- ‘Operation Normandy’ set to send 3,500 volunteers to border to ‘stop an invasion’
- Netanyahu’s spokesman: Safe to fly to Israel
- Oregon vandals smear cars with doughnuts, pastries, chocolate bars
- Obama’s ‘Katrina moment’ leaves his favorability factor at 42 percent
- Feds tout nearly 200 arrests, $625K in seized cash in Texas border crackdown
- Joy Behar: Sarah Palin should be ‘turning letters over on some game show’
- Rhino poacher in South Africa sentenced to 77 years in jail
- John Kerry defies FAA and flies to Israel to talk peace
- Beretta leaves Maryland over gun laws, heads for Tennessee
- Neal Boortz defends Hillary Clinton for representing child rapist
Oil company network done in by hackers
Question of the Day
Politically motivated hackers shut down the computer network of the world’s largest oil company for more than 10 days this month, the first time such a group has employed the kind of sophisticated cyberweapons typically used by national governments.
Saudi Arabian Oil Co., the national oil company of Saudi Arabia, said over the weekend that it had restored its network following the Aug. 15 attack, which affected more than 30,000 computer work stations.
The company said in a statement that its production and refining systems were unaffected by the attack because they are walled off from the main computer network.
“We addressed the threat immediately, and our precautionary procedures have helped to mitigate these deplorable cyberthreats from spiraling,” said Khalid A. Al-Falih, president and CEO of Saudi Aramco.
But at least one website the company operates, aramco.com, remained down Monday.
“We are working diligently to restore services to normal as soon as possible,” said a statement on the website.
The company’s Houston-based U.S. office referred requests for comment to its headquarters in Saudi Arabia. But emails sent there bounced back, suggesting that work to restore the company’s computer system was still ongoing.
The hackers have not been so tight-lipped.
A group calling itself the Cutting Sword of Justice claimed responsibility for the attack, saying it was in protest of the Saudi royal family’s support for “oppressive measures” in Arab countries “such as Syria, Bahrain, Yemen, Lebanon, [and] Egypt.”
Aramco was attacked “as the largest financial source for [the] al-Saud regime,” the group said in a statement written in broken English and posted online.
“This is a warning to the tyrants of this country and other countries that support such criminal disasters with injustice and oppression,” the group concluded, inviting “all anti-tyranny hacker groups all over the world” to join them.
Security specialists say that the claim has credibility because the hackers revealed technical details in their post that match what is known about the attack.
If online activists, known as “hacktivists,” were indeed responsible, the incident would mark a significant escalation of the threat from such groups, the specialists say. Previous high-profile politically motivated computer attacks, such as those by the shadowy collective known as Anonymous, have not used malicious software, or malware, which is designed to disrupt computer operations. They have generally aimed at stealing information, not destroying it.
The attack against Saudi Aramco was a sophisticated, two-stage operation, in which the hackers first seized control of one computer at the company and then used that as a doorway to attack many thousands of other work stations on the network, said Aviv Raff, chief technology officer for the Israeli security firm Seculert.
Once inside the system, the hackers appear to have installed a malicious program called Shamoon, which propagated itself rapidly across the network. On Aug. 15, the program caused the infected computers to wipe clean their own hard drives, deleting any data stored on them, and effectively hiding the hackers’ tracks.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ...
- Senator's memo shows Iran links in Homeland Security's troubled immigration program
- Help wanted: Homeland Security plagued by vacancies at the top
- Dems back bill to fix problems in investor visa program
- Democrats proceed with Mayorkas vote despite pending investigation
- NSA monitored 'World of Warcraft' players
Latest Blog Entries
TWT Video Picks
Retailer pays a price for getting too close to Obama
- CARSON: Costco and the perils of mixing politics and business
- David Perdue defeats Jack Kingston in Georgia Republican Senate primary runoff
- IRS seeks help destroying another 3,200 computer hard drives
- Beretta moving to Tennessee over Maryland gun laws
- D.C. appeals panel deals big blow to Obamacare subsidies
- 'Straight White Guy Festival' supposedly set for Ohio park
- HURT: The cost of 'free' water in Detroit
- EDITORIAL: Obamacare in intensive care
- Pentagon team dispatched to Ukraine amid crisis with Russia
- Contrasting judgments on Obama's health care hours apart; appeals court calls subsidies unlawful
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors
20 gadgets that changed the world
Fighting in Iraq