Very usefull links


News links




Dow Jones

Oil price



Views and News





Pipeline industry in ‘Wake-Up Call' on Cyberattack to U.S. electronic communications systems


Companies weren't required to report attack to regulator TSA. Congressman Latta sees ‘bad actors' looking to weaken U.S.

By Naureen S Malik

Petroleumworld 04 10 2018

A cyberattack that U.S. natural gas pipeline owners weren't required to report has lawmakers taking a closer look at how the industry is handling such threats, raising the prospect of tighter regulation.

In website notices to customers this week, at least seven pipeline operators from Energy Transfer Partners LP to TransCanada Corp. said their third-party electronic communications systems were shut down, with five confirming the service disruptions were caused by hacking . But the companies didn't have to alert the U.S. Transportation Security Administration, the agency that oversees the nation's more than 2.6 million miles of oil and gas conduits in addition to providing security at airports.

Though the cyberattack didn't disrupt the supply of gas to U.S. homes and businesses, it underscores that energy companies from power providers to pipeline operators and oil drillers are increasingly vulnerable to electronic sabotage. It also showed how even a minor attack can have ripple effects, forcing utilities to warn of billing delays and making it more difficult for analysts and traders to predict a key government report on gas stockpiles.

“These attacks are a wake-up call that addressing our aging energy infrastructure needs to be a priority,” Congressman Robert Latta, a Republican from Ohio who serves on the House Committee on Energy and Commerce, said in an emailed statement on April 5. “Bad actors are looking at any way to weaken the American energy sector.”

This isn't the first time hackers have had oil and gas pipes in their sights: The Congressional Research Service reported intrusions targeting pipeline communication systems back in 2012. A web attack could “disrupt pipeline service and cause spills, explosions, or fires -- all from remote locations,” the service said in a report.

The electronic systems that were targeted in the recent cyberattack help pipeline customers communicate their needs with operators via a computer-to-computer exchange of documents, such as contracts and invoices. The attacks didn't affect operational control of the pipelines.

Even before the most recent pipeline web attack, there were signs that the government was intensifying its focus on web-based energy threats. Last month, the TSA issued a 27-page report on pipeline security that included a section on cybersecurity. In the report, the agency urged pipelines to take measures including establishing a cybersecurity plan, limiting network access and changing default passwords.

But TSA doesn't require operators to report web intrusions, and it's not clear whether the agency would have jurisdiction over an attack on a third-party communications provider. TSA requests voluntary notifications of “security incidents that are indicative of a deliberate attempt to disrupt pipeline operations or activities that could be considered precursors to such an attempt,” according to the report last month.

“TSA will continue to work with the pipeline industry to assess any vulnerabilities associated with this incident,” Lisa Farbstein, a spokeswoman for the agency, said in an email Friday. “TSA, in consultation with cyber experts, will make recommendations, as appropriate, to the pipeline industry to mitigate concerns.”

The American Gas Association, an industry group that represents more than 200 gas supply companies, supports voluntary reporting of cyberattacks, said Dave McCurdy, the association's president. Mandatory reporting could be counterproductive because it may set the bar too low and create a false sense of security, especially in an environment where cyber threats evolve quickly, McCurdy said by phone Friday.

“Just asking for reporting and requirements is not the answer,” he said. “We need to understand the nature of attacks. Every industry in a critical area receives attacks mostly daily.”

$96 Million

In February, Energy Department Secretary Rick Perry announced the department would use $96 million in funding to create an office to address cyber threats to energy. Though Homeland Security, which oversees TSA, has the legal authority to oversee energy cybersecurity, “DOE works closely with the sector on cyber security and threat information sharing,” Shaylyn Hynes, a spokeswoman for the department, said in a statement.

But some lawmakers say it's not enough.

At a congressional hearing in March, Maria Cantwell, a Democratic senator from Washington, told Perry that budget cuts could make it more difficult to shield the energy sector from cyber intrusions.

“Our energy infrastructure is under attack,”' Cantwell said . “A year ago, I called for a comprehensive assessment of cyber attacks to our grid by Russians. We don't need rhetoric at this point – we need action.”

The threat appears to be widespread. Two years ago, the Department of Energy's Pacific Northwest National Laboratory in Richland, Washington, said its firewall system blocks 25,000 cyberattacks a day.

Though the energy industry and regulators are looking more closely at cybersecurity risks, the shift may not be happening fast enough, said Edgard Capdevielle, chief executive officer of Nozomi Networks Inc. in San Francisco, a company that provides cybersecurity applications for customers including power producers and oil and gas pipeline operators.

The industry's perception is that addressing energy cyber threats “is important, but mañana is OK,” said Capdevielle. “Mañana is not OK.”

Hit your target - Advertise with us

Story by Naureen S Malik ; With assistance by Jordan Robertson from Bloomberg. /
04 09 2018

We invite all our readers to share with us
their views and comments about this article.
Write to

By using this link, you agree to allow PW
to publish your comments on our letters page.

Any question or suggestions,
please write to:

Best Viewed with IE 5.01+ Windows NT 4.0, '95,
'98,ME,XP, Vista, Windows 7,8,10 +/ 800x600 pixels





Editor & Publisher:Elio Ohep/
Contact Email:

CopyRight © 1999-2016, Paul Ohep F. - All Rights Reserved. Legal Information

PW in Top 100 Energy Sites

CopyRight©1999-2017, Petroleumworld ™  / Elio Ohep - All rights reservedThis site is a public free site and it contains copyrighted material the use of which has not always been specifically authorized by the copyright owner.We are making such material available in our efforts to advance understanding of business, environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have chosen to view the included information for research, information, and educational purposes. For more information go to: If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission fromPetroleumworld or the copyright owner of the material.