The Independent

A NEW KIND OF WAR

At a time when the world faces a dangerous escalation in cyber warfare, a series of assaults on petrochemi­cal firms in Saudi Arabia – possibly backed by nation states – has caused alarm. Nicole Perlroth and Clifford Krauss report

-

In August, a petrochemi­cal company with a plant in Saudi Arabia was hit by a new kind of cyber assault. The attack was not designed to simply destroy data or shut down the plant, investigat­ors believe. It was meant to sabotage the firm’s operations and trigger an explosion.

The attack was a dangerous escalation in internatio­nal cyber warfare, as faceless enemies demonstrat­ed both the drive and the ability to inflict serious physical damage. And US government officials, their allies and cybersecur­ity researcher­s worry that the culprits could replicate it in other countries, since thousands of industrial plants all over the world rely on the same US-engineered computer systems that were compromise­d.

Investigat­ors have been tight-lipped about the August attack. They still won’t identify the company or the country where it is based and have not identified the culprits.

But the attackers were sophistica­ted and had plenty of time and resources, an indication that they were likely to have been supported by a government, according to more than a dozen people, including cybersecur­ity experts who have looked into the attack and asked not to be identified because of the confidenti­ality of the continuing investigat­ion.

The only thing that prevented an explosion was a mistake in the attackers’ computer code, the investigat­ors say.

The assault was the most alarming in a string of cyber attacks on petrochemi­cal plants in Saudi Arabia. In January 2017, computers went dark at the National Industrial­isation Company (Tasnee for short), which is one of the few privately owned Saudi petrochemi­cal companies. Computers also crashed 15 miles away at Sadara Chemical Company, a joint venture between the oil and chemical giants Saudi Aramco and Dow Chemical.

Within minutes of the attack at Tasnee, the hard drives inside the company’s computers were destroyed and their data wiped clean, replaced with an image of Alan Kurdi, the small Syrian child who drowned off the coast of Turkey during his family’s attempt to flee that country’s civil war.

The intent of the January attacks, Tasnee officials and researcher­s at the security company Symantec believe, was to inflict lasting damage on the petrochemi­cal companies and send a political message. Recovery took months.

Energy experts say the August attack could have been an attempt to complicate Crown Prince Mohammad bin Salman’s plans to encourage foreign and domestic private investment to diversify the Saudi economy and produce jobs for the country’s growing youth population.

“Not only is it an attack on the private sector, which is being touted to help promote growth in the Saudi economy, but it is also focused on the petrochemi­cal sector, which is a core part of the Saudi economy,” says Amy Myers Jaffe, an expert on Middle East energy at the Council on Foreign Relations.

Saudi Arabia has cut oil exports in recent years to support global oil prices, a strategy central to its efforts to make a potential public offering of shares of government-controlled Saudi Aramco more attractive to internatio­nal investors. The kingdom has tried to compensate for its lost revenue by expanding its petrochemi­cal and refining industry.

Investigat­ors believe that the hackers have probably fixed their mistake by now, and that it is only a matter of time before they deploy the same technique against another industrial control system

Some technical details of the attack in August have been previously reported, but this is the first time the earlier attacks on Tasnee and other Saudi petrochemi­cal companies have been reported.

Security analysts at Mandiant, a division of the security firm FireEye, are still investigat­ing what happened in August, with the help of several companies in the United States that investigat­e cyber attacks on industrial control systems.

A team at Schneider Electric, which made the industrial systems (Triconex safety controller­s) that were targeted, is also looking into the attack. So are the National Security Agency, the FBI, the Department of Homeland Security and the Pentagon’s Defence Advanced Research Projects Agency, which has been

supporting research into forensic tools designed to assist hacking investigat­ions.

All of the investigat­ors believe the attack was most likely intended to cause an explosion that would have killed people. In the past few years, explosions at petrochemi­cal plants in China and Mexico – though not triggered by hackers – have killed several employees, injured hundreds and forced evacuation­s of surroundin­g communitie­s.

What worries investigat­ors and intelligen­ce analysts the most is that the attackers compromise­d Schneider’s Triconex controller­s, which keep equipment operating safely by performing tasks like regulating voltage, pressure and temperatur­es. Those controller­s are used in about 18,000 plants around the world, including nuclear and water treatment facilities, oil and gas refineries, and chemical plants.

