By |Last Updated: May 8th, 2026|6 min read|Categories: Data Exfiltration, Breach, Ransomware|

Contents

Ransomware in energy and utilities, such as attacks on energy, oil and gas have become more frequent, more disruptive, and more costly.

These are no longer isolated IT incidents. They are disrupting operations, exposing sensitive infrastructure data, and costing organizations millions. What is visible publicly, however, is only part of the picture. In 2025 alone, 146 ransomware attacks targeting energy and utilities went undisclosed, highlighting how much activity remains out of sight.

The Attacks Shaping the Sector

Halliburton (US) Data Theft and Operational Disruption at Scale

Group: Linked to the RansomHub 

In mid-2024, Halliburton disclosed that an unauthorized third-party had gained access to its systems, forcing the company to take parts of its IT infrastructure offline.

The impact was immediate. Internal systems were shut down to contain the attack, customers were disconnected from services, and core business functions including invoicing and procurement were disrupted.

Attackers also exfiltrated data from the network, combining disruption with extortion. The company later reported approximately $35 million in losses, underlining how quickly a cyber incident can translate into material financial damage.

This was not a contained incident. It affected a company embedded across global energy supply chains.

American Water (US) Disruption at the Largest Public Utility

American Water, the largest publicly traded water utility in the United States, was hit by a cyberattack that forced the company to shut down parts of its IT systems to contain the incident.

Customer-facing services, including billing and online portals, were taken offline as a precaution. While water and wastewater operations continued, the disruption affected services for millions of customers.

This incident highlights how attacks on IT systems alone can still have widespread impact across critical infrastructure, even when core operations remain unaffected.

Romanian National Water Agency Critical Infrastructure at Scale

A ransomware attack on Romania’s national water authority, Administrația Națională Apele Române (ANAR), highlighted the growing risk to public utilities.

The attack compromised around 1,000 systems, including core IT infrastructure such as servers, databases, and internal platforms, and spread across multiple regional water administrations. Attackers used built-in tools like BitLocker to encrypt systems, forcing parts of the organization offline.

While water operations continued, the agency had to rely on manual processes after losing visibility across key systems.

The incident was not isolated. Around the same period, Romanian oil pipeline operator Conpet was also targeted in a ransomware attack, forcing the company to isolate affected systems and activate incident response measures while maintaining operations.

Together, these incidents highlight how ransomware is increasingly targeting both utilities and energy transport infrastructure, disrupting IT systems while forcing organizations into manual, degraded modes of operation.

Pakistan Petroleum Limited A Near Miss for Operational Technology

Group: Blue Locker

Pakistan’s oil and gas sector came under direct ransomware pressure in 2025, with Pakistan Petroleum Limited (PPL) among the confirmed victims of the Blue Locker campaign.

Attackers gained access to internal systems, encrypted servers, and disrupted operations, prompting warnings to critical infrastructure organizations.

While the intrusion impacted IT systems, core production systems remained unaffected due to containment measures.

This incident highlights how ransomware campaigns are actively targeting national energy infrastructure and how quickly disruption can escalate without effective controls.

Why Energy and Utilities Are Being Targeted

These attacks are not random. Energy and utilities providers present a combination of factors that make them ideal targets.

Immediate Operational Impact

When systems are disrupted, production can stop, services are interrupted, and revenue is affected. This creates urgency, and urgency increases the likelihood of payment.

High-Value Data

Energy providers hold sensitive data including infrastructure designs, operational systems, and supply chain dependencies.

In incidents like Halliburton, data was exfiltrated alongside system disruption. That data can then be used for extortion, resale, or future attacks.

Complex Environments

Energy and utilities providers operate across legacy systems, IT and operational technology environments, and large distributed networks.

These environments increase the attack surface and make it more difficult to detect and prevent data exfiltration.

The Attacks You Don’t See

Ransomware in Energy and Utilities

Despite the severity of the incidents outlined above, they represent only part of the threat landscape.

The 146 undisclosed attacks in 2025 point to a consistent pattern. Many incidents are contained before disruption, others focus solely on data exfiltration, and some are never reported publicly.

This reflects a fundamental shift.

Ransomware is no longer defined by encryption alone. It is defined by the ability to access and exfiltrate data, often without immediate visibility.

Ransomware in energy and utilities sector is becoming more targeted and more effective.

The attacks highlighted here show how disruption, data theft, and operational pressure are being used together to maximize impact. At the same time, the increasing number of undisclosed ransomware incidents demonstrate how much of this activity happens without visibility.

This is the shift. Ransomware is no longer defined by systems being locked. It is defined by data being taken.

The organizations that stay ahead of ransomware and extortion will be those that focus on preventing data exfiltration at the source before attackers can monetize it.

BlackFog’s ADX platform uses AI based anti data exfiltration technology to block ransomware at the source, preventing unauthorized data from ever leaving your endpoints. Rather than relying on detection after a breach occurs, ADX proactively monitors and blocks suspicious outbound traffic in real time, neutralizing threats like Interlock before they can extract sensitive patient data.

Learn more here: ADX Protect.

Share This Story, Choose Your Platform!

Related Posts