Category: Energy

New Office Created To Address Cyber-Security Threats To Energy Facilities

Posted September 27, 2012 by TeamSHATTER Admin in Data Breach, Database Security, Energy with 0 comments

The Federal Energy Regulatory Commission (FERC) has created an office to address both physical and cyber-threats to energy facilities. The new Office of Energy Infrastructure Security (OEIS) will be inside FERC and be used to help the commission identify, communicate and address potential risks to facilities under FERC jurisdiction, such as oil, electric and gas companies. Click for complete article >>

Click for complete article >>

12 Chinese Teams Thought Responsible For Most APT Attacks

Chinese Hackers

Concerned with the amount of U.S. intellectual property being stolen from corporate networks, a groups of security professionals sat down and compared notes on the various groups they tracked. They came up with an approximate tally of attackers targeting the intellectual property of U.S. and multinational companies: an even dozen, and all thought to be Chinese. High-tech firms, oil companies, and defense contractors have all fallen prey to the 12 teams out to steal trade secrets and sensitive or classified…

Click for complete article >>

Tokyo’s Mitsubishi Heavy Industries Reportedly Suffers Cyber-Attack

Posted September 19, 2011 by TeamSHATTER Admin in Data Breach, Database Security, Energy, Government (Federal), Government (State) with 0 comments
Mitsubishi heavy industries hack

Mitsubishi Heavy Industries Ltd. (7011.TO) on Sunday suffered a hacking attack that infected at least 80 of the company’s servers with a computer virus, the Yomiuri Shimbun reported Monday, in the latest online security breach to affect a Japanese company. The affected computers contained information on the company’s nuclear power plant, submarine and missile businesses, the report said. Although information was found to have been moved on the server, it is unclear if any data were stolen in the attack….

Click for complete article >>

Black Hat: Hard-Coded Password And Security Holes Found In Siemens Control Systems

Posted August 4, 2011 by TeamSHATTER Admin in Attack Vectors, Data Breach, Energy, Hacker News with 0 comments

LAS VEGAS — A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers reprogram the systems with malicious commands to sabotage critical infrastructures and even lock out legitimate administrators. The vulnerabilities exist in several models of Siemens programmable logic controllers, or PLCs — the same devices that were targeted by the Stuxnet superworm and that are used in nuclear facilities and other critical infrastructures, as well as in…

Click for complete article >>

A Stuxnet Comeback?

Posted July 28, 2011 by TeamSHATTER Admin in Attack Vectors, Data Breach, Database Security, Energy with 0 comments
stuxnet 2

It’s been more than a year since Stuxnet was first discovered wriggling its way through Windows machines around the world and U.S. officials now worry that copycat attacks based on the worm’s complex model ultimately could emerge that go after more process control equipment than the Siemens equipment it targeted.Sean McGurk, director of the DHS National Cybersecurity and Communications Integration Center, said in his testimony to the House Subcommittee on Oversight and Investigations yesterday that attackers could create variants of…

Click for complete article >>

Anonymous Hacks Monsanto, Targets Exxon Mobil, ConocoPhillips

Posted July 13, 2011 by TeamSHATTER Admin in Data Breach, Database Security, Energy, Hacker News with 0 comments
anonymous targets oil companies

Anonymous has posted names, addresses, phone numbers and email addresses of Monsanto employees, and is promising action against Exxon Mobil, ConocoPhillips, Canadian Oil Sands Ltd., Imperial Oil, the Royal Bank of Scotland and others. In the case of Monsanto, the hacker group has posted information about 2,500 employees and affiliates of Monsanto and claim to have taken down corporate Web sites and mail servers, according to the Sophos Naked Security blogger. Anonymous didn’t indicate how it broke into the network,…

Click for complete article >>
Powered by