SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 1
Protecting
THE OIL & GAS
INDUSTRY
FROM EMAIL THREATS
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 1
Abstract: Given the oil and gas industry’s critical nature, valuable intellectual
property and high-value transactions, the threat of cyber-attacks is very real. It is
vitally important that the oil and gas industry better protect their organizations
from modern day email threats by implementing advanced email management
and threat protection technologies. The investment required for preventative
measures is dwarfed by the risk of a security breach.
According to a recent report from the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT),
the energy sector, including oil and gas, is facing a significant rise in cyber attacks (Galea, 2015). There are a
number of reasons that this industry is an ideal target for attack: Oil and gas pipelines are part of a country’s critical
infrastructure, and they are an ideal target for those looking to cause disruptions in critical services for political or
military motives; The industry is highly competitive, as both private enterprise and countries engage in aggressive
market share tactics, often with global implications; Intellectual property is highly-valued, making it an attractive
target for cyber-espionage. Finally, the sheer value of the oil and gas industry’s commodities make it an especially
lucrative target. With producer and broker transactions ranging in the millions, one carefully crafted attack can lead
to a payout that could support the hacker’s operations for months, or even years.
Spear phishing attacks are socially engineered emails that try to trick employees into triggering network breaches,
conducting fraudulent wire transfers, or even aiding in corporate espionage. Regardless of motivation, the high
volume of business communications conducted via email within this industry give hackers quite the window of
opportunity to intercept sensitive information through the use of spear phishing, including log-in credentials,
reserve records, order forms, broker correspondences, and other documents which can then later be used to
defraud unsuspecting industry professionals.
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 2
This white paper describes spear phishing attacks that have occurred in various sectors of oil and gas, along with
recommendations on how the industry can boost their cyber security and specifically adopt new preventative
measures to protect against these and other email-borne threats.
	 1. Government Warnings: Critical Infrastructure Disruption
Politically-motivated hacker groups sometimes target state-owned facilities by breaching a point within the supply
chain in order to hinder the nation’s ability to obtain, transport, and store energy resources. Other rogue political
groups use phishing attacks to gain access to privileged information to pose as corporate decision makers in order
to delude, debunk, or destroy a nation’s oil and gas industry. A data breach at any point in an energy supply chain,
or within a bureaucratic organization, can cause severe damage to infrastructure, put public safety in jeopardy, or
even sway the balance of international negotiations.
For instance, new evidence showed that a Turkish pipeline explosion that occurred in 2008 was caused by hackers
who injected malware into the system through the pipeline’s wireless network. The pipeline was thought to be one
of the most secure in the world, but hackers were able to successfully destroy the pipeline by injecting malware
(Brocklehurts, 2014). Although the malware used in this attack wasn’t delivered via email, it does provide a stark
warning about the physical damages that could be inflicted via cyber-attack.
United States
In April of 2012, the Industrial Control Systems - Cyber Emergency Response Team (ICS – CERT), issued a statement
in their monthly report regarding their investigation of a year-long campaign to try to infiltrate multiple natural gas
pipelines. ICS-CERT analysis found that the malware used and artifacts associated with these cyber-attacks were
tied to a single spear phishing campaign, from a single source or group, and had been attempting to disrupt the
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 3
control systems of the pipelines (ICS, 2012). Approximately 200,000 miles of these natural gas pipelines are
responsible for over 25 percent of the nation’s energy supply, and so threats to this infrastructure are taken
very seriously by the federal government.
Norway
In August of 2014, Norway’s national security authority (Nasjonal Sikkerhetsmyndighet – NSM) stated that 250 oil
sector organizations may have been breached by hacker groups while 50 of those organizations had confirmed
data breaches. All of the breaches were reported to be the result of targeted spear phishing attacks in 2011
(Leyden, 2014). When asked to comment on the largest breach in Norwegian history, NSM Director Kjetil Nilsen
told a local publication that, “The ability to attack [networks] is increasing and there is great interest for our data”.
The main source or method of the 2014 attacks remains unclear, but apparently this type of attack has happened
to Norwegian oil companies before. Three years ago, hacker groups used spear phishing emails to obtain industrial
drawings, contracts, as well as log-in credentials (Ibid).
	 2. Loziak Trojan: Corporate Espionage
Corporations in highly competitive industries may have incentives to obtain sensitive trade information about their
competitors in order to gain a strategic advantage. In March of 2015, Symantec reported that hackers have been
targeting energy industry workers with malicious spear phishing emails. The campaign primarily targeted OPEC,
specifically the UAE, Kuwait, and Saudi Arabia, but has also affected the United States, UK, and Uganda. The
intended targets and method of attack made those at Symantec believe that industrial espionage was the motive.
Stating that “whoever is behind these attacks may have a strategic interest in the affairs of the companies affected”
(Hacket, 2015). The Trojan used in the attack, Loziak, was able to masquerade as an Excel spreadsheet, in order to
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 4
spread strains of malware designed to observe and report device data. Once downloaded, the malware would steal
sensitive information such as system configuration data and send it back to its source. The configuration data told
the source whether or not the infected device was a valuable target. If the hackers decided that the device was
worth targeting, they would then forward additional malware to that targeted device in order to strip it of more
information. In this case, the Loziak Trojan was followed by Back.door.cyberat and Trojan.Zbot.
Once the Loziak Trojan was able to infect, inspect, and transmit data, it opened up new backdoors on the system in
case additional breaches were needed in the future. In order to repair the damage done, administrators would
have to patch each new backdoor in order to limit future exploits (Hacket, 2015).
	 3. The Phantom Menace: Fraud
Targeted attacks impacting oil and gas organizations usually focus on the big-ticket transactions inherent to the
industry, and seek to capitalize on their efforts by deluding the victims into sending them large deposits for oil
orders. Panda Security, a leading computer software company in Spain, investigated a targeted attack that
employed or used a fake .pdf containing compressed files, encryption instructions, and files designed to affect the
registry of the device each time the system restarted (Operation Oil Tanker, 2015) . The file, later referred to as the
Phantom Menace, was a self-extracting executable file capable of bypassing the latest malware behavior filters and
leaking sensitive personnel information and corporate resources in a text file back to the original sender. This
attack was very troubling because of its ability to remove traces of its actions from the registry, allowing it to do the
damage and leave little to no clues. With the sensitive information and resources in hand, hackers were easily able
to pose as legitimate oil producers who were offering extremely competitive oil prices­—prices that seemed
especially attractive given Saudi Arabia’s dominance of the market at that time. The Phantom Menace hackers used
the order forms and business insights to craft an illusion that they were, in fact, a legitimate oil producer. The oil
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 5
brokers were then prompted to pay an “advance fee” in order to finalize their crude and refined orders. However,
once the advance fee or deposit was sent, neither their oil nor their contact to the oil producer could
ever be found.
Even if oil brokers, producers, and distributors use antivirus, anti-malware, and the necessary endpoint protections,
they are still vulnerable to socially engineered attacks via email. The human component of receiving and opening a
seemingly harmless email can leave an entire organization’s resources and strategies open to prying eyes. Those at
Panda Security said that for those in the oil and gas industry:
“It is important to understand that our defense systems must adapt
to the level of attack received, and so it is necessary to implement
new protection strategies that give organizations total control and
