Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Italian Oil Services Company Saipem Hit by Cyberattack

Italian oil and gas services company Saipem reported on Monday that some of its servers were hit by a cyberattack.

Italian oil and gas services company Saipem reported on Monday that some of its servers were hit by a cyberattack.

The company has shared few details about the attack – it’s unclear if it was ransomware or another type of intrusion – but its representatives told SecurityWeek that no data was stolen and that only some servers in its infrastructure were impacted.

Saipem says it’s in the process or restoring affected servers using available backups, which the company claims are “safe.”Italian oil and gas company Saipem hit by cyberattack

“We have no proof of the origins or reasons for the attack, though this is being investigated,” a Saipem spokesperson said via email.

The company did however tell Reuters that the attack mainly impacted servers in the Middle East, including Saudi Arabia, the United Arab Emirates and Kuwait.

Saipem told Reuters the attack originated in Chennai, India, but that does not necessarily reveal the identity of the attacker as malicious actors often use random servers from around the world to hide their true location.

Learn More About Security in the Oil & Gas Sector at SecurityWeek’s ICS Cyber Security Conference

Saipem describes itself as “one of the world leaders in drilling services, as well as in the engineering, procurement, construction and installation of pipelines and complex projects, onshore and offshore, in the oil & gas market.” The company has customers in more than 60 countries, including Saudi Arabian oil and gas giant Saudi Aramco.

Phil Neray, VP of Industrial Cybersecurity at CyberX, says the target itself provides some clues as to who may be behind the attack.

Advertisement. Scroll to continue reading.

“It’s still too early to tell, but given Saipem’s position as a trusted 3rd-party supplier to Saudi Aramco, an educated guess would be that the adversary is the same one that attacked Saudi Aramco in the past — which points to the destructive Shamoon attacks of 2012 and 2016, now widely-attributed to Iran,” Neray told SecurityWeek.

A study conducted earlier this year by Ponemon Institute on behalf of German industrial giant Siemens revealed that many oil and gas companies in the Middle East had suffered at least one serious security incident in the previous year.

Related: U.S. Oil and Gas Industry Lagging in Security

Related: Assessing Cyber and Physical Risks to Oil & Gas Sector

Related: Several U.S. Gas Pipeline Firms Affected by Cyberattack

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.