Day-1 IOCL - Cybersecurity in Oil & Gas
Day-1 IOCL - Cybersecurity in Oil & Gas
EY’s 19th Global Information Security Survey captured the responses of 1,735 C-suite leaders and Information Security and IT executives/managers, representing many of
the world’s largest and most recognized global companies.
Yet only 10% of respondents indicated that examining new and emerging
trends is a very important activity for the information security function.
Cyberattacks
The signs of a cyber breach can be very subtle, with several incidents happening at the same time
Strategic manipulation of sales and Supply chain and on-line ordering system Higher profit areas and growth Periodic accounts payable fraud causes
email systems result in missed sales manipulation leads to degradation of product development efforts are US$ millions in lost income per year.
of -2% to 3% just prior to quarterly and production and receivables collection, stolen, resulting in loss of sales Mass release of privacy data results
annual reporting periods results in missed revenue projections and competitive edge, in loss of public trust and additional
of -2% to 3% and royalty payment to nation-state legal cost
companies
► Liabilities
► Access to sensitive data that can be monetized or used to perpetrate ► Regulatory enforcement actions
financial fraud, blackmail or corporate espionage ► Employee or customer lawsuits
► Shareholder lawsuits
► Intangible or goodwill impairment
► Financial losses
► Shareholder lawsuits
► Access to financial systems to execute unauthorized financial transactions
► Intangible or goodwill impairment
Risk levels
IDENTIFIED TREATED MONITORED MITIGATED
should be:
Information System
Confidentiality Availability Integrity
Security
Closed OT Department
Problems: SECURITY
systems
UES
ISSUES
S
OT Department
E
S
UE
U
ISS
S
‘80s ‘90s
ISS
2012 2014
IS
2000
Problems:
No IT Effectiveness
SECURITY
standards
Lack of IT Closed Corporate IT Department
knowledge systems costs
IT IT Department
ERP / CRM
Isolated Unification of Centralized Virtualisation Cloud
new
systems technologies systems SSCs computing
functionalities
Vulnerabilities
Improper Input ►Bufferoverflow
►Insufficient
security documentation Policy/Process
Validation ►Lack of bounds checking
►Poor security documentation
►Command injection maintenance
►Use of potentially dangerous
Poor Quality Code ►No security perimeter defined Weak Network Design
function
►Lack of network segmentation
►NULL pointer dereference
►Lack of functional DMZs
Permissions, privileges ►Pooror improper access control ►Access to specific ports on host
and access controls Weak Firewall Rules
►Execution with unnecessary privileges not restricted to required IP
addresses
►Poor system
Improper Authentication ►Network devices not properly Improper configuration
identification/authentication controls
configured
►Authentication bypass issues
Internet
/FK>I F>K
Target Devices
People
People, Process and
Shipping Plant Technology Unavailability
Vessels Infrastructure
• Fire
• Flood
• Network Services failure
Helicopters IT Systems
Impact of disruption
• Total IT/ communication systems
failure
Pipelines Drilling Services • Inability to control systems
remotely
Processing
Terminals
Transportation
Poorly designed networks that fail to segregate the control system network from the corporate network
Non-existent testing of SCADA components (i.e. PLCs, RTUs, etc.) for security flaws before deployment in production environment
Inadequate allocation of information system access privileges to contractors from multiple agencies
Lack of formal capacity and performance management procedures to ensure adequate processing power and storage to support
complex computing requirements of the industry
Improper service level definitions with third parties to cover information security aspects
Inadequately managed, designed, or implemented critical support infrastructure, for e.g. UPS, HVAC systems, physical access
control, etc.
OT Network
OT Network
Vulnerable and obsolete
Attacker connects OS and Antivirus
to plant office’s
network using a
physical LAN cable
or Wi-Fi network
Unauthorized connection
via network / removable
media
Gains IP
addresses and
Lack of security
basic network
information incidence detection and
response mechanisms
Gained access to SCADA plant
engineering and control station
sitting. Gives the ability to
shutdown the plant or modify
the parameters
No cyber risk awareness
or training at the plants
WHAT HAPPENED
On 15 August 2012 at 11:08am Saudi-Arabian time, Saudi Aramco, world’s Because of the highly destructive functionality of the “Shamoon” Wiper
largest oil producer with annual sales of over $200 billion annually was struck module, an organization infected with the malware could experience
by a self replicating computer virus “Shamoon” that spread across 30,000 operational impacts including loss of intellectual property (IP) and disruptions
Windows based personal computers operating on the company’s network. of critical systems. Saudi Aramco was able to restore all its main internal
The malicious software’s main function was indiscriminate deletion of data network services by 26 August 2012. But, for more than two months, the
from computer hard drives. Although, there was no apparent oil spill, employees could not access their corporate emails and company’s internal
explosion or other major fault in Aramco operations, the incident impacted the network. It is also likely that most of the infected computers were rendered
production and business processes of the company as at least some of the temporarily unusable due to an element in malware designed to overwrite the
drilling and production data were likely lost and it reportedly took two weeks Master Boot Record. However, the production operations were not affected
for the oil producing giant to fully restore its network and recover from a as the malware did not reach the industrial control system (ICS) computers
disruption of its daily business operations caused by data loss and disabled that were involved in drilling or refining operations at Aramco due to
workstations. segmentation between computer systems responsible for general business
The malware “Shamoon” has the the capability to over-write data on infected operations and those employed in monitoring and controlling upstream and
machines and to destroy Master Boot Record files, thus making infected downstream operations.
