |
Foreign Relations, a US think tank, reported that energy companies, including oil and gas producers, were often |
the focus of targeted attacks during summer 2012. In May 2013 the US Department of Homeland Security |
(DHS) warned of an increase in sabotage attacks against US energy companies located in the Middle East. The |
government had tracked multiple attacks and issued a warning together with the Industrial Control Systems |
Cyber Emergency Response Team (ICS-CERT). A report by the US Congress supported this picture, stating that |
many power utilities companies were under constant or daily attack through cyberspace. Taking into account |
that successful breaches of critical infrastructures are still rare and that these numbers included generic |
malware infections, it nevertheless highlights the potential for cyberattacks in the energy sector. |
As in most sectors, attackers are often after valuable information. For example, we have seen attackers target |
intellectual property such as technology for photovoltaic research and wind turbines, or data on gas field |
exploration. Information such as this is of high value and can generate huge profits for attackers or their |
sponsors. The same information can also be misused for an act of sabotage. Many power utilities companies fear |
disruptive attacks the most, regardless of whether it is done by internal or external attackers. The energy sector |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.