- Associated Press - Tuesday, September 4, 2012

DUBAI, UNITED ARAB EMIRATES (AP) - Security technicians are beginning to suspect that highly targeted virus attacks were behind the recent crippling of computer systems at two major Gulf energy companies, even as questions swirl about the source of the strikes.

The computer disruptions at state oil giant Saudi Aramco and Qatari natural gas producer RasGas do not appear to have affected oil and gas production. Yet they highlight another risk to the security of energy supplies in the Persian Gulf region.

Neither company has said how much data may have been lost, but the scope of the attacks appears extensive. Aramco blocked all its electronic systems from outside access for several days to deal with the problem, which it says affected about 30,000 workstations last month. RasGas technicians were still working to fix that company’s systems more than a week after being hit.

Although pinpointing culprits in the shadowy world of Internet crime is tricky, some experts believe that Iran _ itself the victim of multiple computer attacks _ may have played a role. Others aren’t so sure, saying there isn’t enough evidence. That may be partly by design, as the virus thought to be involved in at least one of the attacks covers its tracks by erasing data on computer hard drives.

The attacks may not be over. Security and data storage company Symantec said this week that it is investigating reports of additional infections involving the virus at the center of what security experts refer to as the Shamoon attacks. It’s widely believed to be responsible for the Aramco disruption, and several security experts suspect it in the Qatar attack.

The virus can spread through networked computers and ultimately wipes out files by overwriting them _ sometimes leaving behind an image of a burning American flag.

Aviv Raff, the chief technology officer of Israeli computer security firm Seculert, said other companies outside the energy industry have also been affected, though confidentiality agreements prevent him from providing details.

Saudi Aramco revealed that its network was infected on Aug. 15 when it announced it was disconnecting all its computer systems from outside access.

Two previously unknown groups immediately claimed responsibility for the Aramco attack in statements posted to a website often used by computer hackers. One of the groups, the Cutting Sword of Justice, said it was avenging what it called Saudi support for “crimes and atrocities” in Syria, Bahrain and other Arab countries.

Aramco said late last month that it had managed to restore all network services after cleaning computers affected by what it called “a malicious virus that originated from external sources.” Key oil exploration and production operations had been unaffected because they use isolated computer networks, it said.

Unlike viruses that aim to hit as many targets as possible, this one appears designed to cripple computers on specific networks identified by the culprits, said Bulent Teksoz, chief security strategist for emerging markets at Symantec. He declined to name the affected organizations.

Some researchers, such as Raff, suspect the memory-wiping mechanism was simply a way to remove evidence of earlier incursions, during which hackers might have stolen information or rerouted network traffic.

Last week, Qatar’s RasGas disclosed an Aug. 27 attack by an unknown virus on its office computer systems. Technicians were still working to get the system running again. RasGas, a partnership between state-run Qatar Petroleum and U.S. oil giant Exxon Mobil Corp., said gas production has not been affected.

Exxon Mobil spokeswoman Adrienne Fleming declined to comment on the virus or whether the oil company itself had been hit, citing a company practice of not discussing security issues.

Even less is known about the RasGas infection. Like Aramco, the company has not publicly identified the virus responsible. But several security experts suspect the attacks are related, given the timing and the apparent similarity of the infections.

Story Continues →