Original Release Date: 9/2/2015
TLP: WHITE
The NJCCIC assesses with high confidence the cyber risk to the oil and gas industry is high and the energy sector at large is a priority target of foreign intelligence services. While state-sponsored groups have demonstrated the capability to launch cyberattacks that cause physical damage to energy infrastructure, New Jersey’s energy sector is most likely to face reconnaissance and intelligence collection activities aimed at exfiltrating data and establishing persistence on high-value networks, for potential use in future sabotage operations. New Jersey’s high risk level is largely due to its significance as a major distribution center for petroleum products throughout the Northeast; the Nation’s largest production pipeline terminates in Linden and the State is home to three operating oil refineries and five key interstate natural gas carrier pipelines. Additionally, the consequences of a destructive cyberattack on oil and gas resources range from significant financial loss for the private sector to potential physical and economic impacts on the affected municipalities. According to security firm Symantec, 43% of global mining, oil, and gas companies were victims of at least one cyberattack in 2014, and the Ponemon Institute found that, on average, energy companies lose $13.2 million annually from the impact of cyber incidents, higher than any other industry.
One of the most common issues across critical infrastructure sectors is the poor segmentation of corporate and operational networks, as well as internet-connected SCADA devices. Attackers are able to gain access to a corporate network, often through spear-phishing or strategic web compromises, then move laterally to the intended target by compromising user credentials or exploiting existing vulnerabilities in software or hardware.
The NJCCIC recommends all asset owners implement the best practices outlined by ICS-CERT and the National Security Agency to secure ICS/SCADA systems, including network segmentation, strong authentication and encryption policies, and a defined process to deploy patches to all systems and software as soon as available.
Traffic Light Protocol: WHITE information may be distributed without restriction.