Halliburton forced to take systems offline to contain cyberattack

Avatar

Oil field giant Halliburton provided new details to regulators on Friday about a recent cyberattack that necessitated the shut-down of certain systems.

The company told news outlets it was hit by a cyberattack on Wednesday that affected operations at its headquarters in Houston.

In an 8-K report submitted Thursday to the Securities and Exchange Commission (SEC), the company said hackers “gained access to certain of its systems.” The company is currently investigating the incident with the help of contractors, it said.

“The Company’s response efforts included proactively taking certain systems offline to help protect them and notifying law enforcement. The Company’s ongoing investigation and response include restoration of its systems and assessment of materiality,” Halliburton vice president Charles Geer said in the report. 

Geer added that they are communicating with customers and other stakeholders while they work “to identify any effects of the incident.”

Reuters reported on Thursday that some employees were told not to connect to the company’s internal network as a precaution following the cyberattack. 

No group has taken credit for the attack as of Friday afternoon. 

Halliburton — known for its controversial role in the Iraq War — is one of the world’s largest oil field service companies and has almost 48,000 employees. The company reported $5.8 billion in revenue for the first quarter of 2024. 

Companies in the oil and gas industry continue to be targeted by hackers and ransomware gangs due to their propensity for paying ransoms. While none have been confirmed, ransomware gangs have listed at least five oil and gas industry companies on their leak sites since June. 

While headline-grabbing attacks on Colonial Pipeline and Shell have garnered the most news coverage, several other cyber incidents have impacted oil and gas companies over the last three years. 

It has become such an issue that G7 leaders in June “committed to taking critical action to strengthen the cybersecurity of the global supply chain of key technologies used to manage and operate electricity, oil, and natural gas systems across the world.”

The Transportation Security Administration (TSA) renewed cybersecurity regulations in May for the operators of hazardous liquid and natural gas pipelines and liquefied natural gas facilities. 

The regulations have been in place since the Colonial Pipeline attack and mandate that operators must confirm to TSA that they have instituted a range of cybersecurity measures, including an incident response plan, the creation of a cybersecurity coordinator position, vulnerability scans, network segmentation and more.

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Suspect in $14 billion cryptocurrency pyramid scheme extradited to China

Next Post

Russian arrested in Argentina for laundering money for hackers

Related Posts

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-speaking targets in Latin America in 2024. The findings come from Russian cybersecurity company Positive Technologies, which described the malware as loaded with a "full suite of espionage features." "It could upload files, capture screenshots
Avatar
Read More

Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign

Threat hunters are warning of a sophisticated web skimmer campaign that leverages a legacy application programming interface (API) from payment processor Stripe to validate stolen payment information prior to exfiltration. "This tactic ensures that only valid card data is sent to the attackers, making the operation more efficient and potentially harder to detect," Jscrambler researchers Pedro
Avatar
Read More