No data stolen after Saudi, UAE servers of Saipem hacked
Data back-ups are safe but restoration may take some days, Saipem tells Construction Week
No data was stolen after Saudi Aramco and Duqm Refinery contractor Saipem suffered a cyberattack on 10 December. Some of its servers were attacked and data back-ups are safe, but it could take several days to restore the compromised network, a spokesperson for the engineering, procurement, and construction (EPC) heavyweight told Construction Week.
An investigation has now been launched to determine the source of the attack.
“We have no proof of the origins or reasons for the attack, though this is being investigated,” a company representation said.
US media claim the attack targeted Saipem's servers in the UAE and Saudi Arabia. Saipem neither confirmed nor denied this in email correspondence with Construction Week.
Milan-based Saipem suffered the cyberattack on 10 December, with shares of the Borsa Italiana-listed business falling sharply upon news of the breach.
The EPC firm has had a tough year after it slipped further into the red, following a net loss of $409m for the first nine months in 2018. This came despite a significant contract from Saudi Aramco for the South Gas Compression Plant Pipelines project.
The attack on Saipem has reiterated the need for construction companies to prepare a multi-layered cyber, physical, and human response to data attacks, business development manager at construction consultancy Parsons, Stephen O’Connor, told Construction Week.
“As demonstrated by the likely nature of this attack, protecting critical infrastructure from cyber threats does not have easy software-based solutions,” he said.
“A top-tier oil and gas player like Saipem will have software-based countermeasures in place, and judging from their response so far, robust data loss protection and business continuity safeguards as well.”
O'Connor added that oil and gas, and other critical infrastructure sectors, feature “extensive supply chains”, which means “effectively excluding all potential sources of malware is a formidable challenge”.
He added: “At Parsons, we consider critical infrastructure protection the sixth domain of defence and security. This has emerged due to engineering, construction, industrial control systems, and the internet of things converging with cybersecurity – as well as legacy physical security domains on land, at sea, in the air, and in space.”