Earlier this month, the world’s largest oil production company, Aramco, was attacked by the Shamoon virus. On Monday, a second attack forced one of Qatar’s two main LNG (Liquid Natural Gas) production and export companies offline as well. Speculation has it that Shamoon is responsible for this as well.
The early August attack against Aramco is notable, as it seems as if the Shamoon was created solely for this campaign. Adding to that line of thought were the threats made by a group calling themselves the Cutting Sword of Justice, who said they used Shamoon to target some 30,000 systems maintained by Aramco.
On Monday, Qatar’s RasGas said in a statement that a virus had caused problems, forcing them to take their network offline. However, “operational systems onsite and offshore are secure and this does affect nor impact our production as a Ras Laffan Industrial City plant or scheduled cargoes,” the statement added.
“In response to that we have a specialist RasGas IT team working in collaboration with ICT Qatar to resolve this issue as soon as possible.”
It’s unknown of Shamoon was the source of the RasGas attack, but at least one person says it was. James Herron, who is EMEA Energy News Editor at Dow Jones Newswires and the Wall Street Journal, commented on Twitter that sources say, “…the virus that shut down RasGas computers is also Shamoon, the virus widely-believed to have hit Aramco earlier this month.”
Despite the attack, RasGas says that employees are reporting to work as normal. Their website and network remains offline.
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- Consolidate Vendors and Products for Better Security
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
