Customer Logins

Obtain the data you need to make the most informed decisions by accessing our extensive portfolio of information, analytics, and expertise. Sign in to the product or service center of your choice.

Customer Logins

My Logins

All Customer Logins
S&P Global

  • S&P Global
  • S&P Dow Jones Indices
  • S&P Global Market Intelligence
  • S&P Global Mobility
  • S&P Global Commodity Insights
  • S&P Global Ratings
  • S&P Global Sustainable1
Close
Discover more about S&P Global’s offerings
Investor Relations
  • Investor Relations Overview
  • Presentations
  • Investor Fact Book
  • News Releases
  • Quarterly Earnings
  • SEC Filings & Reports
  • Executive Committee
  • Governance
  • Merger Information
  • Stock & Dividends
  • Shareholder Services
  • Contact
English
  • 中文
Contact Us
  • Enterprise Contacts
  • Divisional Contacts
  • Media Contacts
Product Login
S&P Global
  • Who We Are
  • Capabilities
  • Research & Insights
  • Careers
  • Events
    • Our Purpose & Values
    • Our People
    • Our History
    • Corporate Responsibility
    • Diversity, Equity & Inclusion
    • Investor Relations
    From S&P Global
    Press Release: S&P Global Merges With IHS Markit

    On February 28, 2022, S&P Global completed its merger with IHS Markit, the next step in delivering data, technology and expertise that accelerates progress.

    Read: 2021 Annual Report

    As great as last year was for our company, in many ways 2022 is shaping up to be even better. In February, we closed a transformative merger with IHS Markit. We believe combining our two companies will create substantial long-term value for all our stakeholders.

    Read: S&P Global Foundation

    The S&P Global Foundation is about much more than philanthropy—we are about making a difference by finding and developing essential connections between the knowledge- and skill-driven work of S&P Global and the needs of society.

    • Overview
    • Data & Analytics
    • Research & Insights
    • Ratings & Benchmarks
    • Technology Solutions
    • Experts
    • S&P Dow Jones Indices
    • S&P Global Market Intelligence
    • S&P Global Mobility
    • S&P Global Commodity Insights
    • S&P Global Ratings
    • Overview
    • Research Council
    • Markets in Motion
    • Podcasts
    • Videos
    LOOK FORWARD
    Most Popular Insights
    Look Forward: Funding the Future

    As we look ahead to 2030, the world faces unprecedented, accelerated and multifaceted transitions. How can we afford to confront the global challenges of climate, the energy transition and an aging population, and who has the capacity to pay?

    Read: Gender Data Matters

    More work remains to be done to disaggregate gender data on the macroeconomic and individual sector and company level. Measurement is the first step in addressing serious gender disparities.

    Read: Artificial Intelligence Insights

    The advancement of generative AI is equally important to economic development as other major trends. We aim to provide this information in three parts: AI Fundamentals, AI Applications, and AI Governance & Regulation.

    • Overview
    • Our Culture
    • Our Commitment
    • Our Work
    • Search for a Job
    • Featured S&P Global Events
    • Webinar Replays
    • CERAWeek
    • S&P Global Ratings Events
    • S&P Global Market Intelligence Events
    • S&P Global Commodity Insights Events
    • S&P Dow Jones Indices Events
    • S&P Global Mobility Events

Cyber attacks: What the hack

{ "speed": 600, "fade": true, "dots": false, "arrows": false, "autoplay":true, "autoplaySpeed":4000 }
Contents
  • Cyber attacks and geopolitics
  • Incidents
  • Energy sector
  • Security investment
  • Bottom line
  • Research and analysis
  • Solutions
  • FAQs

Cyber attacks through the lens of geopolitics

COVID-19, in addition to catalysing further digitalization — government e-services, remote work, digital currency and e-learning — has accelerated the extent to which we experience life online. People are now connected at an unprecedented scale and speed by digital technology, but this has allowed malicious online actors to behave more aggressively.