“If attackers developed a technique against Schneider equipment in Saudi Arabia, they could very well deploy the same technique here in the United States,” says James A Lewis, a cybersecur­ity expert at the Centre for Strategic and Internatio­nal Studies, a Washington think tank.

The Triconex system was believed to be a “lock and key operation”. In other words,the safety controller­s could be tweaked or dismantled only with physical contact.

So how did the hackers get in? Investigat­ors found an odd digital file in a computer at an engineerin­g workstatio­n that looked like a legitimate part of the Schneider controller­s but was designed to sabotage the system. Investigat­ors will not say how it got there, but they do not believe it was an inside job. This was the first time these systems were sabotaged remotely.

The only thing that prevented significan­t damage was a bug in the attackers’ computer code that inadverten­tly shut down the plant’s production systems.

Investigat­ors believe that the hackers have probably fixed their mistake by now, and that it is only a matter of time before they deploy the same technique against another industrial control system. A different group could also use those tools for its own attack.

The August attack was also a significan­t step up from earlier attacks in Saudi Arabia. Starting on 17 November 2016, computer screens at a number of Saudi government computers went dark and their hard drives were erased, according to researcher­s at Symantec, which investigat­ed the attacks.

Two weeks later, the same attackers hit other Saudi targets with the same computer virus. On 23 January 2017, they struck again, at Tasnee and other petrochemi­cal firms, deploying a computer virus known as Shamoon, after a word embedded in its code.

The Shamoon virus first surfaced five years earlier at Saudi Aramco, wiping out tens of thousands of computers and replacing the data with a partial image of a burning American flag. Leon Panetta, US Defence Secretary at the time, said the attack could be a harbinger. “An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches,” he said in 2012.

Government officials and cybersecur­ity experts in Saudi Arabia and the United States attributed the 2012 Shamoon attack to Iranian hackers.

“Another attacker could have adopted that code” for the January 2017 attacks, says Vikram Thakur, a senior researcher at Symantec, “but our analysis showed the likelihood it was the same perpetrato­r was pretty high.”

The attack in August was not a Shamoon attack. It was much more dangerous. Investigat­ors believe a nation state was responsibl­e because there was no obvious profit motive, even though the attack would have required significan­t financial resources. And the computer code had not been seen in any earlier assaults. Every hacking tool had been custom-built.

Tensions between Iran and Saudi Arabia have steadily escalated in recent years, and the conflict has drifted into cyberspace

The attackers not only had to figure out how to get into that system, they had to understand its design well enough to know the layout of the facility – what pipes went where and which valves to turn in order to trigger an explosion.

Investigat­ors believe someone would have had to buy the same version of the Triconex safety system to figure out how it worked. The components, investigat­ors say, could be purchased for $40,000 (£29,000) on eBay.

The attack has also shown the challenge of attributin­g with unquestion­able evidence an attack to one country. Cybersecur­ity experts say Iran, China, Russia, the United States and Israel had the technical sophistica­tion to launch such attacks. But most of those countries had no motivation to do so. China and Russia are increasing­ly making energy deals with Saudi Arabia, and Israel and the United States have moved to cooperate with the kingdom against Iran.

That leaves Iran, which experts say has a growing cyberspace military programme, although the Iranian government has denied any involvemen­t in cyber attacks.

Tensions between Iran and Saudi Arabia have steadily escalated in recent years, and the conflict has drifted into cyberspace. US officials and security analysts blamed Iranian hackers for a spate of attacks on American banks in 2012 and more recent espionage attacks on the airline industry. Iranian hackers were blamed for the 2012 Aramco attack and are also the leading suspects in the more recent Shamoon attacks.

The August attack was far more sophistica­ted than any previous attack originatin­g from Iran, Thakur of Symantec says, but there is a chance Iran could have improved its cyber-warfare abilities or worked with another country, like Russia or North Korea.

Tasnee says it hired experts from Symantec and IBM to study the attack against it. The company says it has also “completely overhauled our security standards” and started using new tools to prevent cyberattac­ks.

“Being a global business,” the company says, “we believe that cybersecur­ity is a concern wherever you are in the world.”

 ??  ?? Computers crashed at sites including Sadara Chemical Company, a joint venture between the oil and chemical giants Saudi Aramco and Dow Chemical (Sadara)
Computers crashed at sites including Sadara Chemical Company, a joint venture between the oil and chemical giants Saudi Aramco and Dow Chemical (Sadara)

Newspapers in English

Newspapers from United Kingdom