Italian oil and gas services company Saipem reported on Monday that some of its servers were hit by a cyberattack.
The company has shared few details about the attack – it’s unclear if it was ransomware or another type of intrusion – but its representatives told SecurityWeek that no data was stolen and that only some servers in its infrastructure were impacted.
Saipem says it’s in the process or restoring affected servers using available backups, which the company claims are “safe.”
“We have no proof of the origins or reasons for the attack, though this is being investigated,” a Saipem spokesperson said via email.
The company did however tell Reuters that the attack mainly impacted servers in the Middle East, including Saudi Arabia, the United Arab Emirates and Kuwait.
Saipem told Reuters the attack originated in Chennai, India, but that does not necessarily reveal the identity of the attacker as malicious actors often use random servers from around the world to hide their true location.
Learn More About Security in the Oil & Gas Sector at SecurityWeek’s ICS Cyber Security Conference
Saipem describes itself as “one of the world leaders in drilling services, as well as in the engineering, procurement, construction and installation of pipelines and complex projects, onshore and offshore, in the oil & gas market.” The company has customers in more than 60 countries, including Saudi Arabian oil and gas giant Saudi Aramco.
Phil Neray, VP of Industrial Cybersecurity at CyberX, says the target itself provides some clues as to who may be behind the attack.
“It’s still too early to tell, but given Saipem’s position as a trusted 3rd-party supplier to Saudi Aramco, an educated guess would be that the adversary is the same one that attacked Saudi Aramco in the past — which points to the destructive Shamoon attacks of 2012 and 2016, now widely-attributed to Iran,” Neray told SecurityWeek.
A study conducted earlier this year by Ponemon Institute on behalf of German industrial giant Siemens revealed that many oil and gas companies in the Middle East had suffered at least one serious security incident in the previous year.
Related: U.S. Oil and Gas Industry Lagging in Security
Related: Assessing Cyber and Physical Risks to Oil & Gas Sector
Related: Several U.S. Gas Pipeline Firms Affected by Cyberattack

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- NIST Publishes Final Version of 800-82r3 OT Security Guide
- Johnson Controls Hit by Ransomware
- Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
- Government Shutdown Could Bench 80% of CISA Staff
- Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor
- macOS 14 Sonoma Patches 60 Vulnerabilities
- New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
Latest News
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- National Security Agency is Starting an Artificial Intelligence Security Center
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
