Mystery Hackers Target Texas Oilfield Supplier in Ransomware Attack

* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)* [Vulnerabilities -& Threats](/vulnerabilities-threats)* [ICS/OT Security](/ics-ot-security)Mystery Hackers Target Texas Oilfield Supplier in Ransomware Attack Mystery Hackers Target Texas Oilfield Supplier in Ransomware Attack=======================================================================================================================================It remains unclear how the attackers gained access to Newpark Resources’ system, or what they plan to do with any stolen data the strike may have spewed out. ![Picture of Dark Reading Staff](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale ‘Picture of Dark Reading Staff’) [Dark Reading Staff](/author/dark-reading-staff), Dark ReadingNovember 8, 2024 1 Min Read ![An oil pump at sunset](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd1b28fe5d1b28cb8/672e841f844ec417b1c3a878/oil-Don_Mammoser-Alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale ‘An oil pump at sunset’) Source: Don Mammoser via Alamy Stock Photo [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack)[](/cdn-cgi/l/email-protection#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)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack&title=Mystery%20Hackers%20Target%20Texas%20Oilfield%20Supplier%20in%20Ransomware%20Attack) Newpark Resources, a Texas-based oil drilling fluids system and composite matting systems provider, announced in a filing with the Securities and Exchange Commission (SEC) that it is dealing with the fallout of a [ransomware attack](https://www.darkreading.com/cybersecurity-operations/how-law-enforcement-ransomware-strategies-are-evolving) it faced earlier this week.The company has not shared details as to how the attackers gained access to its network, nor who the threat actors are or why they may have targeted Newpark. But after the breach was discovered, Newpark engaged its security response plan as expected and limited access to certain parts of its systems.’The incident has caused disruptions and limitation of access to certain of the company’s information systems and business applications supporting aspects of the company’s operations and corporate functions, including financial and operating reporting systems,’ [Newpark said](https://www.securityweek.com/texas-oilfield-supplier-newpark-hit-by-ransomware/).According to Matt Hull, global head for Strategic Threat Intelligence at cybersecurity consultancy NCC Group, any data stolen from the critical infrastructure company has not yet appeared on any leak sites.And because the company reverted to downtime procedures in response to the attack, it was able to continue manufacturing, and its field operations were uninterrupted. It hopes the attack will not have an effect on its financial conditions, it said.’Organizations are facing an increasingly pressing challenge: maintaining the security benefits of segmentation while enabling controlled connectivity,’ stated Chris Grove, director of cybersecurity strategy at Nozomi Networks, in an emailed statement to Dark Reading. ‘Industrial organizations will need to ensure their defenders can quickly isolate and contain threats, while preventing interruptions to critical operations. This is especially important for sectors where downtime has serious consequences in terms of public safety and economic impact, as would be the case with a [critical infrastructure sector](https://www.darkreading.com/cyber-risk/cisa-publishes-resiliency-playbook-for-critical-infrastructure).’ [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack)[](/cdn-cgi/l/email-protection#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)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cyberattacks-data-breaches/mystery-hackers-texas-oilfield-supplier-ransomware-attack&title=Mystery%20Hackers%20Target%20Texas%20Oilfield%20Supplier%20in%20Ransomware%20Attack) About the Author—————-![Dark Reading Staff](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=400&auto=webp&quality=80&disable=upscale ‘Dark Reading Staff’) [Dark Reading Staff](/author/dark-reading-staff) Dark Reading Dark Reading is a leading cybersecurity media site. [See more from Dark Reading Staff](/author/dark-reading-staff) Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. [Subscribe](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi)You May Also Like*** ** * ** ***More Insights Webinars* [Unleashing AI to Assess Cyber Security Risk](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_dark71&ch=SBX&cid=_upcoming_webinars_8.500001492&_mc=_upcoming_webinars_8.500001492)Nov 12, 2024* [Securing Tomorrow, Today: How to Navigate Zero Trust](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7186&ch=SBX&cid=_upcoming_webinars_8.500001490&_mc=_upcoming_webinars_8.500001490)Nov 13, 2024* [The State of Attack Surface Management (ASM), Featuring Forrester](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7317&ch=SBX&cid=_upcoming_webinars_8.500001501&_mc=_upcoming_webinars_8.500001501)Nov 15, 2024* [Applying the Principle of Least Privilege to the Cloud](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_wiza60&ch=SBX&cid=_upcoming_webinars_8.500001499&_mc=_upcoming_webinars_8.500001499)Nov 18, 2024* [The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7194&ch=SBX&cid=_upcoming_webinars_8.500001491&_mc=_upcoming_webinars_8.500001491)Nov 20, 2024[More Webinars](/resources?types=Webinar) Events* [Know Your Enemy: Understanding Cybercriminals and Nation-State Threat Actors](https://darkreadingve.