Cyber Attack

Home>Topics>Cyber Attack
Refine Results
  1. All
  2. Online Articles
  3. Magazine Articles
  4. Videos
  1. Petrochemical: Iran oil industry fires, blasts raise suspicions of hacking

    In this photo released by the semi-official Iranian Isna News Agency, and taken on July 4, 2016, firefighters try to extinguish a blaze at the Bou Ali Sina Petrochemical Complex at the Imam Khomeini port, southwestern Iran. A series of fires at Iranian petrochemical plants and facilities have raised suspicions about hacking potentially playing a role in the blazes. Iran officially insists the six known blazes this summer weren’t the result of a cyberattack. However, authorities themselves saying that “viruses had contaminated” equipment at several of the affected complexes. (Borna Ghasemi/ISNA via AP) DUBAI, United Arab Emirates (AP) — A series of fires at Iranian petrochemical plants and facilities have raised suspicions about hacking potentially playing a role, with authorities saying that "viruses had contaminated" equipment at several of the affected complexes. Iran officially insists the six known blazes over the span of three months weren't the result of a cyberattack. However, the government acknowledgment of supposedly protected facilities being infected points to the possibility of a concerted effort to target Iranian infrastructure in the years after the Stuxnet virus disrupted thousands of centrifuges at a uranium enrichment facility. Among the worst of the fires was a massive, days-long inferno in July at the Bou Ali Sina Petrochemical Complex in Iran's southwestern province of Khuzestan. Insurance officials later estimated the damage at some $67 million. Authorities preliminarily blamed the blaze on a leak of paraxylene , a flammable hydrocarbon, without elaborating. Other recent blazes include: — A July 29 fire at a storage tank at the Bistoon Petrochemical Complex in Iran's western province of Kermanshah that authorities blamed on an electrical fault; — An Aug. 6 gas pipeline explosion in the port city of Genaveh that killed one person and injured three; — An Aug. 7 fire at a storage area of the Bandar Imam Khomeini Petrochemical Complex that burned for two days; — An Aug. 30 inferno that erupted in a sewage unit at Iran's South Pars gas field; and — A Sept. 14 gas leak and fire at the Mobin Petrochemical Factory that services the South Pars gas field that injured four workers. Initially, Brig. Gen. Gholam Reza Jalali, who heads an Iranian military unit in charge of combatting cybersabotage, dismissed any notion that the fires could have been caused by hacking. Iran's aging oil pipelines and plants, hit hard by years of Western sanctions, have seen a rapid push to increase production this year to take advantage of the nuclear deal with world powers. Iran also faces occasional separatist attacks on its pipelines. But on Aug. 27, Jalali acknowledged Iran's petrochemical industry had been the target of cyberattacks. He put the blame on imported and installed components at the facilities. "The viruses had contaminated petrochemical complexes," he said, according to a report by the state-run IRNA news agency. "Irregular commands by a virus may cause danger." But despite the infections, Jalali said cyberattacks had no hand in the fires and explosions. He also said "defensive measures are underway," without elaborating. Beyond Jalali's vague comments, what actually infected the plants remains unclear. It's unknown if Iran, which has boosted its own cyberwarfare and defense capabilities in recent years, has sought outside assistance in its investigation. The Russian antivirus firm Kaspersky Lab, whose analysts were among the first to investigate Stuxnet, said it wasn't involved in investigating this outbreak and declined to comment. However, Jalali's comments that the viruses spread through imported parts suggests a concerted effort by a foreign power. Iran likely relied on black-market parts while the country faced international sanctions, said Robin Mills, a Dubai-based oil industry analyst and CEO of Qamar Energy. "Maybe they couldn't always get the high-quality parts coming from countries who are sanctioning it and had to get second-hand parts or parts not of the right specifications and put these pieces together without a lot of international expertise," Mill said. "In that case, of course, accidents can happen." But the number of fires in row has raised suspicions of Iran being targeted. Such an attack "requires a lot of resources" that individual hackers would not have, said Idan Udi Edry, a former Israeli air force captain who now is the CEO of Nation-E, a cybersecurity firm specializing in protecting industrial systems. Asked if the Iranian blazes were the result of hacking, Edry said he was "100-percent" sure, based on his own company's experience and surveillance. "No company, organization or nation in the world would like to admit they've been hacked," he said. "This specific attack was exact the same one (like Stuxnet), only on a different critical infrastructure area." However, Ralph Langner, another industry expert who studied the Stuxnet virus, said it seemed "unlikely" the fires were caused by cyberattacks, though his firm hasn't investigated. Stuxnet, widely believed to be an American and Israeli creation, infected thousands of centrifuges at the Natanz uranium enrichment plant at the height of Western fears over Iran's nuclear program. The virus targeted the machines through the industrial control systems that set their speeds, causing them to spin out of control and destroy themselves. Such control devices, used for years in fields ranging from utility companies to the oil industry, are especially susceptible to hackers. That's because they weren't initially envisioned to be connected to the internet and that most security attention focuses on consumer products such as email and laptops. While the Stuxnet virus was the most famous hack to exploit them, there have been others that caused real-world destruction. German authorities say a steel mill sustained massive damage to its blast furnace in 2014 after hackers took control of its industrial control systems, though details on the incident remain few. Iranian hackers also allegedly penetrated the controls of a small dam less than 30 kilometers (20 miles) away from New York City. That dam's system, however, was connected directly to the internet, while the Iranian oil industry is believed to be "air-gapped" — or not connected directly to the web. Meanwhile, hackers of all kinds appear to be increasingly targeting industrial control systems. In the U.S. alone, a Homeland Security center tasked with handling such attacks reported it responded to 295 incidents in 2015, up from 245 the year before. "Cyberattacks are no longer how to steal information," Edry said. "These are attacks that are meant to shut down a country."