The same digital technology that allows people to connect enables cyber threat actors to share innovations, skills and tools. This leads to growing concern from governments and businesses as cyber attacks become more frequent and more complex.

At S&P Global, we recognize that cyber risks are part of the broader geopolitical risk outlook. This means that, much like terrorism, interstate war and other security risks, we must track cyber risks to understanding the broader geopolitical risk environment.

Cyber attacks should be understood as a tool, i.e., a means by which malicious online actors can effect change designed to achieve their desired political or financial ends. As a tool, cyber attacks offer a great deal of anonymity and deniability for the actors involved.

The political and social factors that determine when cyber attacks are employed must be carefully considered. Hybrid warfare is becoming normalized, and cyber threats to governments and companies are increasing.

Quantify the financial impact of cyber risk

Explore Cyber Risk Assessment

Cyber attack incidents in recent years

Critical national infrastructure (CNI), such as the shipping industry and nuclear power plants, has been an especially attractive target for cyber threat actors in recent years. Cyber attacks targeting CNI are an effective way to maximize disruption and damage. A substantial and coordinated effort is required to protect these systems, both public and private, as they are essential to maintain state services and to ensure the business environment within a country operates smoothly.

Some states have invested in significant resources to detect and repel cyber attacks against CNI, but no country can fend off all cyber threats, and no technology is "unhackable."

Australia’s second-largest telecom company, Optus, said Sept. 22, 2022, that the personal data, including license or passport numbers, of nearly 10 million customers was leaked by hackers. Australian Cyber security Minister Clare O’Neil said the data breach was caused by vulnerabilities at Optus as the hack “was not particularly technologically challenging.” A ransom demand was reportedly made for US$1 million in cryptocurrency in exchange for the data, but Optus did not comment on whether the ransom demand was authentic.

Moldova’s Information Technology and Cyber Security Service said in January 2023 that a coordinated phishing attack on government bodies and institutions was attempted. Hackers reportedly targeted more than 1,300 email accounts associated with government services.

This highlights an ongoing battle against cyber risks for Moldova, which recorded a sharp increase in the number of attempted cyber attacks in 2022, possibly due to its support of Ukraine amid the Russia–Ukraine war. Experts warn of an elevated risk of cyber attacks against government and private sector IT networks in Moldova, including against media outlets, government websites and CNI such as power, water and gas distribution networks.

According to experts, hackers have also maintained a constant campaign of cyber attacks against Ukrainian, NATO, EU and other Western entities, principally targeting government and defense-related organizations. Cyber security analysts have suggested that hackers affiliated with Russian military intelligence are becoming more aggressive and more direct in their attacks.

The European Parliament website was inaccessible due to a cyber attack for several hours in late 2022, soon after legislators passed a resolution denouncing Russia as a "state sponsor of terrorism"; a pro-Kremlin group subsequently claimed responsibility for the cyber attack. Separately, the Microsoft Security Threat Intelligence Center has attributed cyber attacks against Ukrainian and Polish transport and security organizations to hackers backed by the GRU, Russia's military intelligence directorate.



<span/>Cyber attacks on the energy sector

In the third quarter of 2022, cyber attacks on energy and commodities infrastructure escalated sharply and reached a record high, according to the October 2022 update of S&P Global Commodity Insights’ “Energy Security Sentinel.”

Only two cyber attacks targeted the energy market in the second quarter of 2022. This increased to five incidents in the third quarter of the same year. These incidents were focused on the power, gas and nuclear sectors rather than oil.

Lithuania's state-owned energy group Ignitis, Ukraine's state nuclear power company Energoatom and Greece's largest natural gas supplier DESFA were among the companies hit by cyber security incidents over this period.

Cyber attacks have emerged as a growing threat to commodity supply chains. As a result, energy companies are prioritizing cyber security. Cyber systems for energy assets are on high alert due to a rise in cyber threats as the West tightens sanctions on Russia over its invasion of Ukraine.

