A Colonial Pipeline facility in Baltimore, Maryland. A cyberattack forced the shutdown of 5,500 miles of Colonial Pipeline's sprawling interstate system, which carries gasoline and jet fuel from Texas to New York. The FBI confirmed that DarkSide ransomware is responsible for the attack that compromised the Atlanta-based pipeline company. EPA
A Colonial Pipeline facility in Baltimore, Maryland. A cyberattack forced the shutdown of 5,500 miles of Colonial Pipeline's sprawling interstate system, which carries gasoline and jet fuel from Texas to New York. The FBI confirmed that DarkSide ransomware is responsible for the attack that compromised the Atlanta-based pipeline company. EPA
A Colonial Pipeline facility in Baltimore, Maryland. A cyberattack forced the shutdown of 5,500 miles of Colonial Pipeline's sprawling interstate system, which carries gasoline and jet fuel from Texas to New York. The FBI confirmed that DarkSide ransomware is responsible for the attack that compromised the Atlanta-based pipeline company. EPA
A Colonial Pipeline facility in Baltimore, Maryland. A cyberattack forced the shutdown of 5,500 miles of Colonial Pipeline's sprawling interstate system, which carries gasoline and jet fuel from Texas

Why is the energy industry prone to cyber attacks?


  • English
  • Arabic

The attack on a critical US artery for the transport of fuel has once again exposed the vulnerabilities of the energy industry to cyber attacks. The ransomware attack on the 2.5 million barrels per day Colonial Pipeline endangered access to fuel for the US East Coast. The pipeline, which was built in the 1960s, snakes across a distance of 8,850 kilometres and carries products sufficient to meet the total consumption of Germany, Europe’s largest economy and the world’s fourth-biggest.

So what makes the energy industry a target for attacks and why is it vulnerable?

Any impact on the energy sector can affect entire communities and even countries. An attack on a power plant or a pipeline can cause widespread blackouts, impact transportation, heating, and the functioning of critical activities in the economy.

The vulnerability in the energy industry originates from the use of legacy industrial control systems, particularly if these have not been upgraded for a number of years and are not fully integrated across systems, according to Mohammed AlMohtadi, chief information security officer at Abu Dhabi’s Injazat.

“These legacy systems therefore not only represent risk factors for energy organisations but can also have a widespread economic impact,” he said.

So how do large energy and utility companies become prey to attacks?

Threat actors usually attempt to steal trade secrets, confidential data and intellectual property, through ransomware attacks.

“While we anticipate breaches to be very sophisticated, in most cases they occur through simple phishing emails and other social engineering activities,” added Mr AlMohtadi.

A ransomware attack, such as the one on the Colonial Pipeline, involves hackers infecting networks with malicious software that encrypts data and leaves machines locked until the victims pay an extortion fee.

On Monday, DarkSide, the group behind the attack, said its aim was to "make money" but not create problems for society. In many cases, the attacks cost the economy much more than the ransom amount demanded.

In many cases, where a cybercriminal intends to inflict political and physical damage to a country or cause financial or reputational harm, the energy sector often becomes a prime target.

“[The] energy industry comes under critical infrastructure … if it is breached, the nation's financial and physical infrastructure could be potentially crippled,” said Avinash Advani, founder and chief executive of Dubai-based cybersecurity company CyberKnight.

Oil and gas infrastructure, nuclear plants, electricity grids, water companies and utility firms that supply the community with power, water, and treat sewage are potential targets.

The Covid-19 pandemic has exposed the energy industry's underbelly. As more people work from home to contain the spread of coronavirus, they unwittingly expose an organisation to cyber attacks.

“Employees at energy organisations are working from home and remotely accessing corporate assets … [they] become a critical attack vector and entry point for attackers,” said Mr Advani.

Researchers have found many coronavirus-related malicious e-mail campaigns and hundreds of downloadable files that attempt to infect user devices. Malicious files have been masked under the guise of pdf, mp4 and docx files. The names of files imply that they contain instructions on how to protect yourself from the virus or updates on the threat.

So how did the Colonial Pipeline become victim to a cyberattack?

“We assume the Colonial Pipeline, the biggest US pipeline system connecting oil supplies in Texas with New York, has been attacked through an insecure remote access,” Stefan Schachinger, network security product manager at computer security company Barracuda, said.

“Remote accesses are not insecure per definition but require proper security measures such as encryption and multi-factor authentication,” he added.

DarkSide, the ransomware group that claimed the Colonial Pipeline attack is new but experienced, industry experts said.

The group targets largely English-speaking countries and avoids the economies of former Soviet states, said Boston-based cyber security firm Cybereason. Its ransom demand typically ranges from $200,000 to $2 million. The group has published stolen data from more than 40 victims, who are believed to be just a fraction of the overall number.

Cyber attacks on energy infrastructure are typically politically or financially motivated.

