Professional Documents
Culture Documents
1 ABSTRACT
Pemex is the most important Mexican company "responsible for the gener-
ation of 2.5 million barrels of oil daily and more than 6 million cubic feet of natural gas"
(Pemex, 2015). Pemex's operations are distributed nationwide, which is the first
reason it is an exciting target for hackers. Pemex's infrastructure is massive in the
country; it includes but is not limited to refineries, eight complexes, maritime
terminals, among others. With which they serve more than 10,000 service stations
in the country [4]; according to Moody’s, in 2019, Pemex obtained US$74.4 billion
in revenue and accumulated $100.3 billion in assets [5].
Evidence is found that a wide range of possible attack surfaces exists; in the
big picture, there are:
Six refineries.
Eight petrochemical complexes.
Nine gas processing complexes.
83 maritime terminals.
30 oil wells.
300 platforms.
Four complexes of active exploration.
Fifteen complexes of active production.
Nationwide oil and gas pipelines.
10,000 service stations.
Pemex Executive Tower in México city.
Adversary
According to Reuters, Pemex detected the at-
tack on Sunday, 10, 2019. [9] To address a more precise
attack description, the news source, "El Financiero."
Provided extra information related to the event, so it
is possible to understand this security incident as a
Victim
three-phased event as follows:
Phase 1 Reconnaissance: In this part, the attack vector was malicious entry
points detected by the Adversary.
Phase 2 Delivery and access gain: FireEye determined that the initial infec-
tion was generated by the delivery of Dridex trojan, with which the Adver-
sary gained access to the victim network [11].
Phase 3 Infection and lateral movements: In the Pemex official version, Ad-
versary executed Ryuk ransomware, Stated and analyzed by Reuters, the
Adversary Customer: Presumably, the attack was carried out by former members
of TA505, that crafted their version of BitPaymer, namely DoppelPaymer.[11]
Capability Capacity
3 POLICY ASSESSMENT
Several attacks have been deployed in México to the public and private
sectors; it is necessary to depict how big this issue is since the ransomware attack
has increased worldwide. México has ranked as the second most attacked coun-
try in terms of cybersecurity in 2020, according to expansion [3]. With costs of
USD 7,000 in 2017 and increasing, according to Telmex [13]. México government
is walking towards standardization and protection of digital assets by creating
SectionNumber
The document has stated how the government must push different eco-
nomic sectors to prevent information thievery. Still, it is essential to mention a
key aspect, and it is the inter-governments detection and response. Deploying a
framework and a commission by itself is not enough because the framework
could only provide best practices to different companies; the inter-government
relation must be supported by a cybersecurity law, which describes the penalties
and sanctions given to a threat actor. Understanding the nature of the internet
will happen that most of the time, the cybercriminals will not be located in
México. Still, the failure to produce or address sanctions for cybercrimes will ex-
pose México as a paradise for the criminals to live caused by the lack of capacity
to determine proper sanctions to infractors.
By Striking:
And adding:
4 CONCLUSION
References.
[1] Richards J. Heuer Jr. Psychology of Intelligence Analysis. Central Intelligence Agency,
1999.
[2] El Universal. (2018, November 07). México, principal objetivo de ciberataques en Latinoamé-
rica. Retrieved November 18, 2020, from https://www.eluniversal.com.mx/ciencia-y-
salud/tecnologia/mexico-principal-objetivo-de-ciberataques-en-latinoamerica
[3] Chávez, G. (2020, September 30). México es el segundo país en América Latina con más ne-
gocios hackeados. Retrieved November 29, 2020, from https://expansion.mx/tecnolo-
gia/2020/09/30/mexico-es-el-segundo-pais-en-america-latina-con-mas-negocios-hackeados
[4] Pemex. (2018). Petróleos Mexicanos. Retrieved November 26, 2020, from https://www.pe-
mex.com/en/about-pemex/Paginas/default.aspx
[7] Pemex. (2020, March 05). Petróleos Mexicanos. Retrieved November 27, 2020, from
https://www.pemex.com/nuestro-negocio/pep/Paginas/default.aspx
[8] Huawei. (n.d.). Digital Pemex: Increasing Efficiency and Profitability in a More Competitive
Scenario. Retrieved December 01, 2020, from https://e.huawei.com/topic/leading-new-ict-
en/digital-pemex-case.html
[9] Barrera, A., & Satter, R. (2019, November 13). Hackers demand $5 million from Mexico's
Pemex in cyberattack. Retrieved December 01, 2020, from https://www.reuters.com/article/us-
mexico-pemex-idUSKBN1XN03A
[10] Nava, D., & Sánchez, I. (2019, November 14). Esto es lo que sabemos del ataque cibernético
a Pemex. Retrieved November 30, 2020, from https://www.elfinanciero.com.mx/economia/esto-
es-lo-que-sabemos-del-ataque-cibernetico-a-pemex
[11] Argire, I. (2019, November 12). Mexican Oil Company Pemex Hit by Ransomware. Re-
trieved November 30, 2020, from https://www.securityweek.com/mexican-oil-company-pemex-
hit-ransomware
[12] Yehoshua, M. (2019, November 14). Ransomware Attack At Mexico's Pemex Could Have
Been Avoided. Retrieved November 26, 2020, from https://blog.scadafence.com/ransomware-
attack-at-mexicos-pemex-could-have-been-avoided
[15] Memon, Z. (2019, March 01). Why You Still Don't Need Antivirus Software on Linux in
2020. Retrieved December 01, 2020, from https://linuxhint.com/why_no_antivirus_linux/