Practical ICS Diagrams from Cyberattacks: Securing Oil, Gas, and Petrochemical OT Systems
Introduction
The oil, gas, and petrochemical industries have unique systems, from Safety Instrumented Systems (SIS) to centralized control platforms. Learning from past cyberattacks in your field is essential because tactics are often repeated. By studying these incidents, you can build stronger defenses and faster responses.
If you missed our earlier articles on Energy, Water attacks in other industries, check those out for more insights!
Today, we’re diving into real-life cyberattacks that targeted oil, gas, and petrochemical systems. We'll break down what happened, where defenses failed, and what you can do to strengthen your security. And of course, we’ll discuss how OT SIEM can help you stay ahead of these threats.
🟪 2017 Triton / Trisis Attack
Safety Instrumented Systems under the target
The Triton attack demonstrated the dangers of compromising safety systems in critical infrastructure. It targeted the Safety Instrumented Systems (SIS) of a petrochemical plant, aiming to disable safeguards designed to protect both personnel and equipment.
The Triton attack showcased the need for defense-in-depth strategies to protect safety systems, strict access controls and specialized monitoring solutions in OT environments.
[>] Chain of Attack
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
The Triton attack highlights the importance of monitoring safety systems alongside process control systems. OT SIEM can provide:
By integrating OT SIEM with SIS monitoring, organizations can reduce the risk of future attacks on critical safety systems.
🟪 2021 Colonial Pipeline Ransomware Attack
be careful with IT
The Colonial Pipeline ransomware attack was one of the most impactful cyber incidents targeting critical infrastructure in recent years. The attack disrupted fuel supply along the U.S. East Coast, highlighting vulnerabilities in the oil and gas sector.
This attack underscored the interconnectedness of IT and OT systems and the importance of securing both domains.
[>] Chain of Attack
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
While the Colonial attack primarily targeted IT, it disrupted OT operations, showcasing the need for integrated monitoring and response capabilities across both environments. OT SIEM can help by:
By leveraging OT SIEM and implementing strong IT-OT security measures, organizations can better defend against ransomware and its ripple effects on critical infrastructure.
🟪 2012 2016 2019 Saudi Aramco Cyberattack
Shamoon 1, 2, 3
The 2019 Saudi Aramco attack, attributed to the Shamoon malware, was a continuation of cyber aggression targeting the oil and gas industry. This campaign focused on disrupting operations and destroying data, leveraging lessons learned from previous iterations of the Shamoon malware.
Vector: phishing emails and supply chain compromise
Target: Saudi Aramco’s IT infrastructure
Impact: widespread data deletion on IT systems, operational disruption, potential spillover to OT environments
Recommended by LinkedIn
Lesson: even indirect attacks on IT systems can have cascading effects on critical OT operations in the oil and gas industry
This attack emphasized the necessity of integrating IT and OT monitoring while maintaining segmentation to prevent cross-domain contamination.
[>] Chain of Attack
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
While the primary impact was on IT systems, the potential spillover into OT highlights the importance of integrated monitoring. OT SIEM can help by:
By enhancing visibility and applying defense-in-depth strategies, the oil and gas industry can mitigate the risks of future destructive cyberattacks.
🟪 2021 Cyberattack on the Iran Fuel Distribution System
paralyzed centralization
In 2021, a sophisticated cyberattack targeted Iran's national fuel distribution network, crippling gas stations across the country. The attack disrupted fuel pumps, rendered payment systems inoperable, and caused widespread panic as drivers were unable to purchase fuel. This attack directly impacted OT systems controlling critical infrastructure.
This attack highlighted the risks of centralization and the need for robust security and redundancy in critical OT infrastructure.
[>] Chain of Attack
[1] Reconnaissance
[2] Weaponization
[3] Delivery
[4] Exploitation
[5] Installation
[6] Command & Control
[7] Actions
[>] How OT SIEM Can Detect Such an Attack
The Iran fuel distribution attack underscores the critical need for enhanced monitoring and proactive defense strategies for OT systems. OT SIEM can help by:
By deploying OT SIEM with comprehensive monitoring and anomaly detection, organizations can mitigate risks to critical fuel and energy infrastructure.
Conclusion
The attacks on the oil, gas, and petrochemical sectors highlight critical vulnerabilities in OT environments:
🟣 compromised engineering workstations
🟣 weak segmentation between IT and OT networks
🟣 centralized systems as single points of failure
These systems been exploited to sabotage safety systems, disrupt operations, or paralyze infrastructure.
To protect against these threats, focus on defense-in-depth strategies, strict access controls, network segmentation, and proactive monitoring through #OTSIEM
Understanding past attacks is the first step toward defending your industry. By applying these lessons, you can better secure critical systems and maintain resilience in the face of evolving cyber threats.
You are at Level 2 Documentation Tree - Attacks 3/5 Skill
Don't forget to check your main Leveling Guide
And put 💬 comments or 👍 likes, it helps a lot to get your feedback!
Yours, Zakhar
ICS/OT Cybersecurity Consultant | Creator of 1st OT SIEM & NVIDIA AI IDS Patented | Incident Response & SOC Expert | Industrial Pentester OSCP | OT Cybersecurity Writer
4dDesmond Lamptey , Chad Crochet , Ashan Weerasinghe, Leandro Correia .'. thank you all for help and reposts!
Top 5% in Tryhackme | SC900 | CompTIA Sec+| CLO-002 | Linux+ | 5X certified in Salesforce & Veeva with 15+ years of Experience, exp. in ITIL
5dLove this post Zakhar Bernhardt .
Assistant Engineer MSP Steel Limited ICS/OT NIST 800-82, ISCA 62443 Industrial Automation, Third Party Communication
6dVery informative
IT/OT Cybersecurity & Risk Management | International Speaker | Adjunct Professor | Mentor
6dZakhar, thanks for sharing the article. IT networks and infrastructure continues to be the predominant threat vector to process environments.