    Online Articles

    Online Articles

    Thu, 22 Sep 2016

  2. Asset visibility and inventory: the starting point for OT security

    The convergence of OT and IT is helping managers make better decisions to improve operational reliability, safety and profitability. However, there are many cybersecurity risks that threaten the newly connected operational infrastructure of energy and utility service providers. 

    Online Articles

    Online Articles

    Mon, 19 Sep 2016

  3. Proofpoint uncovers cyberattack involving "smart" home appliances

    Proofpoint has uncovered what may be the first proven Internet of Things (IoT)-based cyberattack involving conventional household "smart" appliances.

    Online Articles

    Online Articles

    Mon, 20 Jan 2014

  4. Biggest U.S. electric company battles off steady cyberattacks

    The country's largest electricity company is on alert for cyberattacks that aim to hamper the critical flow of power and is listening to U.S. intelligence agencies about potential threats.

    Online Articles

    Online Articles

    Mon, 21 Dec 2015

  1. Nuclear Power Plants Unprepared for Cyber Attack , Report Says

    Online Articles

    Online Articles

    Tue, 6 Oct 2015

  2. Energy News: Ex-US scientist sentenced in attempted cyber -attack

    A former Nuclear Regulatory Commission scientist has been sentenced to a year and a half in prison for plotting a cyberattack on federal government computers.

    Online Articles

    Online Articles

    Tue, 12 Apr 2016

  3. Proofpoint uncovers cyberattack ... through fridge

    More than 750,000 phishing and spam emails launched from "thingbots" including televisions, fridge

    Online Articles

    Online Articles

    Mon, 20 Jan 2014

  4. Monitoring system: Cyber security solution for industrial automation

    Safety products: Tripwire provides unified visibility for networks, endpoints and controllers.

    Online Articles

    Online Articles

    Mon, 27 Jun 2016

  5. S. Korea accuses North of cyberattack targeting nuclear power operator

    South Korea is officially pointing the finger at North Korea for cyberattacks against its state-run nuclear power operator late last year

    Online Articles

    Online Articles

    Tue, 17 Mar 2015

  6. S. Korea blames the North for nuclear power plant cyberattack

    South Korea has publicly blamed North Korea for a recent cyberattack at a nuclear power plant operator.

    Online Articles

    Online Articles

    Tue, 17 Mar 2015

  7. US Smart Grid updates left system exposed to cyberattack

    A rush by the US Energy Department to modernize the countrys power grid has left the system vulnerable to cyberattacks , the agencys internal watchdog found.

    Online Articles

    Online Articles

    Wed, 8 Feb 2012

  8. Smart Grid: GridCOM awarded cyber -attack protection grant

    GridCOM has been awarded a grant from the state of California to help protect the country's vulnerable electrical grid from the growing threat of cyber - attack .

    Online Articles

    Online Articles

    Wed, 4 Sep 2013

Get More Results