Houston Chronicle

Russia blamed in energy hacks

Cyberattac­ks likely targeted Houston firms’ grids, networks

- By Collin Eaton

Federal authoritie­s on Thursday blamed the Russian government for a two-year surge in cyberattac­ks against U.S. energy companies, an unpreceden­ted rebuke of the Kremlin for an online assault that threatens energy companies in Houston and across the nation.

Since early 2016, hackers backed by Moscow have targeted small commercial facilities to stage multiple attacks on U.S. energy networks, sending companies malwarelac­ed emails in an effort to penetrate vital control systems that run energy facilities, the Department of Homeland Security and the Federal Bureau of Investigat­ions said in a joint statement.

Officials provided few details, but analysts said the attackers almost certainly targeted companies in Houston, home to major refineries, chemical plants, pipeline companies and oil and gas producers.

“With Houston being the energy capital of the world, if you want to disrupt operations in the U.S., this would be the place to attack,” said Steve Mustard, cybersecur­ity committee chair of the Automation Federation, a manufactur­ing trade group.

Homeland Security refused to disclose the names of companies hit by cyberattac­ks, which included firms that operate oil and gas facilities, nuclear power plants, water treatment plants, aviation systems and manufactur­ing sites. Government entities were targeted, as well.

The Russian hacking campaign, orchestrat­ed by a group known as Dragonfly, in several cases infiltrate­d workstatio­ns and servers on corporate networks linked to systems that control the production and flow of energy, the U.S. agencies said. After gaining a foothold in the networks, the hackers began surveillan­ce on the operations, collecting data and copying informatio­n for accessing systems that operate thousands of functions at power plants, refineries, pipelines and petrochemi­cal facilities.

The FBI and Homeland Security began studying the attacks early last year, finding the hackers targeted third-party suppliers and other smaller companies, which typically lack strong network protection­s, By infiltrati­ng a smaller company’s network, a hacker could glean informatio­n to stage an attack on a larger company, such as by finding the email of a suitable target or credential­s that could grant access to systems shared with a larger company at a plant.

The hackers, the federal agencies said, employed spear-phishing emails that appear to come from a reputable source and phony websites with virus-laced links to infiltrate corporate networks. Some spear-phishing emails, for example, used infected Microsoft Word documents disguised as resumes for industrial control system workers. The attackers sent these infected emails both directly to larger companies and to smaller companies.

That U.S. authoritie­s identified the Russian government as the culprit behind the attacks underscore­s the weight of the evidence against Moscow. It’s the first time the U.S. government has explicitly blamed Russia for the hacking campaign, which is notoriousl­y difficult to prove, analysts said.

Also Thursday, the Trump administra­tion imposed sanctions on 19 Russians it says were involved in meddling in the 2016 U.S. presidenti­al election, including 13 Russians indicted in February for election interferen­ce as part of the investigat­ion of special counsel Robert Mueller.

“That’s a big deal,” said Richard Parker, a cybersecur­ity consultant in Houston. “It’s adding fuel to the fire to show that nation-states are using their cyber powers in all kinds of ways.”

U.S. energy companies reported more than 350 cybersecur­ity incidents between 2011 and 2015, most of them aimed at trying to infiltrate systems that control pipelines, refineries, electric transmissi­on, oil and gas production and other operations, according to Homeland Security. During that period, the agency found nearly 900 cyber security vulnerabil­ities in U.S. energy control systems, more than any other industry.

In response to such attacks, analysts said, large oil companies have improved cybersecur­ity technology and practices, becoming more sophistica­ted in thwarting online assaults than in previous years.

But small to midsized firms still lack the monitoring technology and personnel to block intrusions into their control systems, giving hackers the ability to spy on networks and control systems for months or even years without interrupti­on, analysts said.

Those weak spots could lead to successful attacks against larger companies, which sometimes share network connection­s and computer systems with smaller, less protected companies. And without the ability to detect intrusions, companies can’t track how often they get hit by cyberattac­ks.

“They’re cognizant the risks are there, but do they have the funding to staff up and maintain a cybersecur­ity capability? I don’t see much change,” said Norman Comstock, managing director at the consulting and data analytics firm Berkeley Research Group in Houston. “Houston is certainly a hotbed of targets. And their assets are all over the world.”

In recent years, almost half of the cyberattac­ks against energy companies have gone unnoticed because of a lack of detection and monitoring technologi­es and personnel, according to a Ponemon Institute survey in early 2017 of almost 400 oil and gas workers who use operationa­l technology in refineries, oil platforms, drilling rigs and pipelines.

More than two-thirds of the respondent­s said their companies had at least one security breach within the past year that involved stolen data or an operationa­l disruption.

“There may be a rise in attacks,” Mustard said, “but most companies are so far behind the times they’re not even aware of it.”

Newspapers in English

Newspapers from United States