Security

Major Petroleum Company |

Cyber Threat Assessment

Our client was looking for an independent, proactive threat assessment to evaluate their security landscape. Liberty was able to utilize proprietary threat analysis techniques to uncover some unexpected vulnerabilities.

Impact At A Glance

Immediate Vulnerabilities Uncovered:

Our analysis revealed previously unknown vulnerabilities, including exposed account passwords and network weaknesses.

Rapid Response Time:

Within hours, we retrieved and decrypted chat transcripts from the dark web, exposing threats posed by hacking group activities.

Supply Chain Risk Exposure:

Our investigation exposed suppliers’ vulnerabilities and the extent to which sensitive information was being revealed online, highlighting potential risks to the supply chain.

Project Overview

Liberty was engaged by a major petroleum company to evaluate its threat landscape ahead of changing its cyber insurance coverage. The Liberty team quickly assessed the firm’s security and was able to utilize its proprietary business threat intelligence techniques to uncover a host of potentially damaging information on the dark web.

The Business Problem

A major petroleum company was considering transferring some of its terrorism and cyber risk through a specialty insurance program for limits in excess of hundreds of millions of dollars. Although the company was confident in the security of both its IT and OT systems and believed they presented low risk, they contacted Liberty to better understand how threat intelligence could further secure their operations and potentially help them land reasonable coverage.

The Outcome

Within hours, Liberty was able to retrieve, decrypt, and analyze archived chat transcripts from the dark web involving members of the hacking group Anonymous who had been sharing a reconnaissance report of the company’s network and discussing the ease in which the group could disrupt the company’s SCADA systems. Liberty also discovered telecom and SCADA room diagrams, as well as account passwords of employees responsible for equipment installation. Such vulnerabilities can serve as an intelligence windfall that greatly accelerates attack planning. Lastly, threat intelligence collected on the company’s supply chain allowed Liberty to learn the degree to which suppliers were revealing sensitive information about the company via online performance reviews and other media. These same partners were also found by Liberty to have significant network vulnerabilities as well, including a series of exposed hosts and applications that were introducing serious risk both upstream and downstream of the supply chain.

Join Our Newsletter

Join our newsletter to stay informed about the latest industry trends, innovative solutions, and expert analyses. Receive valuable insights, thought leadership, and actionable strategies delivered directly to your inbox. Don't miss out on the opportunity to elevate your business knowledge and be at the forefront of success. Subscribe now and empower your journey with Liberty's trusted expertise.

With Our Deep Experience, Guaranteed Outcomes, and Tailored Approach, We Help Turn Our Clients' Ambitions Into Reality.

What Are Your Ambitions?

Contact Us Today