visibility over their networks.”
The most concerning fact to the antivirus research community and those at Panda Security, was not only that the
Phantom Menace was able to avoid detection, but also that it was able to extract all the information it needed
without utilizing any malware. The only point of prevention hinged on the ability of the user to somehow know that
the senders were impostors. However, there are few security solutions available to comprehensively protect
against a socially engineered attack like the Phantom Menace.
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 6
Email Protection Solutions
Phishing attacks against oil and gas can have various motives, from committing espionage and fraud to causing
critical infrastructure and supply chain disruptions. Though there may not be a single silver-bullet solution to
secure an organization’s network from all of these potential motives, protecting the organization from targeted
attacks is not impossible, and it doesn’t have to cost a fortune.
Investing in an advanced security architecture now may save a corporation from targeted attacks in the future. As
the risks associated with not investing in one can lead to losses in revenue, market share, and reputation, the costs
of recovery far outweigh the initial investment in preventative measures.
In order to combat the growing challenges of protecting against orchestrated email scams, oil and gas
professionals should look for email security systems that use advanced threat detection and prevention, and are
equipped to detect spear phishing scams. Traditional email security products are typically not designed to detect
and block spear phishing attacks, and most spam filtering products rely on prior detection and black lists in order
to flag an email as spam. Also, many spear phishing attacks make use of unknown threats or zero-day
vulnerabilities that not all anti-malware engines will be able to detect. Organizations can improve their email threat
protection by taking the following precautions:
Use Multiple Anti-malware Engines: Multi-scanning leverages the power of the different detection algorithms
and heuristics of multiple engines, therefore increasing detection of both known and unknown threats, as well as
protecting against attacks designed to circumvent particular antivirus engines. In addition, since anti-malware
vendors address different threats at different times, using multiple scan engines will help detect new outbreaks
much faster. It is important to distinguish between multi-scanning and simply using multiple antivirus engines.
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 7
When using multi-scanning technology, performance is greatly enhanced and potential conflicts between different
engines are avoided.
Sanitize Email Attachments: Many spear phishing emails include malicious Word or PDF attachments, so as a
precautionary measure it is highly recommended to sanitize incoming email attachments in order to remove any
embedded threats that may go undetected by antivirus engines.
Set Attachment Limits: By blocking potentially dangerous email attachment types such as .exe files and scripts, it
is more difficult for malware to spread. It is also important to verify the attachment file type so that .exe files that
are renamed as .txt files do not get through the company’s filters.
Enforce an Email Content Policy: With user-based email content policies, such as keyword and attachment
filtering, organizations can ensure that no confidential content or intellectual property is sent out through email.
Implement an SFT Server: A secure file transfer server allows an organization to easily send and receive large
and confidential files ensuring trackable, instant, and secure delivery. By encrypting files and implementing user
authentication, the interception of potentially valuable information can be prevented.
Utilize Advanced Threat Detection and Prevention: Ultimately, organizations need to make sure their email
security system is backed by powerful anti-malware engines, as the performance of the email security program will
hinge on the engine’s ability to detect, prevent, sanitize, or quarantine the suspicious email or attachment.
Scan Running Processes on Endpoints: If email-born threats have already entered your network, scanning
running processes and DLLs on both in-network and remote endpoints helps to identify malware before it spreads.
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 8
By having these added layers of security incorporated into the organization’s email security infrastructure, those in
the oil and gas industry can better protect themselves from targeted email attacks, and not risk losing millions to
fraud, or having to conduct costly image campaigns.
About OPSWAT
OPSWAT is a San Francisco-based software company that provides solutions to secure and manage IT
infrastructure. Founded in 2002, OPSWAT delivers solutions that provide manageability of endpoints and networks,
and helps organizations protect against spear phishing and other email threats. OPSWAT’s intuitive applications
and comprehensive development kits are deployed by SMB, enterprise, and OEM customers to more than 100
million endpoints worldwide.
Policy Patrol Security for Exchange protects an organization’s email traffic from known and unknown threats and
provides organizations with advanced features for blocking spear phishing and unwanted emails, detecting and
preventing viruses and other email-borne threats, as well as enforcing email content policy.
It offers effective spam & phishing protection, using technologies such as greylisting, anti-phishing block lists,
DNSBL, Bayesian filtering, recipient verification and Sender Policy Framework (SPF) to block unwanted emails and
detect spoofed emails.
Using Metascan®, Policy Patrol also allows organizations to quickly scan email attachments with multiple antivirus
engines, detecting and blocking advanced malware threats in emails. By using antivirus engines from vendors like
Symantec, ESET, McAfee, and many others, Metascan technology increases detection rates for all types of malware
without the hassle of licensing and maintaining multiple antivirus engines. Engines integrated into Metascan are
optimized to scan simultaneously for fast, high performance scanning. In addition to malware scanning, Metascan
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 9
can also perform email attachment file sanitization and file type checking, preventing zero-day and targeted
attacks. Policy Patrol Security for Exchange includes Metascan with 1, 4, or 8 anti-malware engines, with the option
to add more anti-malware engines.
OPSWAT Gears enables organizations to directly assess and manage the endpoint security posture of their devices
through a unified view of mobile and PC endpoints, and their applications/security issues. Administrators can to
take rapid action to remediate issues on non-compliant devices and improve endpoint security.
Additionally, Gears utilizes OPSWAT’s Metascan Online technology to scan running processes and DLLs for both
in-network and remote devices with 40+ commercial anti-malware engines. This way Gears can help identify threats
that were not detected by the installed antivirus software.
References
Brocklehurst, K. (2015, February 1). Cyberterrorists Attack on Critical Infrastructure Could Be Imminent.
Retrieved September 23, 2015, from http://www.tripwire.com/state-of-security/security-data-protection/
security-controls/cyberterrorists-attack-on-critical-infrastructure-could-be-imminent/
Galea, D. (2015, March 31). How the Energy Industry can Survive Targeted Attacks.
Retrieved September 25, 2015, from https://www.opswat.com/blog/how-energy-industry-can-survive-
targeted-attacks
Hundreds of Norwegian Energy Companies Hit by Cyberattacks. (2014, August 28).
Retrieved September 1, 2015, from http://www.scmagazineuk.com/hundreds-of-norwegian-energy-
companies-hit-by-cyber-attacks/article/368539/
PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 10
ICS-Cert. Malware infections in the Control Environment. (2012, December 10).
Retrieved September 1, 2015, from https://ics-cert.us-cert.gov/sites/default/files/ICS-CERT_Monthly_Monitor_
Oct-Dec2012_2.pdf
Leyden, J. (2014, August 27). Major cyber-attack hits Norwegian oil industry.
Retrieved September 1, 2015, from http://www.theregister.co.uk/2014/08/27/nowegian_oil_hack_campaign/
Corrons, L. (2015, May 19). Operation “Oil Tanker” - The Phantom Menace.
Retrieved September 1, 2015, from http://www.pandasecurity.com/mediacenter/src/uploads/2015/05/oil-
tanker-en.pdf
http://www.opswat.com
Disclaimer. © 2015. OPSWAT, Inc. (“OPSWAT”). All rights reserved. All product and company names herein may be trademarks of their respective owners.
The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied,
including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. OPSWAT is not liable for any damages,
including any consequential damages, of any kind that may result from the use of this document. Though reasonable effort has been made to ensure the accuracy of
the data provided, OPSWAT makes no claim, promise or guarantee about the completeness, accuracy and adequacy of information and is not responsible for misprints,
out-of-date information, or errors. OPSWAT makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of
any information contained in this document.
If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.

