{"id":49392,"date":"2022-11-21T16:02:11","date_gmt":"2022-11-21T16:02:11","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/"},"modified":"2022-11-21T16:02:11","modified_gmt":"2022-11-21T16:02:11","slug":"us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/","title":{"rendered":"US offshore oil and gas installation at &#8216;increasing&#8217; risk of cyberattack"},"content":{"rendered":"<p>The US Government Accountability Office (GAO) has warned that the time to act on securing the US&#8217;s offshore oil and natural gas installations is now because they are under &#8220;increasing&#8221; and &#8220;significant risk&#8221; of cyberattack.<\/p>\n<div class=\"CaptionedImage Center\" readability=\"8\"><a href=\"https:\/\/regmedia.co.uk\/2022\/11\/21\/shutterstock_oilrig.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2022\/11\/21\/shutterstock_oilrig.jpg?x=648&amp;y=432&amp;infer_y=1\" alt=\"Docked offshore oil drilling rig in the port of Galveston, Texas.\" title=\"Docked offshore oil drilling rig in the port of Galveston, Texas.\" height=\"432\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">Docked offshore oil drilling rig in the port of Galveston, Texas<\/p>\n<\/div>\n<p>A report to Congress looked at a network of &#8220;more than 1,600 offshore oil and gas facilities,&#8221; which the federal watchdog pointed out produce a &#8220;significant&#8221; amount of America&#8217;s domestic oil and gas \u2013 and the operational technology (OT) tech that looks after and controls the physical equipment.<\/p>\n<p>The study also warned of a potential ecological (and energy) disaster on par with the 2010 Deepwater Horizon disaster.<\/p>\n<p>Striking an air of desperation, the report adds that in 2015 and 2020 the Department of the Interior&#8217;s Bureau of Safety and Environmental Enforcement (BSEE) initiated efforts to address cybersecurity risks, but &#8220;neither resulted in substantial action.&#8221;<\/p>\n<p>Earlier this year, BSEE &#8220;again started another such initiative,&#8221; hiring a cybersecurity specialist to lead it. But bureau officials have apparently put this on pause while the specialist is brought up to speed with &#8220;the relevant issues.&#8221; In the meantime, the report urges, BSEE should &#8220;immediately&#8221; get a strategy together to &#8220;address offshore infrastructure risks.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Curiously, the report mentions neither the physical attack on gas lines under the Baltic Sea owned by Russia&#8217;s Nord Stream energy firm, nor <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2012\/09\/13\/stuxnet\/\" rel=\"noopener\">Stuxnet<\/a> \u2013 which is perhaps the most well known SCADA system malware of all time. The famous worm was widely credited with crippling the Iranian nuclear weapons program for several years, and according to researchers found its way onto the air-gapped network of the plant on an infected USB stick.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>Supervisory Control and Data Acquisition (SCADA) systems provide a graphical user interface for operators to check on the status of an industrial control system; receive any alarms that units are offline or compromised; or enter adjustments to manage the processes on the system itself.<\/p>\n<p>The GAO did mention the USB as an infection vector, though, pointing to a <a target=\"_blank\" href=\"https:\/\/www.se.com\/ww\/en\/download\/document\/SESN-2018-236-01\/\" rel=\"noopener\">2018 alert<\/a> by Schneider Electric about some system monitoring devices that were packaged with USB removable media that one of its suppliers contaminated with malware during manufacturing.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>In a worst case scenario, the report suggested cyberattacks on Operational Technology Systems in the offshore oil and gas sector could result in a disaster on the scale of the 2010 failure of mobile offshore drilling unit Deepwater Horizon&#8217;s blowout preventer. The report points out the semi-submersible offshore drilling rig&#8217;s crippled operation tech (OT) system contributed to its explosion and sinking &#8220;as well as 11 deaths, serious injuries, and the largest marine oil spill in the history of the US (approximately 4.9 million barrels).&#8221;<\/p>\n<h3 class=\"crosshead\">And the economy&#8230;<\/h3>\n<p>According to officials at the Pipeline and Hazardous Materials Safety Administration, cyberattacks against pipeline OT \u2013 such as valves that control oil and gas flow \u2013 could &#8220;disrupt production and transmission and, thereby, negatively affect energy supplies, markets, and the economy.&#8221;<\/p>\n<p>The report <a target=\"_blank\" href=\"https:\/\/www.gao.gov\/assets\/gao-23-105789.pdf\" rel=\"noopener\">[PDF]<\/a> also noted that the 2021 ransomware attack on the Colonial Pipeline Company had led to temporary disruption in the delivery of gasoline and other petroleum products across much of the southeast US. Not only was the operator caught off guard in terms of cybersecurity defenses, its operators are said to have paid $5 million to regain control of their systems and get the pipeline pumping oil again. The company at the time carried 100 million gallons a day of refined fuels between Houston, Texas, and New York Harbor \u2013 45 percent of all fuel needed on the US East Coast.<\/p>\n<p>Although it never mentioned Europe explicitly, clearly the report has an eye on the energy price shocks currently being suffered in Europe, where Russia&#8217;s war on Ukraine has interrupted natural gas supplies. European nations, some <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.nytimes.com\/2022\/04\/06\/world\/europe\/germany-gas-russia-ukraine.html\">more than others<\/a>, were already very reliant on Russian gas because of the slowness of their shifts to clean energy and the move by some to close their nuclear power plants.