“When there is an attack on the West, it usually originates from [entities inside] Russia or Eastern European countries with ties to Russia, Iran, China, or North Korea,” said Mr Advani.

However, there can be financially motivated criminal groups that may or may not be associated with a government.

President Joe Biden has said there is no evidence that the Russian government is responsible for the attack on the Colonial Pipeline, but that the country has "some responsibility" to address the ransomware attack and that he will seek global co-operation to battle similar hacks.

US Energy Secretary Jennifer Granholm told Bloomberg TV that supply in the country has so far not been impacted and that the company has said it hopes to restore operations by the end of this week.

“It tells you how utterly vulnerable we are,” Ms Granholm said. “We’re seeing all of these examples of ransomware attacks coming - whether it’s telecommunications or this critical infrastructure. And obviously in my lane I’m very worried about the energy infrastructure.”

She said the incident clearly highlighted the need of private sector companies to step up their investment in cyber defence.

Globally, around 61 per cent of companies surveyed by London-based Mimecast said they were affected by a ransomware attack last year. About 52 per cent of them paid the ransom but of those, only two-thirds recovered their data.

Given the serious implications of cyber attacks, the energy industry should not underestimate groups that target facilities. Many of these groups now have help desks, technical support, payroll processing, and subcontractors, according to Marty Edwards, vice president of operational technology security at Maryland-based cyber-security company Tenable.

“They are essentially full-fledged criminal corporations operating in the digital world.”

"If reports are accurate, the Colonial Pipeline incident has all of the markings of a possible ransomware attack that began in the IT environment and, out of precaution, forced the operator to shut down operations,” added Mr Edwards.

In 2012, the Shamoon virus attack on Saudi Aramco systems wiped the hard drives of some 30,000 computers clean.

The attacks were blamed on Iran, which denied responsibility.

In 2017, a $20 billion petrochemical project joint venture between Saudi Aramco and Dow Chemicals also experienced a spate of hacking attacks.

The financial fallout from cyber attacks in the Arabian Gulf in 2017 was estimated at more than $1bn, according to a 2018 report by Siemens. Three-quarters of regional oil and gas companies, or over 30 per cent of the global production of oil, have experienced some form of cyber-security breach in the past, according to DarkMatter, a UAE-based cyber security company.

The financial fallout from data breaches among a selected sample of companies in the UAE and Saudi Arabia rose 9.4 per cent, costing them $6.53m per breach, according to a 2020 study by IBM Security.

In 2017, Saudi Arabia, Opec's biggest producer, established the National Cybersecurity Authority (NCA) to combat cyber threats.

The UAE rolled out its first National Cybersecurity Strategy in 2019, followed by the formation of National Cybersecurity Council to develop policies and laws to strengthen cyber security and ensure the country is not vulnerable to attacks.

In December, Dubai Electronic Security Centre rolled out a cyber resilience plan that aims to safeguard the emirate's critical infrastructure including oil and gas sector. In June, Injazat opened a Cyber Fusion Centre in Abu Dhabi, expanding its cyber defence abilities and portfolio of services.

In the Middle East, companies such as Saudi Aramco, the world's largest exporter of oil, are enforcing stricter compliance on third-party vendors to ensure their facilities are protected against cyber attacks, that could impact the supply of oil globally.

Suppliers including general vendors and those specialising in outsourced infrastructure, customised software, network connectivity, and critical data processors need to obtain Saudi Aramco's cyber security standard certification.

.
.
Who is Tim-Berners Lee?

Sir Tim Berners-Lee was born in London in a household of mathematicians and computer scientists. Both his mother, Mary Lee, and father, Conway, were early computer scientists who worked on the Ferranti 1 - the world's first commercially-available, general purpose digital computer. Sir Tim studied Physics at the University of Oxford and held a series of roles developing code and building software before moving to Switzerland to work for Cern, the European Particle Physics laboratory. He developed the worldwide web code as a side project in 1989 as a global information-sharing system. After releasing the first web code in 1991, Cern made it open and free for all to use. Sir Tim now campaigns for initiatives to make sure the web remains open and accessible to all.

COMPANY%20PROFILE
%3Cp%3E%3Cstrong%3ECompany%20name%3A%3C%2Fstrong%3E%20The%20Cloud%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStarted%3A%3C%2Fstrong%3E%202018%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EFounders%3A%3C%2Fstrong%3E%20George%20Karam%20and%20Kamil%20Rogalinski%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20Hub71%2C%20Abu%20Dhabi%2C%20UAE%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EIndustry%3A%3C%2Fstrong%3E%20Food%20technology%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EFunding%20size%3A%3C%2Fstrong%3E%20%2410m%2B%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EInvestors%3A%3C%2Fstrong%3E%20Middle%20East%20Venture%20Partners%2C%20Olayan%20Financing%2C%20Rua%20Growth%20Fund%3C%2Fp%3E%0A
Three ways to boost your credit score

Marwan Lutfi says the core fundamentals that drive better payment behaviour and can improve your credit score are:

1. Make sure you make your payments on time;

2. Limit the number of products you borrow on: the more loans and credit cards you have, the more it will affect your credit score;

3. Don't max out all your debts: how much you maximise those credit facilities will have an impact. If you have five credit cards and utilise 90 per cent of that credit, it will negatively affect your score.