Weitere ähnliche Inhalte

Was ist angesagt?

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec
 
7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thr7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thrsmile790243
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015CheapSSLUSA
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 
Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Panda Security
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkJames Deiotte
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Mehrdad Jingoism
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?David Hunt
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017Dryden Geary
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideRoen Branham
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Waqas Amir
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 

Was ist angesagt? (20)

Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence Report
 
7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thr7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thr
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa framework
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a ride
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 

Ähnlich wie Protecting the Oil and Gas Industry from Email Threats

wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industryNumaan Huq
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityJohn Kingsley
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityiFluidsEng
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical IndustryIJRTEMJOURNAL
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...Fas (Feisal) Mosleh
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...online Marketing
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationMaaz Ahmed Shaikh
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisIJERD Editor
 

Ähnlich wie Protecting the Oil and Gas Industry from Email Threats (20)

wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Retail
Retail Retail
Retail
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 

Mehr von OPSWAT

Preventing Known and Unknown Threats
Preventing Known and Unknown ThreatsPreventing Known and Unknown Threats
Preventing Known and Unknown ThreatsOPSWAT
 
How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsOPSWAT
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear FacilitiesOPSWAT
 
3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations3 Cases for Quarantine Confirgurations
3 Cases for Quarantine ConfirgurationsOPSWAT
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftOPSWAT
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation SummitOPSWAT
 
Top 10 Facts About Data Breaches
Top 10 Facts About Data BreachesTop 10 Facts About Data Breaches
Top 10 Facts About Data BreachesOPSWAT
 
Metascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxMetascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxOPSWAT
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data WorkflowOPSWAT
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureOPSWAT
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizationsOPSWAT
 
Introduction to OESIS Framework
Introduction to OESIS FrameworkIntroduction to OESIS Framework
Introduction to OESIS FrameworkOPSWAT
 
Introduction to Metascan Client
Introduction to Metascan ClientIntroduction to Metascan Client
Introduction to Metascan ClientOPSWAT
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning TechnologyOPSWAT
 
