I hope you enjoyed the previous articles of this series (Upstream Cyber Security and Oil and Gas Cyber Security 101). Today our topic is OT and ICS with a special focus on the Midstream sector.
I hope you enjoyed my previous Oil and Gas Cyber Security article. This time, I would like to tell you about the first aspect of the Oil and Gas security landscape in detail.
The Oil and Gas Security consists of IT Security, OT Security, and connections between them. Today’s topic is OT Security. As this area cannot be covered by one article, we will start with the upstream segment. The most critical risks which company will face if somebody gets unauthorized access to Oil and Gas companies’ infrastructure are the following:
Recently, I’ve published a post in the form of Interview about Oil and Gas Cyber Security and it received a lot of attention.
It seems that nowadays researchers are really interested in learning more about industries they analyze. You know, some years ago it used to be much simpler. A company hired a specialist who has some pentesting skills and who can examine if their systems are vulnerable. Those specialists used some pentesting tools, then, if they are good specialists, they checked for vulnerabilities manually, escalated privileges and, as a result, wrote a report about vulnerabilities they discovered. It looked like “we found an X vulnerability on the server Y”. It was enough to know that hackers could penetrate into the system as pentesters could, and it was very impressive to provide just a list of vulnerabilities.
At BlackHat Europe, Alexander Polyakov, CTO at ERPScan, and Mathieu Geli delivered a presentation detailing cybersecurity issues and misconfigurations affecting the oil and gas industry. In the interview, they highlighted particular vulnerabilities in SAP and Oracle and described how they can provide a route inside a company.