<\/p>\n<p>When Russia cut off the juice, this contributed to rising global inflation as well as extreme energy budgeting \u2013 and the unexpected revival of coal plants \u2013 with <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.dw.com\/en\/germany-reactivates-coal-fired-power-plant-to-save-gas\/a-62893497\">Germany<\/a>, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-08-23\/austria-s-path-back-to-coal-fired-power-hits-political-roadblock\">Austria<\/a>, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.lemonde.fr\/en\/france\/article\/2022\/09\/15\/we-are-digging-up-grandma-reactivating-a-coal-fired-power-plant-in-eastern-frances-to-avoid-power-outages_5997055_7.html\">France<\/a>, and the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-06-20\/dutch-are-reviving-coal-power-amid-russian-gas-squeeze\">Netherlands<\/a> all announcing plans to reactivate them or prolong their operations.<\/p>\n<p>Some of the cyberthreats cited by the federal watchdog included those posed by Russia&#8217;s online state-sponsored attackers. In the 2015 attacks on Ukraine, according to a CISA alert, Russian-sponsored miscreants issued <a target=\"_blank\" href=\"https:\/\/www.cisa.gov\/uscert\/ics\/alerts\/IR-ALERT-H-16-056-01\" rel=\"noopener\">unauthorized commands<\/a> to open the breakers at substations managed by three regional electricity utilities, causing a loss of power to about 225,000 customers.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cybercrime&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Y3ul0ilqstl5CRtbSxLaPAAAAEk&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>The report concludes that the lack of action to address cybersecurity risks to the more than 1,600 oil and gas facilities and structures on the outer continental shelf creates &#8220;significant liability,&#8221; given that a successful cyberattack on such infrastructure could have potentially catastrophic effects. It wants a strategy to guide the most recent cybersecurity efforts that includes a risk assessment; performance measures; coordination of efforts; and an assessment of needed resources. \u00ae<\/p>\n<p> <template id=\"tf-poll\"> <\/template> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2022\/11\/21\/us_oil_gas_cyber_threats\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>GAO says 2010 Deepwater Horizon disaster will look like a walk in the park The US Government Accountability Office (GAO) has warned that the time to act on securing the US&#8217;s offshore oil and natural gas installations is now because they are under &#8220;increasing&#8221; and &#8220;significant risk&#8221; of cyberattack.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":49393,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-49392","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>US offshore oil and gas installation at &#039;increasing&#039; risk of cyberattack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"US offshore oil and gas installation at &#039;increasing&#039; risk of cyberattack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-21T16:02:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regmedia.co.uk\/2022\/11\/21\/shutterstock_oilrig.jpg?x=648&amp;y=432&amp;infer_y=1\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"US offshore oil and gas installation at &#8216;increasing&#8217; risk of cyberattack\",\"datePublished\":\"2022-11-21T16:02:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/\"},\"wordCount\":829,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/\",\"name\":\"US offshore oil and gas installation at 'increasing' risk of cyberattack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack.jpg\",\"datePublished\":\"2022-11-21T16:02:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"US offshore oil and gas installation at &#8216;increasing&#8217; risk of cyberattack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"US offshore oil and gas installation at 'increasing' risk of cyberattack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/","og_locale":"en_US","og_type":"article","og_title":"US offshore oil and gas installation at 'increasing' risk of cyberattack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-11-21T16:02:11+00:00","og_image":[{"url":"https:\/\/regmedia.co.uk\/2022\/11\/21\/shutterstock_oilrig.jpg?x=648&amp;y=432&amp;infer_y=1","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"US offshore oil and gas installation at &#8216;increasing&#8217; risk of cyberattack","datePublished":"2022-11-21T16:02:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/"},"wordCount":829,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/","url":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/","name":"US offshore oil and gas installation at 'increasing' risk of cyberattack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack.jpg","datePublished":"2022-11-21T16:02:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/us-offshore-oil-and-gas-installation-at-increasing-risk-of-cyberattack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"US offshore oil and gas installation at &#8216;increasing&#8217; risk of cyberattack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49392"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49392\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/49393"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}