Scream%20VI
%3Cp%3E%3Cstrong%3EDirectors%3A%3C%2Fstrong%3E%20Matt%20Bettinelli-Olpin%20and%20Tyler%20Gillett%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStars%3A%3C%2Fstrong%3E%20Melissa%20Barrera%2C%20Jasmin%20Savoy%20Brown%2C%20Jack%20Champion%2C%20Dermot%20Mulroney%2C%20Jenna%20Ortega%2C%20Hayden%20Panettiere%20and%20Courteney%20Cox%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%203%2F5%3C%2Fp%3E%0A
'Munich: The Edge of War'

Director: Christian Schwochow

Starring: George MacKay, Jannis Niewohner, Jeremy Irons

Rating: 3/5

Dengue%20fever%20symptoms
%3Cp%3EHigh%20fever%20(40%C2%B0C%2F104%C2%B0F)%3Cbr%3ESevere%20headache%3Cbr%3EPain%20behind%20the%20eyes%3Cbr%3EMuscle%20and%20joint%20pains%3Cbr%3ENausea%3Cbr%3EVomiting%3Cbr%3ESwollen%20glands%3Cbr%3ERash%26nbsp%3B%3C%2Fp%3E%0A
RESULT

Brazil 2 Croatia 0
Brazil: 
Neymar (69'), Firmino (90' 3)    

The burning issue

The internal combustion engine is facing a watershed moment – major manufacturer Volvo is to stop producing petroleum-powered vehicles by 2021 and countries in Europe, including the UK, have vowed to ban their sale before 2040. The National takes a look at the story of one of the most successful technologies of the last 100 years and how it has impacted life in the UAE.

Read part three: the age of the electric vehicle begins

Read part two: how climate change drove the race for an alternative 

Read part one: how cars came to the UAE

THE SPECS

Engine: 6.75-litre twin-turbocharged V12 petrol engine 

Power: 420kW

Torque: 780Nm

Transmission: 8-speed automatic

Price: From Dh1,350,000

On sale: Available for preorder now

IF YOU GO

The flights

FlyDubai flies direct from Dubai to Skopje in five hours from Dh1,314 return including taxes. Hourly buses from Skopje to Ohrid take three hours.

The tours

English-speaking guided tours of Ohrid town and the surrounding area are organised by Cultura 365; these cost €90 (Dh386) for a one-day trip including driver and guide and €100 a day (Dh429) for two people. 

The hotels

Villa St Sofija in the old town of Ohrid, twin room from $54 (Dh198) a night.

St Naum Monastery, on the lake 30km south of Ohrid town, has updated its pilgrims' quarters into a modern 3-star hotel, with rooms overlooking the monastery courtyard and lake. Double room from $60 (Dh 220) a night.

 

How to avoid crypto fraud
  • Use unique usernames and passwords while enabling multi-factor authentication.
  • Use an offline private key, a physical device that requires manual activation, whenever you access your wallet.
  • Avoid suspicious social media ads promoting fraudulent schemes.
  • Only invest in crypto projects that you fully understand.
  • Critically assess whether a project’s promises or returns seem too good to be true.
  • Only use reputable platforms that have a track record of strong regulatory compliance.
  • Store funds in hardware wallets as opposed to online exchanges.
Key figures in the life of the fort

Sheikh Dhiyab bin Isa (ruled 1761-1793) Built Qasr Al Hosn as a watchtower to guard over the only freshwater well on Abu Dhabi island.

Sheikh Shakhbut bin Dhiyab (ruled 1793-1816) Expanded the tower into a small fort and transferred his ruling place of residence from Liwa Oasis to the fort on the island.

Sheikh Tahnoon bin Shakhbut (ruled 1818-1833) Expanded Qasr Al Hosn further as Abu Dhabi grew from a small village of palm huts to a town of more than 5,000 inhabitants.

Sheikh Khalifa bin Shakhbut (ruled 1833-1845) Repaired and fortified the fort.

Sheikh Saeed bin Tahnoon (ruled 1845-1855) Turned Qasr Al Hosn into a strong two-storied structure.

Sheikh Zayed bin Khalifa (ruled 1855-1909) Expanded Qasr Al Hosn further to reflect the emirate's increasing prominence.

Sheikh Shakhbut bin Sultan (ruled 1928-1966) Renovated and enlarged Qasr Al Hosn, adding a decorative arch and two new villas.

Sheikh Zayed bin Sultan (ruled 1966-2004) Moved the royal residence to Al Manhal palace and kept his diwan at Qasr Al Hosn.

Sources: Jayanti Maitra, www.adach.ae