Halliburton forced to take systems offline to contain cyberattack

Avatar

Oil field giant Halliburton provided new details to regulators on Friday about a recent cyberattack that necessitated the shut-down of certain systems.

The company told news outlets it was hit by a cyberattack on Wednesday that affected operations at its headquarters in Houston.

In an 8-K report submitted Thursday to the Securities and Exchange Commission (SEC), the company said hackers “gained access to certain of its systems.” The company is currently investigating the incident with the help of contractors, it said.

“The Company’s response efforts included proactively taking certain systems offline to help protect them and notifying law enforcement. The Company’s ongoing investigation and response include restoration of its systems and assessment of materiality,” Halliburton vice president Charles Geer said in the report. 

Geer added that they are communicating with customers and other stakeholders while they work “to identify any effects of the incident.”

Reuters reported on Thursday that some employees were told not to connect to the company’s internal network as a precaution following the cyberattack. 

No group has taken credit for the attack as of Friday afternoon. 

Halliburton — known for its controversial role in the Iraq War — is one of the world’s largest oil field service companies and has almost 48,000 employees. The company reported $5.8 billion in revenue for the first quarter of 2024. 

Companies in the oil and gas industry continue to be targeted by hackers and ransomware gangs due to their propensity for paying ransoms. While none have been confirmed, ransomware gangs have listed at least five oil and gas industry companies on their leak sites since June. 

While headline-grabbing attacks on Colonial Pipeline and Shell have garnered the most news coverage, several other cyber incidents have impacted oil and gas companies over the last three years. 

It has become such an issue that G7 leaders in June “committed to taking critical action to strengthen the cybersecurity of the global supply chain of key technologies used to manage and operate electricity, oil, and natural gas systems across the world.”

The Transportation Security Administration (TSA) renewed cybersecurity regulations in May for the operators of hazardous liquid and natural gas pipelines and liquefied natural gas facilities. 

The regulations have been in place since the Colonial Pipeline attack and mandate that operators must confirm to TSA that they have instituted a range of cybersecurity measures, including an incident response plan, the creation of a cybersecurity coordinator position, vulnerability scans, network segmentation and more.

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Suspect in $14 billion cryptocurrency pyramid scheme extradited to China

Next Post

Russian arrested in Argentina for laundering money for hackers

Related Posts

Agentic AI in the SOC – Dawn of Autonomous Alert Triage

Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a go-to solution, the term “AI” often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many
Avatar
Read More

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a "major blind spot in Linux runtime security tools," ARMO said. "This mechanism allows a user application to perform various actions without using system calls," the company said in
Avatar
Read More

Ripple’s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack

The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part of a software supply chain attack designed to harvest and exfiltrate users' private keys. The malicious activity has been found to affect five different versions of the package: 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2. The issue has been addressed in versions 4.2.5 and 2.14.3.
Avatar
Read More