It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Several natural gas pipeline operators in the United States have been affected by a cyberattack that hit a third-party communications system, but the incident does not appear to have impacted operational technology.
Energy Transfer Partners was the first pipeline company to report problems with its Electronic Data Interchange (EDI) system due to a cyberattack that targeted Energy Services Group, specifically the company’s Latitude Technologies unit.
EDI is a platform used by businesses to exchange documents such as purchase orders and invoices. In the case of energy firms, the system is used to encrypt, decrypt, translate, and track key energy transactions. Latitude says it provides EDI and other technology services to more than 100 natural gas pipelines, storage facilities, utilities, law firms, and energy marketers across the U.S.
At least four U.S. pipeline companies have seen their electronic systems for communicating with customers shut down over the last few days, with three confirming it resulted from a cyberattack.
On Tuesday, Oneok Inc., which operates natural gas pipelines in the Permian Basin in Texas and the Rocky Mountains region, said it disabled its system as a precaution after determining that a third-party provider was the “target of an apparent cyberattack."
A day earlier, Energy Transfer Partners LP, Boardwalk Pipeline Partners LP, and Chesapeake Utilities Corp.’s Eastern Shore Natural Gas reported communications breakdowns, with Eastern Shore saying its outage occurred on March 29. The Department of Homeland Security, which said Monday it was gathering information about the attacks, had no immediate comment Tuesday
While the EDI systems may be entry points for hackers, they are likely not the ultimate target, said Jim Guinn, managing director and global cybersecurity leader for energy, utilities, chemicals and mining at Accenture Plc, a technology consulting company.
“There is absolutely nothing of intrinsic value for someone to infiltrate the EDI other than to navigate a network to do something more malicious," Guinn said by telephone Tuesday. "All bad actors are looking for a way to get into the museum to go steal the Van Gogh painting."
He also said there is nothing inherently different about oil and gas EDI systems.
Not First Time
This isn’t the first time U.S. pipelines have been targeted. In 2012, a federal cyber response team said in a note that it had identified a number of “cyber intrusions” targeting natural gas pipeline sector companies. The group, the Industrial Control Systems Cyber Emergency Response Team, is a division of Homeland Security.
“It’s important to recognize that this does not appear to be an attack on an operational system,” said Cathy Landry, a spokeswoman for the Interstate Natural Gas Association of America. “An attack on a network certainly is inconvenient and can be costly, and something any company – whether a retailer, a bank or a media company -- wants to avoid, but there is no threat to public safety or to natural gas deliveries.”
She said she “cannot speak for any of the companies specifically about what may or may not have happened to their systems.”
originally posted by: carewemust
a reply to: Vasa Croe
Looks like "progress" has been made by the hackers since that April article you linked to. If they hack into pressure valves at Nuclear Plants, catastrophe would result.
originally posted by: Guyfriday
Some sources are saying that this isn't a test run, but the actual event. Personally I'm going to wait till an investigation is conducted to see what is/isn't being talked about.
EDI is a platform used by businesses to exchange documents such as purchase orders and invoices. In the case of energy firms, the system is used to encrypt, decrypt, translate, and track key energy transactions.
originally posted by: Vasa Croe
originally posted by: Guyfriday
Some sources are saying that this isn't a test run, but the actual event. Personally I'm going to wait till an investigation is conducted to see what is/isn't being talked about.
I am not sure they would announce it if it is found to be a hack. That would create pandemonium around the US if people think their house could just blow up at any time.
originally posted by: roadgravel
EDI is a platform used by businesses to exchange documents such as purchase orders and invoices. In the case of energy firms, the system is used to encrypt, decrypt, translate, and track key energy transactions.
I have done software work on nat gas EDI & power systems. It would have no relationship to control systems.
I don't doubt there are those working to get access in control systems though.
originally posted by: DBCowboy
a reply to: Vasa Croe
I hope that you are wrong and this was just a terrible tragedy.
originally posted by: DBCowboy
Now I'm no smart guy. . . but could those "smart meters" be hackable?
originally posted by: Guyfriday
originally posted by: DBCowboy
Now I'm no smart guy. . . but could those "smart meters" be hackable?
There's a joke in there I know it.
Here is a quick looking loo on google:
IoT agenda
Computer World
Sorry for the fear of it all, but it's a reality we live in.
originally posted by: SouthernForkway26
The only way a hack could blow up a house is if a gas appliance was connected to the internet, and the appliance was remotely hacked to release gas in the house until something set it off. I have installed a gas oven with Bluetooth so maybe somebody found a way to plant a virus in them... Hacking gas distributors will not cause an explosive situation in people's houses.
Most likely these explosions are the result of coincidental failure of components, or sabatoge by somebody physically inside the houses.