The Value of Multi-scanning
The Value of Multi-scanningThe Value of Multi-scanning
The Value of Multi-scanningOPSWAT
 

Mehr von OPSWAT (17)

Preventing Known and Unknown Threats
Preventing Known and Unknown ThreatsPreventing Known and Unknown Threats
Preventing Known and Unknown Threats
 
How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted Applications
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear Facilities
 
3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record Theft
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation Summit
 
Top 10 Facts About Data Breaches
Top 10 Facts About Data BreachesTop 10 Facts About Data Breaches
Top 10 Facts About Data Breaches
 
Metascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxMetascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for Linux
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data Workflow
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizations
 
Introduction to OESIS Framework
Introduction to OESIS FrameworkIntroduction to OESIS Framework
Introduction to OESIS Framework
 
Introduction to Metascan Client
Introduction to Metascan ClientIntroduction to Metascan Client
Introduction to Metascan Client
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning Technology
 
The Value of Multi-scanning
The Value of Multi-scanningThe Value of Multi-scanning
The Value of Multi-scanning
 

Kürzlich hochgeladen

Verified Trusted Kalyani Nagar Call Girls 8005736733 𝐈𝐍𝐃𝐄𝐏𝐄𝐍𝐃𝐄𝐍𝐓 Call 𝐆𝐈𝐑𝐋 𝐕...
Verified Trusted Kalyani Nagar Call Girls  8005736733 𝐈𝐍𝐃𝐄𝐏𝐄𝐍𝐃𝐄𝐍𝐓 Call 𝐆𝐈𝐑𝐋 𝐕...Verified Trusted Kalyani Nagar Call Girls  8005736733 𝐈𝐍𝐃𝐄𝐏𝐄𝐍𝐃𝐄𝐍𝐓 Call 𝐆𝐈𝐑𝐋 𝐕...
Verified Trusted Kalyani Nagar Call Girls 8005736733 𝐈𝐍𝐃𝐄𝐏𝐄𝐍𝐃𝐄𝐍𝐓 Call 𝐆𝐈𝐑𝐋 𝐕...tanu pandey
 
GENUINE Babe,Call Girls IN Chhatarpur Delhi | +91-8377877756
GENUINE Babe,Call Girls IN Chhatarpur Delhi | +91-8377877756GENUINE Babe,Call Girls IN Chhatarpur Delhi | +91-8377877756
GENUINE Babe,Call Girls IN Chhatarpur Delhi | +91-8377877756dollysharma2066
 
Call Girls in Sakinaka Agency, { 9892124323 } Mumbai Vashi Call Girls Serivce...
Call Girls in Sakinaka Agency, { 9892124323 } Mumbai Vashi Call Girls Serivce...Call Girls in Sakinaka Agency, { 9892124323 } Mumbai Vashi Call Girls Serivce...
Call Girls in Sakinaka Agency, { 9892124323 } Mumbai Vashi Call Girls Serivce...Pooja Nehwal
 
DENR EPR Law Compliance Updates April 2024
DENR EPR Law Compliance Updates April 2024DENR EPR Law Compliance Updates April 2024
DENR EPR Law Compliance Updates April 2024itadmin50
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Hadapsar ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 8005736733 Starting From 5K to...SUHANI PANDEY
 
Call Girls Budhwar Peth Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Budhwar Peth Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Budhwar Peth Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Budhwar Peth Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
NO1 Verified kala jadu karne wale ka contact number kala jadu karne wale baba...
NO1 Verified kala jadu karne wale ka contact number kala jadu karne wale baba...NO1 Verified kala jadu karne wale ka contact number kala jadu karne wale baba...
NO1 Verified kala jadu karne wale ka contact number kala jadu karne wale baba...Amil baba
 
Call Girls Jejuri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Jejuri Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Jejuri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Jejuri Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Presentation: Farmer-led climate adaptation - Project launch and overview by ...
Presentation: Farmer-led climate adaptation - Project launch and overview by ...Presentation: Farmer-led climate adaptation - Project launch and overview by ...
Presentation: Farmer-led climate adaptation - Project launch and overview by ...AICCRA
 
Booking open Available Pune Call Girls Parvati Darshan 6297143586 Call Hot I...
Booking open Available Pune Call Girls Parvati Darshan  6297143586 Call Hot I...Booking open Available Pune Call Girls Parvati Darshan  6297143586 Call Hot I...
Booking open Available Pune Call Girls Parvati Darshan 6297143586 Call Hot I...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Budhwar Peth 6297143586 Call Hot Indi...
Booking open Available Pune Call Girls Budhwar Peth  6297143586 Call Hot Indi...Booking open Available Pune Call Girls Budhwar Peth  6297143586 Call Hot Indi...
Booking open Available Pune Call Girls Budhwar Peth 6297143586 Call Hot Indi...Call Girls in Nagpur High Profile
 
Call Now ☎️🔝 9332606886 🔝 Call Girls ❤ Service In Muzaffarpur Female Escorts ...
Call Now ☎️🔝 9332606886 🔝 Call Girls ❤ Service In Muzaffarpur Female Escorts ...Call Now ☎️🔝 9332606886 🔝 Call Girls ❤ Service In Muzaffarpur Female Escorts ...
Call Now ☎️🔝 9332606886 🔝 Call Girls ❤ Service In Muzaffarpur Female Escorts ...Anamikakaur10
 
RA 7942:vThe Philippine Mining Act of 1995
RA 7942:vThe Philippine Mining Act of 1995RA 7942:vThe Philippine Mining Act of 1995
RA 7942:vThe Philippine Mining Act of 1995garthraymundo123
 