Significant cyber events impacting global power structureSignificant cyber events impacting global power structure
Significant cyber events impacting global power structure




Use of ransomware in energy industry cyber attacks

Ransomware cyber attacks have become an issue for the energy industry. Ransomware typically begins as a phishing attack, an exploitation of internet-exposed vulnerable software or an IT hygiene deficiency (a misconfiguration of an internet-exposed system).

The attacker takes control of the underlying system and can then move to other systems across the network. The malware broadly disables the network, allowing the attacker to hold the target for ransom until it pays, at which time the attacker usually sends a decryption key to unlock the target’s files.

The first major reported ransomware cyber attack within the energy industry was the 2017 WannaCry ransomware attack, with WannaCry being a ransomware variant developed by North Korea that spread widely from company to company to impact businesses across the globe.

In May 2021, the Colonial Pipeline ransomware cyber attack by the DarkSide group raised ransomware alerts across the sector. Colonial was not the first energy company to experience a ransomware attack in 2021. It was not even the only pipeline company to suffer one that month.

The most sensational and well-publicized results of the Colonial incident — the pipeline shutdown and the resulting gasoline shortages and gasoline hoarding — were the result of Colonial’s decision to shut certain systems down for safety, not the result of encryption of those systems.

Measure and manage your cyber risk profile

Learn about Ratings360

Investment in cyber security as a necessary part of the energy transition

Cyber security in global power systems is a necessary pillar of the energy transition, yet investment in this area has struggled to keep up apace with investment in next-generation power resources, smart grids and electrification. Since 2010, seven instances of unique malware cyber attacks have targeted the industrial control systems that reside on the operational technology networks, as opposed to IT networks, of the bulk electric system.

Meanwhile, vulnerabilities to cyber attacks stemming from internet of things devices have flourished throughout the power distribution segment. Cyber security represents a unique business expense for energy transition investors, one that cannot be categorized as a variable or fixed cost.

Cyber security requires continuous investment in an area where best practices are a moving target due to its evolutionary, adversarial and asymmetric nature.

Some of the key features of the energy transition exacerbate the need for cyber security investment in the power industry. For example, the electrification of new industries makes the grid an increasingly valuable target for adversarial nation states, or state actors looking to disrupt economies as well as non-state actors looking to extract a ransom.

<span/> In this sense, cyber security deserves attention as a key coefficient of the energy transition equation.



<span/>The bottom line

Political context is a critical factor when considering the likelihood of a country or company being targeted for significant cyber attacks. Nation-state actors who perform targeted intrusions to inflict damage, disrupt or steal valuable information at the behest of a government are usually the most capable and best-resourced cyber threat actors. Cyber criminals, cyber threat actors who perform malicious attacks for financial gain, may also operate within this context at the behest of nation-state actors.

We believe that approaching cyber attacks and digital threats from a geopolitical perspective permits a better understanding of the motivations, capabilities and exposure of both cyber threat actors and their targets.

<span/>Related cyber attacks research and analysis

Cyberattacks threaten stability of interconnected financial services


Borderless threats in the digital age: assessing cyber-risks on a country level


Reframing the conversation around cyber risk


Russian cyberattack risk may spur US cybersecurity investments

Cyberattacks on oil surge as hackers target commodities


The increase in credit-relevant cyber events


Colonial cyberattack stirs calls for federal pipeline oversight, reform

Looking for cyber attacks solutions?

Cybersecurity package

The Cybersecurity Package is the ultimate one-stop source for technical knowledge, guidance and best practices on cybersecurity, pulling together the latest standards and reference works from the world’s most respected publishers and leading authorities.

Learn More >

Cyber risk solutions

Cyber Risk preparedness empowers companies to build comprehensive strategies with insight into the most pressing risk factors. Employ our Cyber Risk Assessment and Cyber M&A Assessment to support your cyber risk preparedness.