Windows machines impossible to boot. Further, the malware can also extract Further, “Shamoon” was also found to have propagated to the networks of
information from compromised machines before uploading it to the internet. other oil and gas firms, including that of RasGas, a joint venture of Qatar
The virus consisted of several components. The Dropper refers to the main Petroleum and US-based ExxonMobil.
component and source of the original infection and a number of other Attacks of such nature are lethal for the global economy because if the
modules dropped or copied into the infected computers. The Wiper modules operations of such a large player in the oil and gas sector gets disrupted, it is
was responsible for the destructive functionality of the threat and the likely to affect the fuel prices throughout the world.
Reporter module was accountable for reporting infection information back to
the attacker. AREAS OF IMPROVEMENT IDENTIFIED
After having been released from one of the workstations on the company’s ► Physical and logical security
internal network, “Shamoon”, overwrote files with a fraction of an image of a
burning American flag, then instructed the compromised computers to report ► Periodic backups
their infection back to an IP address. ► Training and awareness of employees
SELECT FEW INCIDENTS EMPLOYEE DOWNLOADS THE
ATTACHMENT PRESENT IN THE MAIL
WHAT HAPPENED
Norway has Europe’s largest oil and natural gas reserves and is the EU’s top energy supplier after Russia.
In August 2014, Norway’s National Security Authority (NSM) announced threat actors had compromised as many as 50 Norwegian oil companies, including its
largest, state-owned oil firm Statoil. The NSM advised 250 other energy companies to check their networks for evidence of malicious activity.
This activity affected several companies in the energy industry. In one case, threat actors sent a phishing email with a malicious attachment to a high-ranking
employee in the procurement division at a Nordic energy company. The email purported to be from the company’s human resources team and threatened the
employee with dismissal. Threat actors also sent phishing emails to several other company employees, including two in the legal and procurement departments.
These phishing emails appeared to be from human resources representatives and contained malicious PDF attachments. If the targeted employees open the
attachments, a destructive program is unleashed that checks the target's system for various holes in its security system. If a hole is found, the program will open a
communications channel with the hackers allowing the hacker to download the damaging code remotely.
Attacker’s goal was to install a keylogger which would allow passwords to be stolen. This could ultimately be used to siphon intellectual property out of the target
organisation.
MALWARES TARGETING ICS
STUXNET AND FLAME
STUXNET FLAME
Stuxnet is the first malicious threat targeting industrial control system such as Flame is the most sophisticated computer malware ever seen by the industry.
gas pipeline, power plant etc. It has mainly four features: command and Flame, also known as w32.Flame.skywiper and is designed to steal different
control, multiple propagation methods, stolen VeriSign driver certificate, and databases. A distinct functionality is used by flame malware is “Audio Spying”
a root kit. Stuxnet is primarily designed to corrupt Siemens (S7-315 and S7- that can record audio, screenshots and can monitor keyboard activities and
417) and predicted that in future it might also corrupt the hard-coded network traffic. For example flame has capabilities of keeping the records of
passwords of the Siemens step 7 software. According to Information Skype conversation by detecting and recognizing a microphone on the
Technology Council of Iran’s Industry and Mines Ministry, Iran had identified infected computer.
that IP addresses of 30000 industrial computer system were infected Like stuxnet, flame also uses local area network (LAN) or intranet or USB
since September 25th, 2010. stick to spread in different systems. Although stuxnet and flame use different
The stuxnet malware can be spread via CD, flash memory (USB) in the PLC programming languages and application architectures, their features are
of industrial control system(ICS). There are very rare chances that industrial common in terms of spreading, using similar securities, vulnerabilities,
control system are connected directly to the internet and each PLC is affecting system and also the use of hacking techniques/algorithms that are
configured with the unique properties. The attacker can gain the knowledge not used anywhere else.
about the design documents of ICS with the help of Employee’s (insider) of
the company or they can gain the knowledge from the earlier version of
Stuxnet. Once stuxnet enters into intranet, it updates its definition with the
use of download server. If there is any previous version of stuxnet presence
in intranet, new stuxnet stimulates it and spreads in PLC of ICS. For the
installation purpose, stuxnet verifies administrative privileges on the system.
If it does not have already, it tries to attain privileges by using one of the two
zero vulnerabilities. It verifies the detail configuration of the ICS for an
appropriate target. Once stuxnet installs, it will gather information about
negotiation, system etc. and sends these details to the attacker/hacker via
http.
Thank You.
Any Questions?