Enhancing forest data transparency for climate action
Enhancing forest data transparency for climate actionEnhancing forest data transparency for climate action
Enhancing forest data transparency for climate actionRocioDanicaCondorGol1
 
Book Sex Workers Available Pune Call Girls Khadki 6297143586 Call Hot Indian...
Book Sex Workers Available Pune Call Girls Khadki  6297143586 Call Hot Indian...Book Sex Workers Available Pune Call Girls Khadki  6297143586 Call Hot Indian...
Book Sex Workers Available Pune Call Girls Khadki 6297143586 Call Hot Indian...Call Girls in Nagpur High Profile
 
Koregaon Park ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Read...
Koregaon Park ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Read...Koregaon Park ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Read...
Koregaon Park ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Read...tanu pandey
 
Get Premium Hoskote Call Girls (8005736733) 24x7 Rate 15999 with A/c Room Cas...
Get Premium Hoskote Call Girls (8005736733) 24x7 Rate 15999 with A/c Room Cas...Get Premium Hoskote Call Girls (8005736733) 24x7 Rate 15999 with A/c Room Cas...
Get Premium Hoskote Call Girls (8005736733) 24x7 Rate 15999 with A/c Room Cas...MOHANI PANDEY
 
Proposed Amendments to Chapter 15, Article X: Wetland Conservation Areas
Proposed Amendments to Chapter 15, Article X: Wetland Conservation AreasProposed Amendments to Chapter 15, Article X: Wetland Conservation Areas
Proposed Amendments to Chapter 15, Article X: Wetland Conservation Areas💥Victoria K. Colangelo
 
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 8005736733 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 8005736733 Cal...Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 8005736733 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 8005736733 Cal...SUHANI PANDEY
 

Kürzlich hochgeladen (20)

Green Marketing
Green MarketingGreen Marketing
Green Marketing
 
Verified Trusted Kalyani Nagar Call Girls 8005736733 𝐈𝐍𝐃𝐄𝐏𝐄𝐍𝐃𝐄𝐍𝐓 Call 𝐆𝐈𝐑𝐋 𝐕...
Verified Trusted Kalyani Nagar Call Girls  8005736733 𝐈𝐍𝐃𝐄𝐏𝐄𝐍𝐃𝐄𝐍𝐓 Call 𝐆𝐈𝐑𝐋 𝐕...Verified Trusted Kalyani Nagar Call Girls  8005736733 𝐈𝐍𝐃𝐄𝐏𝐄𝐍𝐃𝐄𝐍𝐓 Call 𝐆𝐈𝐑𝐋 𝐕...
Verified Trusted Kalyani Nagar Call Girls 8005736733 𝐈𝐍𝐃𝐄𝐏𝐄𝐍𝐃𝐄𝐍𝐓 Call 𝐆𝐈𝐑𝐋 𝐕...
 
GENUINE Babe,Call Girls IN Chhatarpur Delhi | +91-8377877756
GENUINE Babe,Call Girls IN Chhatarpur Delhi | +91-8377877756GENUINE Babe,Call Girls IN Chhatarpur Delhi | +91-8377877756
GENUINE Babe,Call Girls IN Chhatarpur Delhi | +91-8377877756
 
Call Girls in Sakinaka Agency, { 9892124323 } Mumbai Vashi Call Girls Serivce...
Call Girls in Sakinaka Agency, { 9892124323 } Mumbai Vashi Call Girls Serivce...Call Girls in Sakinaka Agency, { 9892124323 } Mumbai Vashi Call Girls Serivce...
Call Girls in Sakinaka Agency, { 9892124323 } Mumbai Vashi Call Girls Serivce...
 
DENR EPR Law Compliance Updates April 2024
DENR EPR Law Compliance Updates April 2024DENR EPR Law Compliance Updates April 2024
DENR EPR Law Compliance Updates April 2024
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Hadapsar ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 8005736733 Starting From 5K to...
 
Call Girls Budhwar Peth Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Budhwar Peth Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Budhwar Peth Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Budhwar Peth Call Me 7737669865 Budget Friendly No Advance Booking
 
NO1 Verified kala jadu karne wale ka contact number kala jadu karne wale baba...
NO1 Verified kala jadu karne wale ka contact number kala jadu karne wale baba...NO1 Verified kala jadu karne wale ka contact number kala jadu karne wale baba...
NO1 Verified kala jadu karne wale ka contact number kala jadu karne wale baba...
 
Call Girls Jejuri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Jejuri Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Jejuri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Jejuri Call Me 7737669865 Budget Friendly No Advance Booking
 
Presentation: Farmer-led climate adaptation - Project launch and overview by ...
Presentation: Farmer-led climate adaptation - Project launch and overview by ...Presentation: Farmer-led climate adaptation - Project launch and overview by ...
Presentation: Farmer-led climate adaptation - Project launch and overview by ...
 
Booking open Available Pune Call Girls Parvati Darshan 6297143586 Call Hot I...
Booking open Available Pune Call Girls Parvati Darshan  6297143586 Call Hot I...Booking open Available Pune Call Girls Parvati Darshan  6297143586 Call Hot I...
Booking open Available Pune Call Girls Parvati Darshan 6297143586 Call Hot I...
 
Booking open Available Pune Call Girls Budhwar Peth 6297143586 Call Hot Indi...
Booking open Available Pune Call Girls Budhwar Peth  6297143586 Call Hot Indi...Booking open Available Pune Call Girls Budhwar Peth  6297143586 Call Hot Indi...
Booking open Available Pune Call Girls Budhwar Peth 6297143586 Call Hot Indi...
 
Call Now ☎️🔝 9332606886 🔝 Call Girls ❤ Service In Muzaffarpur Female Escorts ...
Call Now ☎️🔝 9332606886 🔝 Call Girls ❤ Service In Muzaffarpur Female Escorts ...Call Now ☎️🔝 9332606886 🔝 Call Girls ❤ Service In Muzaffarpur Female Escorts ...
Call Now ☎️🔝 9332606886 🔝 Call Girls ❤ Service In Muzaffarpur Female Escorts ...
 
RA 7942:vThe Philippine Mining Act of 1995
RA 7942:vThe Philippine Mining Act of 1995RA 7942:vThe Philippine Mining Act of 1995
RA 7942:vThe Philippine Mining Act of 1995
 
Enhancing forest data transparency for climate action
Enhancing forest data transparency for climate actionEnhancing forest data transparency for climate action
Enhancing forest data transparency for climate action
 
Book Sex Workers Available Pune Call Girls Khadki 6297143586 Call Hot Indian...
Book Sex Workers Available Pune Call Girls Khadki  6297143586 Call Hot Indian...Book Sex Workers Available Pune Call Girls Khadki  6297143586 Call Hot Indian...
Book Sex Workers Available Pune Call Girls Khadki 6297143586 Call Hot Indian...
 
Koregaon Park ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Read...
Koregaon Park ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Read...Koregaon Park ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Read...
Koregaon Park ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Read...
 
Get Premium Hoskote Call Girls (8005736733) 24x7 Rate 15999 with A/c Room Cas...
Get Premium Hoskote Call Girls (8005736733) 24x7 Rate 15999 with A/c Room Cas...Get Premium Hoskote Call Girls (8005736733) 24x7 Rate 15999 with A/c Room Cas...
Get Premium Hoskote Call Girls (8005736733) 24x7 Rate 15999 with A/c Room Cas...
 
Proposed Amendments to Chapter 15, Article X: Wetland Conservation Areas
Proposed Amendments to Chapter 15, Article X: Wetland Conservation AreasProposed Amendments to Chapter 15, Article X: Wetland Conservation Areas
Proposed Amendments to Chapter 15, Article X: Wetland Conservation Areas
 
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 8005736733 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 8005736733 Cal...Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 8005736733 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 8005736733 Cal...
 

