Four US gas pipeline data systems shut down as cyberattack hits
Four US pipeline firms said their electronic systems for communicating with customers were shut down over the last few days, with three confirming it resulted from a cyberattack
New York/Houston: Four US pipeline companies have reported their electronic systems for communicating with customers were shut down over the last few days, with three confirming it resulted from a cyberattack.
On Tuesday, Oneok Inc., which operates natural gas pipelines in the Permian Basin in Texas and the Rocky Mountain region, said it disabled its system as a precaution after determining that a third-party provider was the “target of an apparent cyberattack.”
A day earlier, Energy Transfer Partners LP, Boardwalk Pipeline Partners LP, and Chesapeake Utilities Corp.’s Eastern Shore Natural Gas reported breakdowns, with Eastern Shore saying its occurred 29 March. The Department of Homeland Security, which said Monday it was gathering information about the attacks, had no immediate comment Tuesday.
“We do not believe any customer data was compromised,” said the Latitude Technologies unit of Energy Services Group, which Energy Transfer and Eastern Shore both identified as their third-party provider. “We are investigating the re-establishment of this data,” Latitude said in a message to customers.
The attacks follow a US government warning in March that Russian hackers are conducting an assault on the US electric grid and other targets. Last month, Atlanta’s government was hobbled by a ransomware attack.
Computer to computer
The electronic systems help pipeline customers communicate their needs with operators, using a computer-to-computer exchange of documents. Energy Transfer said the electronic data interchange system provided by Latitude was back up and working Monday night. The business wasn’t otherwise affected, spokeswoman Vicki Granado said in an email.
Eastern Shore Natural Gas’s Latitude system was restored on Monday as well, the company said in a notice to customers.
The shutdowns are “not operationally serious in the sense that it’s stopping the natural gas from moving, but it is serious because it’s causing these companies to use workarounds for communication,” said Rae McQuade, president of the North American Energy Standards Board in Houston, which is responsible for developing industry standards.
“If somebody is running a business that has some kind of critical asset to it—pipelines, energy, finance—those networks are going to be targets; those networks have been targets,” said John Harbaugh, chief operating officer at R9B, a Colorado Springs, Colorado, cyber security solutions provider.
Many of the 3 million miles of pipelines that spread across America rely on third-party companies for their electronic communication systems, Andy Lee, senior partner at Jones Walker LLP in New Orleans, said by telephone Tuesday. In turn, they depend on those companies to provide security for those systems from attacks.
Latitude is “very well known in the industry, ” the energy board’s McQuade said. “They have a lot of clients, they are very well respected.”
In addition to providing EDI services, Latitude also hosts websites used by about 50 pipelines for posting notices to customers—websites that went down on 29 March and didn’t start returning until Monday, Dan Spangler, pipeline manager for data provider Genscape Inc. in Boulder, Colorado. “Although all of the sites are back up now, many of them are still missing” data for 30 March and 1 April, he said.
“Other than Energy Transfer pipes and the pipelines hosted by Latitude, we haven’t seen any issues with gas data,” Spangler said.
The systems are gaining attention from hackers because they’ve proven to be “low-hanging” fruit that creates an opportunity for ransomware or to sell the information on the dark web, Lee said.
While the EDI systems may be entry points for hackers, they are likely not the ultimate target, said Jim Guinn, managing director and global cybersecurity leader for energy, utilities, chemicals and mining at Accenture PLC, a technology consulting company.
“There is absolutely nothing of intrinsic value for someone to infiltrate the EDI other than to navigate a network to do something more malicious,” Guinn said by telephone Tuesday. “All bad actors are looking for a way to get into the museum to go steal the Van Gogh painting.”
He also said there is nothing inherently different about oil and gas EDI systems.
Not first time
This isn’t the first time US pipelines have been targeted. In 2012, a federal cyber response team said in a note that it had identified a number of “cyber intrusions” targeting natural gas pipeline sector companies. The group, the Industrial Control Systems Cyber Emergency Response Team, is a division of Homeland Security.
“It’s important to recognize that this does not appear to be an attack on an operational system,” said Cathy Landry, a spokeswoman for the Interstate Natural Gas Association of America. “An attack on a network certainly is inconvenient and can be costly, and something any company – whether a retailer, a bank or a media company—wants to avoid, but there is no threat to public safety or to natural gas deliveries.”
She said she “cannot speak for any of the companies specifically about what may or may not have happened to their systems.” Bloomberg
Editor's Picks »
- Opinion | Behind Assam’s present fault line lies a divided past
- Rahul Gandhi to campaign in Telangana on 20 October
- Palaniswami turns to PM Modi over Tamil Nadu fishermen held captive in Sri Lanka
- As poll battle intensifies, PM Modi to address 20 meetings in 3 states
- Number of Zika cases rises to 80 in Jaipur