Learn More >

Alliance for telecommunications industry solutions (ATIS)

Standards from the ATIS dictate design, implementation and testing for information and communications technology. From cloud services to cyber security, these standards direct technology development and enable interoperability across the globe.

Learn More >

Cyber attacks FAQs

What is a cyber attack?

A cyber attack is a malicious attempt by an individual or organization to compromise the confidentiality, integrity or availability of information or computer systems. Cyber attacks can take many forms, including hacking, malware, phishing, denial of service and ransomware.

What is a cyber attack in war?

A cyber attack in war refers to the use of digital tools to disrupt, disable or destroy an adversary's military capabilities or infrastructure. Cyber attacks can target a wide range of systems, including command and control networks, weapons systems, communication systems and critical infrastructure.

Which countries are most vulnerable to cyber attacks?

The countries considered most vulnerable to cyber attacks are those with significant political instability, conflict and weak governance. Countries that have a high dependence on technology and are highly interconnected are also more vulnerable to cyber attacks.

How vulnerable is the US to cyber attacks?

The US is an attractive target for cyber attacks due to its significant presence in critical infrastructure sectors and its high dependence on technology. The US has a high level of cyber maturity and capabilities, but it faces a range of cyber threats.

Why is the power grid so vulnerable to cyber attacks?

The power grid is vulnerable to cyber attacks due to the convergence of information technology and operational technology networks, electrification, the growth in variable energy resources, decentralization and the proliferation of internet of things devices.

How can we prepare for cyber attacks on the power grid?

To prepare for a cyber attack on the power grid, a proactive cyber security investment culture, increased private sector understanding of cyber risks and quicker development and publication of new regulations with expanded scope are necessary to cope with the rapid pace of cyber threats.

{}
{"items" : [ {"name":"share","enabled":true,"desc":"<strong>Share</strong>","mobdesc":"Share","options":[ {"name":"facebook","url":"https://www.facebook.com/sharer.php?u=http%3a%2f%2fwww.spglobal.com%2fen%2fenterprise%2fgeopolitical-risk%2fcyber-attacks%2f","enabled":true},{"name":"twitter","url":"https://twitter.com/intent/tweet?url=http%3a%2f%2fwww.spglobal.com%2fen%2fenterprise%2fgeopolitical-risk%2fcyber-attacks%2f&text=Cyber+attacks%3a+What+the+hack+%7c+S%26P+Global","enabled":true},{"name":"linkedin","url":"https://www.linkedin.com/sharing/share-offsite/?url=http%3a%2f%2fwww.spglobal.com%2fen%2fenterprise%2fgeopolitical-risk%2fcyber-attacks%2f","enabled":true},{"name":"email","url":"?subject=Cyber attacks: What the hack | S&P Global&body=http%3a%2f%2fwww.spglobal.com%2fen%2fenterprise%2fgeopolitical-risk%2fcyber-attacks%2f","enabled":true},{"name":"whatsapp","url":"https://api.whatsapp.com/send?text=Cyber+attacks%3a+What+the+hack+%7c+S%26P+Global http%3a%2f%2fwww.spglobal.com%2fen%2fenterprise%2fgeopolitical-risk%2fcyber-attacks%2f","enabled":true}]}, {"name":"rtt","enabled":true,"mobdesc":"Top"} ]}
Filter Sort
  • Our Purpose & Values
  • Press
  • Ventures
  • Contact Us
  • Report an Ethics Concern
  • Office Locations
  • Careers
  • Corporate Responsibility
  • History
  • Investor Relations
  • Leadership
  • IOSCO ESG Rating & Data Product Statements
  • © 2024 S&P Global
  • Terms of Use
  • Cookie Notice
  • Privacy Policy
  • Client Privacy Portal
  • Do Not Sell or Share My Personal Information
  • 中文