Protecting the Oil and Gas Industry from Email Threats

  • 1. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 1 Protecting THE OIL & GAS INDUSTRY FROM EMAIL THREATS
  • 2. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 1 Abstract: Given the oil and gas industry’s critical nature, valuable intellectual property and high-value transactions, the threat of cyber-attacks is very real. It is vitally important that the oil and gas industry better protect their organizations from modern day email threats by implementing advanced email management and threat protection technologies. The investment required for preventative measures is dwarfed by the risk of a security breach. According to a recent report from the US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), the energy sector, including oil and gas, is facing a significant rise in cyber attacks (Galea, 2015). There are a number of reasons that this industry is an ideal target for attack: Oil and gas pipelines are part of a country’s critical infrastructure, and they are an ideal target for those looking to cause disruptions in critical services for political or military motives; The industry is highly competitive, as both private enterprise and countries engage in aggressive market share tactics, often with global implications; Intellectual property is highly-valued, making it an attractive target for cyber-espionage. Finally, the sheer value of the oil and gas industry’s commodities make it an especially lucrative target. With producer and broker transactions ranging in the millions, one carefully crafted attack can lead to a payout that could support the hacker’s operations for months, or even years. Spear phishing attacks are socially engineered emails that try to trick employees into triggering network breaches, conducting fraudulent wire transfers, or even aiding in corporate espionage. Regardless of motivation, the high volume of business communications conducted via email within this industry give hackers quite the window of opportunity to intercept sensitive information through the use of spear phishing, including log-in credentials, reserve records, order forms, broker correspondences, and other documents which can then later be used to defraud unsuspecting industry professionals.
  • 3. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 2 This white paper describes spear phishing attacks that have occurred in various sectors of oil and gas, along with recommendations on how the industry can boost their cyber security and specifically adopt new preventative measures to protect against these and other email-borne threats. 1. Government Warnings: Critical Infrastructure Disruption Politically-motivated hacker groups sometimes target state-owned facilities by breaching a point within the supply chain in order to hinder the nation’s ability to obtain, transport, and store energy resources. Other rogue political groups use phishing attacks to gain access to privileged information to pose as corporate decision makers in order to delude, debunk, or destroy a nation’s oil and gas industry. A data breach at any point in an energy supply chain, or within a bureaucratic organization, can cause severe damage to infrastructure, put public safety in jeopardy, or even sway the balance of international negotiations. For instance, new evidence showed that a Turkish pipeline explosion that occurred in 2008 was caused by hackers who injected malware into the system through the pipeline’s wireless network. The pipeline was thought to be one of the most secure in the world, but hackers were able to successfully destroy the pipeline by injecting malware (Brocklehurts, 2014). Although the malware used in this attack wasn’t delivered via email, it does provide a stark warning about the physical damages that could be inflicted via cyber-attack. United States In April of 2012, the Industrial Control Systems - Cyber Emergency Response Team (ICS – CERT), issued a statement in their monthly report regarding their investigation of a year-long campaign to try to infiltrate multiple natural gas pipelines. ICS-CERT analysis found that the malware used and artifacts associated with these cyber-attacks were tied to a single spear phishing campaign, from a single source or group, and had been attempting to disrupt the
  • 4. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 3 control systems of the pipelines (ICS, 2012). Approximately 200,000 miles of these natural gas pipelines are responsible for over 25 percent of the nation’s energy supply, and so threats to this infrastructure are taken very seriously by the federal government. Norway In August of 2014, Norway’s national security authority (Nasjonal Sikkerhetsmyndighet – NSM) stated that 250 oil sector organizations may have been breached by hacker groups while 50 of those organizations had confirmed data breaches. All of the breaches were reported to be the result of targeted spear phishing attacks in 2011 (Leyden, 2014). When asked to comment on the largest breach in Norwegian history, NSM Director Kjetil Nilsen told a local publication that, “The ability to attack [networks] is increasing and there is great interest for our data”. The main source or method of the 2014 attacks remains unclear, but apparently this type of attack has happened to Norwegian oil companies before. Three years ago, hacker groups used spear phishing emails to obtain industrial drawings, contracts, as well as log-in credentials (Ibid). 2. Loziak Trojan: Corporate Espionage Corporations in highly competitive industries may have incentives to obtain sensitive trade information about their competitors in order to gain a strategic advantage. In March of 2015, Symantec reported that hackers have been targeting energy industry workers with malicious spear phishing emails. The campaign primarily targeted OPEC, specifically the UAE, Kuwait, and Saudi Arabia, but has also affected the United States, UK, and Uganda. The intended targets and method of attack made those at Symantec believe that industrial espionage was the motive. Stating that “whoever is behind these attacks may have a strategic interest in the affairs of the companies affected” (Hacket, 2015). The Trojan used in the attack, Loziak, was able to masquerade as an Excel spreadsheet, in order to
  • 5. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 4 spread strains of malware designed to observe and report device data. Once downloaded, the malware would steal sensitive information such as system configuration data and send it back to its source. The configuration data told the source whether or not the infected device was a valuable target. If the hackers decided that the device was worth targeting, they would then forward additional malware to that targeted device in order to strip it of more information. In this case, the Loziak Trojan was followed by Back.door.cyberat and Trojan.Zbot. Once the Loziak Trojan was able to infect, inspect, and transmit data, it opened up new backdoors on the system in case additional breaches were needed in the future. In order to repair the damage done, administrators would have to patch each new backdoor in order to limit future exploits (Hacket, 2015). 3. The Phantom Menace: Fraud Targeted attacks impacting oil and gas organizations usually focus on the big-ticket transactions inherent to the industry, and seek to capitalize on their efforts by deluding the victims into sending them large deposits for oil orders. Panda Security, a leading computer software company in Spain, investigated a targeted attack that employed or used a fake .pdf containing compressed files, encryption instructions, and files designed to affect the registry of the device each time the system restarted (Operation Oil Tanker, 2015) . The file, later referred to as the Phantom Menace, was a self-extracting executable file capable of bypassing the latest malware behavior filters and leaking sensitive personnel information and corporate resources in a text file back to the original sender. This attack was very troubling because of its ability to remove traces of its actions from the registry, allowing it to do the damage and leave little to no clues. With the sensitive information and resources in hand, hackers were easily able to pose as legitimate oil producers who were offering extremely competitive oil prices­—prices that seemed especially attractive given Saudi Arabia’s dominance of the market at that time. The Phantom Menace hackers used the order forms and business insights to craft an illusion that they were, in fact, a legitimate oil producer. The oil
  • 6. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 5 brokers were then prompted to pay an “advance fee” in order to finalize their crude and refined orders. However, once the advance fee or deposit was sent, neither their oil nor their contact to the oil producer could ever be found. Even if oil brokers, producers, and distributors use antivirus, anti-malware, and the necessary endpoint protections, they are still vulnerable to socially engineered attacks via email. The human component of receiving and opening a seemingly harmless email can leave an entire organization’s resources and strategies open to prying eyes. Those at Panda Security said that for those in the oil and gas industry: “It is important to understand that our defense systems must adapt to the level of attack received, and so it is necessary to implement new protection strategies that give organizations total control and visibility over their networks.” The most concerning fact to the antivirus research community and those at Panda Security, was not only that the Phantom Menace was able to avoid detection, but also that it was able to extract all the information it needed without utilizing any malware. The only point of prevention hinged on the ability of the user to somehow know that the senders were impostors. However, there are few security solutions available to comprehensively protect against a socially engineered attack like the Phantom Menace.