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7059&ch=SBX&cid=_session_16.500327&_mc=_session_16.500327)Nov 14, 2024* [Cybersecurity Outlook 2025](https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7201&ch=SBX&cid=_session_16.500326&_mc=_session_16.500326)Dec 5, 2024[More Events](/events) ### Editor’s Choice[A virtual computer screen above a keyboard ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt168b66ef9d152bc5/6661e33411eca23f33c7e159/Family_Stock-deepfake-creation-shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)](/vulnerabilities-threats/owasp-genai-security-guidance-growing-deepfakes)[Vulnerabilities -& Threats](/vulnerabilities-threats) [OWASP Beefs Up GenAI Security Guidance Amid Growing Deepfakes](/vulnerabilities-threats/owasp-genai-security-guidance-growing-deepfakes)[OWASP Beefs Up GenAI Security Guidance Amid Growing Deepfakes](/vulnerabilities-threats/owasp-genai-security-guidance-growing-deepfakes) by[Robert Lemos, Contributing Writer](/author/robert-lemos) Nov 4, 2024 5 Min Read [The words ‘Zero Trust’ in purple on two sides of a cube; blue, digital background ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltbf462bae8413394c/672a333ea41d7f142a2bfbca/Zero_trust(1800)_Alexander-Yakimov_Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/vulnerabilities-threats/how-win-cyber-influencing-people)[Vulnerabilities -& Threats](/vulnerabilities-threats) [How to Win at Cyber by Influencing People](/vulnerabilities-threats/how-win-cyber-influencing-people)[How to Win at Cyber by Influencing People](/vulnerabilities-threats/how-win-cyber-influencing-people) by[Gregory R. Simpson](/author/gregory-r-simpson) Nov 5, 2024 5 Min Read [A job classifieds newspaper ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte25dc75c91574848/6723cae10ab4443f50b9047d/jobs-Helen_Sessions-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds)[Application Security](/application-security) [Cybersecurity Job Market Stagnates, Dissatisfaction Abounds](/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds)[Cybersecurity Job Market Stagnates, Dissatisfaction Abounds](/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds) by[Tara Seals, Managing Editor, News, Dark Reading](/author/tara-seals) Oct 31, 2024 4 Min Read Reports* [Managing Third-Party Risk Through Situational Awareness](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_cybo171&ch=&cid=_analytics_7.300006016&_mc=_analytics_7.300006016)Jul 31, 2024* [2024 InformationWeek US IT Salary Report](https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg253&ch=sbx&cid=_analytics_7.300006014&_mc=_analytics_7.300006014)May 29, 2024[More Reports](/resources?types=Report) Webinars* [Unleashing AI to Assess Cyber Security Risk](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_dark71&ch=SBX&cid=_upcoming_webinars_8.500001492&_mc=_upcoming_webinars_8.500001492)Nov 12, 2024* [Securing Tomorrow, Today: How to Navigate Zero Trust](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7186&ch=SBX&cid=_upcoming_webinars_8.500001490&_mc=_upcoming_webinars_8.500001490)Nov 13, 2024* [The State of Attack Surface Management (ASM), Featuring Forrester](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7317&ch=SBX&cid=_upcoming_webinars_8.500001501&_mc=_upcoming_webinars_8.500001501)Nov 15, 2024* [Applying the Principle of Least Privilege to the Cloud](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_wiza60&ch=SBX&cid=_upcoming_webinars_8.500001499&_mc=_upcoming_webinars_8.500001499)Nov 18, 2024* [The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7194&ch=SBX&cid=_upcoming_webinars_8.500001491&_mc=_upcoming_webinars_8.500001491)Nov 20, 2024[More Webinars](/resources?types=Webinar) White Papers* [6 Key Requirements of Multicloud Security](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo246&ch=SBX&cid=_whitepaper_14.500005833&_mc=_whitepaper_14.500005833)* [The State of Vulnerability Management in the Enterprise](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_adaa07&ch=SBX&cid=_whitepaper_14.500005831&_mc=_whitepaper_14.500005831)* [Gartner Report: Cyber Asset Attack Surface Management](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6966&ch=SBX&cid=_whitepaper_14.500005791&_mc=_whitepaper_14.500005791)* [The State of Asset Security: Uncovering Alarming Gaps -& Unexpected Exposures](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6965&ch=SBX&cid=_whitepaper_14.500005790&_mc=_whitepaper_14.500005790)* [SANS Security Awareness Maturity Model](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6823&ch=SBX&cid=_whitepaper_14.500005769&_mc=_whitepaper_14.500005769)[More Whitepapers](/resources?types=Whitepaper) Events* [Know Your Enemy: Understanding Cybercriminals and Nation-State Threat Actors](https://darkreadingve.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7059&ch=SBX&cid=_session_16.500327&_mc=_session_16.500327)Nov 14, 2024* [Cybersecurity Outlook 2025](https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7201&ch=SBX&cid=_session_16.500326&_mc=_session_16.500326)Dec 5, 2024[More Events](/events)

Related Tags:
NAICS: 211 – Oil And Gas Extraction

NAICS: 54 – Professional

Scientific

Technical Services

NAICS: 21 – Mining

Quarrying

Oil And Gas Extraction

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 92 – Public Administration

NAICS: 922 – Justice

Public Order

Safety Activities

Blog: Dark Reading

Software Discovery: Security Software Discovery

Software Discovery

Associated Indicators: