In a joint alert issued, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI, EPA, and Department of Energy, warned that cyberattacks targeting U.S. Oil and Gas sector are on the rise. While these attacks often rely on basic techniques, the agencies caution that poor cybersecurity practices within critical infrastructure could lead to serious service disruptions—or even physical damage.
The advisory underscores a troubling trend: threat actors are increasingly targeting industrial control systems (ICS) and supervisory control and data acquisition (SCADA) technology across U.S. energy and transportation systems. These systems are vital for managing everything from pipeline operations to power grids, and leaving them exposed online could have far-reaching consequences.
CISA notes that many of these attackers are unsophisticated actors, often hacktivist groups or individuals claiming to be hacktivists. These groups typically exploit unprotected or misconfigured systems, including ICS units accessible from the internet or guarded only by default passwords. While the impact of these intrusions is often exaggerated, experts warn that even a modest breach could result in major operational consequences.
Critical Infrastructure Urged to Strengthen Cyber Defenses Immediately
In their alert, the agencies call on operators of critical infrastructure to “act now” to improve their defenses against cyber threats aimed at internet-connected OT (Operational Technology) and ICS systems. This includes implementing a multi-layered defense strategy that reduces exposure and increases resilience.
Key defensive measures include:
- Removing direct internet access to OT systems
- Securing remote access with VPNs, strong passwords, and phishing-resistant MFA
- Rotating default credentials immediately
- Enforcing network segmentation to isolate critical systems
- Ensuring the ability to operate OT systems manually in emergencies
Organizations are also advised to review system configurations, especially those introduced during installation or by third-party system integrators and managed service providers. Misconfigurations are a common source of vulnerabilities and should be corrected in collaboration with vendors and partners.
CISA further encourages all critical infrastructure operators to utilize its extensive library of resources, which includes guidance on attack surface reduction, secure-by-design principles, and incident response planning. These tools are freely available and updated regularly to reflect evolving threats.
As industrial systems become more digitized and connected, federal agencies are pushing for greater accountability and cyber maturity in sectors vital to national security. This latest alert serves as a stark reminder: even low-level threat actors can cause significant harm when systems are left unprotected.