  • 7. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 6 Email Protection Solutions Phishing attacks against oil and gas can have various motives, from committing espionage and fraud to causing critical infrastructure and supply chain disruptions. Though there may not be a single silver-bullet solution to secure an organization’s network from all of these potential motives, protecting the organization from targeted attacks is not impossible, and it doesn’t have to cost a fortune. Investing in an advanced security architecture now may save a corporation from targeted attacks in the future. As the risks associated with not investing in one can lead to losses in revenue, market share, and reputation, the costs of recovery far outweigh the initial investment in preventative measures. In order to combat the growing challenges of protecting against orchestrated email scams, oil and gas professionals should look for email security systems that use advanced threat detection and prevention, and are equipped to detect spear phishing scams. Traditional email security products are typically not designed to detect and block spear phishing attacks, and most spam filtering products rely on prior detection and black lists in order to flag an email as spam. Also, many spear phishing attacks make use of unknown threats or zero-day vulnerabilities that not all anti-malware engines will be able to detect. Organizations can improve their email threat protection by taking the following precautions: Use Multiple Anti-malware Engines: Multi-scanning leverages the power of the different detection algorithms and heuristics of multiple engines, therefore increasing detection of both known and unknown threats, as well as protecting against attacks designed to circumvent particular antivirus engines. In addition, since anti-malware vendors address different threats at different times, using multiple scan engines will help detect new outbreaks much faster. It is important to distinguish between multi-scanning and simply using multiple antivirus engines.
  • 8. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 7 When using multi-scanning technology, performance is greatly enhanced and potential conflicts between different engines are avoided. Sanitize Email Attachments: Many spear phishing emails include malicious Word or PDF attachments, so as a precautionary measure it is highly recommended to sanitize incoming email attachments in order to remove any embedded threats that may go undetected by antivirus engines. Set Attachment Limits: By blocking potentially dangerous email attachment types such as .exe files and scripts, it is more difficult for malware to spread. It is also important to verify the attachment file type so that .exe files that are renamed as .txt files do not get through the company’s filters. Enforce an Email Content Policy: With user-based email content policies, such as keyword and attachment filtering, organizations can ensure that no confidential content or intellectual property is sent out through email. Implement an SFT Server: A secure file transfer server allows an organization to easily send and receive large and confidential files ensuring trackable, instant, and secure delivery. By encrypting files and implementing user authentication, the interception of potentially valuable information can be prevented. Utilize Advanced Threat Detection and Prevention: Ultimately, organizations need to make sure their email security system is backed by powerful anti-malware engines, as the performance of the email security program will hinge on the engine’s ability to detect, prevent, sanitize, or quarantine the suspicious email or attachment. Scan Running Processes on Endpoints: If email-born threats have already entered your network, scanning running processes and DLLs on both in-network and remote endpoints helps to identify malware before it spreads.
  • 9. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 8 By having these added layers of security incorporated into the organization’s email security infrastructure, those in the oil and gas industry can better protect themselves from targeted email attacks, and not risk losing millions to fraud, or having to conduct costly image campaigns. About OPSWAT OPSWAT is a San Francisco-based software company that provides solutions to secure and manage IT infrastructure. Founded in 2002, OPSWAT delivers solutions that provide manageability of endpoints and networks, and helps organizations protect against spear phishing and other email threats. OPSWAT’s intuitive applications and comprehensive development kits are deployed by SMB, enterprise, and OEM customers to more than 100 million endpoints worldwide. Policy Patrol Security for Exchange protects an organization’s email traffic from known and unknown threats and provides organizations with advanced features for blocking spear phishing and unwanted emails, detecting and preventing viruses and other email-borne threats, as well as enforcing email content policy. It offers effective spam & phishing protection, using technologies such as greylisting, anti-phishing block lists, DNSBL, Bayesian filtering, recipient verification and Sender Policy Framework (SPF) to block unwanted emails and detect spoofed emails. Using Metascan®, Policy Patrol also allows organizations to quickly scan email attachments with multiple antivirus engines, detecting and blocking advanced malware threats in emails. By using antivirus engines from vendors like Symantec, ESET, McAfee, and many others, Metascan technology increases detection rates for all types of malware without the hassle of licensing and maintaining multiple antivirus engines. Engines integrated into Metascan are optimized to scan simultaneously for fast, high performance scanning. In addition to malware scanning, Metascan
  • 10. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 9 can also perform email attachment file sanitization and file type checking, preventing zero-day and targeted attacks. Policy Patrol Security for Exchange includes Metascan with 1, 4, or 8 anti-malware engines, with the option to add more anti-malware engines. OPSWAT Gears enables organizations to directly assess and manage the endpoint security posture of their devices through a unified view of mobile and PC endpoints, and their applications/security issues. Administrators can to take rapid action to remediate issues on non-compliant devices and improve endpoint security. Additionally, Gears utilizes OPSWAT’s Metascan Online technology to scan running processes and DLLs for both in-network and remote devices with 40+ commercial anti-malware engines. This way Gears can help identify threats that were not detected by the installed antivirus software. References Brocklehurst, K. (2015, February 1). Cyberterrorists Attack on Critical Infrastructure Could Be Imminent. Retrieved September 23, 2015, from http://www.tripwire.com/state-of-security/security-data-protection/ security-controls/cyberterrorists-attack-on-critical-infrastructure-could-be-imminent/ Galea, D. (2015, March 31). How the Energy Industry can Survive Targeted Attacks. Retrieved September 25, 2015, from https://www.opswat.com/blog/how-energy-industry-can-survive- targeted-attacks Hundreds of Norwegian Energy Companies Hit by Cyberattacks. (2014, August 28). Retrieved September 1, 2015, from http://www.scmagazineuk.com/hundreds-of-norwegian-energy- companies-hit-by-cyber-attacks/article/368539/
  • 11. PROTECTING THE OIL & GAS INDUSTRY FROM EMAIL THREATS | PAGE 10 ICS-Cert. Malware infections in the Control Environment. (2012, December 10). Retrieved September 1, 2015, from https://ics-cert.us-cert.gov/sites/default/files/ICS-CERT_Monthly_Monitor_ Oct-Dec2012_2.pdf Leyden, J. (2014, August 27). Major cyber-attack hits Norwegian oil industry. Retrieved September 1, 2015, from http://www.theregister.co.uk/2014/08/27/nowegian_oil_hack_campaign/ Corrons, L. (2015, May 19). Operation “Oil Tanker” - The Phantom Menace. Retrieved September 1, 2015, from http://www.pandasecurity.com/mediacenter/src/uploads/2015/05/oil- tanker-en.pdf
  • 12. http://www.opswat.com Disclaimer. © 2015. OPSWAT, Inc. (“OPSWAT”). All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. OPSWAT is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. Though reasonable effort has been made to ensure the accuracy of the data provided, OPSWAT makes no claim, promise or guarantee about the completeness, accuracy and adequacy of information and is not responsible for misprints, out-of-date information, or errors. OPSWAT makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.