Oil Rigs in Oceanic Regions Hit Due to Malware Assaults

Security researchers have alerted about a number of oil rigs in the ocean that recently got contaminated with malicious software inadvertently pulled down from employees' PCs, thus published slashgear.com dated February 24, 2013.

It appears that the source of the malicious software is counterfeit music/video files which were taken down via the satellite service the rigs utilized. Besides, pirated content was the other source which pre-existed on the employees' PCs. Clearly, the malware assaults indicate many security lapses, which may result in severe dangers such as fatalities, blowouts amongst more accidents. Elsewhere, the malware crept inside the rigs through laptops or Universal Serial Bus drives.

Reportedly, large computer systems controlling oil rigs as well as platforms have gone offline due to the malware assaults like a Gulf-of-Mexico plant experiencing access failure of its systems.

Co-Founder Misha Govshteyn of network security firm Alert Logic states that there was literally one PC-worm, which spread overwhelmingly across the networks; consequently, the victims are now in deep waters. Slashgear.com published this.

Principal Tactical Analyst Jack Whitsitt on behalf of National Electric Sector Cyber-Security Organization explained that any normal malware contamination hitting power equipments could hardly lead to any serious hazard. However, a customized assault aimed at any facility via widespread malicious software could result in severe consequences, he added. Houstonchronicle.com published this dated February 23, 2013.

Security experts emphasized that the above type of customized assault wasn't impossible, particularly after the Stuxnet virus, which pushed malware into PCs controlling centrifuges of a nuclear plant in Iran during 2010.

Whitsitt stated that any cyber-attack based on sufficient information regarding an oil rig, pipeline network else refinery and utilizing widespread malicious software could cause tangible destruction.

He added that it was likely an assumption of prudent kind that something of the sort could possibly occur.

Meanwhile, no real disastrous incidents have happened hitherto because of the mere nuance-grade form of the malware, which's probably twisting things up and preparing for the actual countdown. However, incase any malicious content were used for straight away hitting the rigs, there might've been results much worse. Conclusively, organizations should begin spending explicitly for cyber-security too.

Related article: Oil and Gas Industry in Norway: Victim of Online Data-Theft

» SPAMfighter News - 04-03-2013

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next