Halliburton forced to take systems offline to contain cyberattack

Avatar

Oil field giant Halliburton provided new details to regulators on Friday about a recent cyberattack that necessitated the shut-down of certain systems.

The company told news outlets it was hit by a cyberattack on Wednesday that affected operations at its headquarters in Houston.

In an 8-K report submitted Thursday to the Securities and Exchange Commission (SEC), the company said hackers “gained access to certain of its systems.” The company is currently investigating the incident with the help of contractors, it said.

“The Company’s response efforts included proactively taking certain systems offline to help protect them and notifying law enforcement. The Company’s ongoing investigation and response include restoration of its systems and assessment of materiality,” Halliburton vice president Charles Geer said in the report. 

Geer added that they are communicating with customers and other stakeholders while they work “to identify any effects of the incident.”

Reuters reported on Thursday that some employees were told not to connect to the company’s internal network as a precaution following the cyberattack. 

No group has taken credit for the attack as of Friday afternoon. 

Halliburton — known for its controversial role in the Iraq War — is one of the world’s largest oil field service companies and has almost 48,000 employees. The company reported $5.8 billion in revenue for the first quarter of 2024. 

Companies in the oil and gas industry continue to be targeted by hackers and ransomware gangs due to their propensity for paying ransoms. While none have been confirmed, ransomware gangs have listed at least five oil and gas industry companies on their leak sites since June. 

While headline-grabbing attacks on Colonial Pipeline and Shell have garnered the most news coverage, several other cyber incidents have impacted oil and gas companies over the last three years. 

It has become such an issue that G7 leaders in June “committed to taking critical action to strengthen the cybersecurity of the global supply chain of key technologies used to manage and operate electricity, oil, and natural gas systems across the world.”

The Transportation Security Administration (TSA) renewed cybersecurity regulations in May for the operators of hazardous liquid and natural gas pipelines and liquefied natural gas facilities. 

The regulations have been in place since the Colonial Pipeline attack and mandate that operators must confirm to TSA that they have instituted a range of cybersecurity measures, including an incident response plan, the creation of a cybersecurity coordinator position, vulnerability scans, network segmentation and more.

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Suspect in $14 billion cryptocurrency pyramid scheme extradited to China

Next Post

Russian arrested in Argentina for laundering money for hackers

Related Posts

Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS) offerings that, if successfully exploited, could result in serious consequences. "The impact of these vulnerabilities range between remote code execution (RCE), full-service user takeover (which might provide powerful administrative access), manipulation of AI modules, exposing sensitive data, data
Avatar
Read More