Newsletters

Get Well+Being delivered to your inbox every Monday Morning.

Cyber “Attack” Aimed at Pipeline Companies Was Handled Washington-Style
The incident marks a new, heightened level of influence by Washington over security in the energy sector. By Shane Harris
Comments () | Published May 10, 2012

Here’s the first thing you need to know about a reported “cyber attack” against natural gas pipeline operators that was revealed last week: It wasn’t actually an attack—not on the pipelines anyway, which is how it has been portrayed in some news accounts. So far, there’s no evidence that electronic intruders gained access to the systems that control gas pipelines, or that any of these lines were damaged. Rather, an as-yet-unidentified hacker or group of hackers was trying to get inside the corporate networks of the pipeline operators themselves. That’s a serious breach, but it’s not as serious as taking over a pipeline.

Here’s the second thing you need to know: This incident marks a new, heightened level of influence by Washington over security in the energy sector—and that influence will only get stronger as more incidents like this occur. Right now, Congress is debating cyber security legislation that would get the government more involved in managing corporate security breaches.

In this latest case, federal security and law enforcement agencies were involved early on as pipeline operators discovered they might be the target of an espionage campaign. For much of the time, they successfully enforced a media and public information blackout of the events. While several companies were discovering they were targets, federal authorities investigated and watched the intruders, but they didn't immediately issue a broad alert warning all pipeline operators that they might be at risk. Authorities held classified briefings with affected companies across the country. The intrusion campaign is ongoing, and it's not yet clear how many companies may be involved.

Here's how events unfolded, based on government accounts and interviews with people who are privy to details of the investigation.

Sometime in March, a number of natural gas pipeline operators alerted the Homeland Security Department that their employees had received suspicious e-mails. They appeared to be from someone the employees knew or were likely to know, but they were really sent by the would-be intruders. They were so-called "spear-phishing" messages, meant to trick the recipient into opening an attached file or clicking on embedded link, which releases a program that sets up a clandestine entry point into the recipient's network.

Once inside, an intruder might be able to read a company's e-mails, learn where it was planning to build a new pipeline, and gather other proprietary insights. Security experts debate whether an intruder could have jumped from the corporate network on to the networks that actually control the pipelines. One former government official said that it if a company had taken steps to segregate those networks--which, he added, they should--then it would be very difficult to move from one to another. That indicates the intrusion was meant to steal information from the employees, the former official said. In that case, possible culprits could be competing gas companies, or a foreign intelligence agency looking for inside information about US energy trends.

Once the companies alerted the government that they were being probed, federal officials took charge of the situation. Homeland Security and the FBI investigated, gathering information from computer hard drives and network logs. The source of the e-mails was "positively identified . . . as related to a single campaign," the government now says. As many as 20 companies reported seeing the attempts to gain access to their networks, according to a report in the Christian Science Monitor, which first reported on the intrusions. Some of the attempted intrusions began as early as December 2011.

Here's where things get unusual, and a little nerve-wracking: Rather than warn the entire gas pipeline industry that it was at risk, federal authorities held off and conducted a kind of digital stakeout. It's still not clear what the government hoped to gain by watching the intruders. Security experts said the government may have wanted to determine whether the campaign was launched by a criminal organization or a state actor--namely, a foreign intelligence agency. Investigators also may have wanted to quietly alert companies how to mitigate any damage without tipping off the intruders that they were being watched. (A spokesman for the Homeland Security Department says officials shared "mitigation activities" with the affected companies.)

Whatever the case, it's rare that the government would hold off on issuing warnings to all companies that might be affected by a hacker campaign. After the September 11 attacks, new procedures were put in place that emphasized speed and breadth in sharing threat information within certain economic sectors. In this case, though, the emphasis was placed on surveillance of the intruder.

In Washington, the trade associations representing gas companies and pipeline operators were also alerted. All public comments about the incidents are now coming from the trade groups. Calls to pipeline operators and natural gas companies were either not returned or referred to their DC representatives. Those groups have been directly involved in the ongoing negotiations over the cyber security bill.

Authorities met with individual companies at their facilities and held classified briefings. But still, the Homeland Security Department did not alert the entire gas pipeline industry to the threat until March 29, when a team that monitors the energy sector sent out an "alert" to all companies through a secure website. Those alerts "are intended to provide early warning indicators of threats and vulnerabilities for the community [pipeline operators] to act upon quickly," according to the team. But according to the Monitor, this alert also instructed the companies "not to take action to remove the cyber spies if discovered on their networks, but to instead allow them to persist as long as company operations did not appear to be endangered."

If any pipeline operators had yet to be contacted about the threat, this alert was the first they'd heard of it. But the Homeland Security Department wasn't exactly making the threat public. The alerts are considered "sensitive" and cannot be distributed through "unsecured channels."

In the end, there was no damage to the hundreds of thousands of miles of natural gas pipelines crisscrossing the United States. "To our knowledge, the 'cyber intrusions' reported to DHS have had no impact on deliveries or the safety of the pipeline system," Don Santa, the president and chief executive officers of the gas pipeline trade association, said in a statement.

But it was a tense few weeks, shrouded in secrecy, and a harbinger of how cyber security breaches will be handled--Washington style.

Categories:

Local News
Subscribe to Washingtonian

Discuss this story

Feel free to leave a comment or ask a question. The Washingtonian reserves the right to remove or edit content once posted.
blog comments powered by Disqus

Posted at 01:00 PM/ET, 05/10/2012 RSS | Print | Permalink | Comments () | Washingtonian.com Blogs