July 25, 2022 By Mike Elgan 3 min read

More than a year ago, a ransomware attack made the news across the nation. The Colonial Pipeline Company announced on May 7, 2021, that the DarkSide Ransomware-as-a-Service group, based in eastern Europe, had hit it. The FBI has since confirmed DarkSide, which has since shut down, as the threat actors. What’s changed about U.S. cyber policy since then, including in the wake of the Russian attack on Ukraine?

An important note: the attack impacted the IT side of the business. As a precaution, the company shut down the operational technology (OT) side, meaning the pipeline itself. The Colonial Pipeline stretches 5,500 miles from Texas to New York, carrying up to 3 million barrels of fuel per day. The five-day shutdown cut off the East Coast from roughly half the normal supply of gasoline and jet fuel. That led to a sharp rise in gas prices, as well as gas shortages, panic buying and long lines at gas stations.

More than that, it shocked the national security and law enforcement worlds. Both learned anew that the nation’s critical infrastructure was open to attack.

Colonial Pipeline paid $4.5 million in ransom to restore its compromised systems. The DarkSide recovery tools were so slow that the company ended up mostly using its business continuity tools instead.

In the wake of the attack

In the wake of the attack, negotiations between the United States and Russia began. The Russian Federal Security Service arrested a person alleged to be behind the attack. (Any cooperation here ended after the Russian invasion of Ukraine in February.) Meanwhile, the U.S. State Department is still offering a reward of up to $10 million to name or locate any DarkSide leader.

Now, Colonial Pipeline is facing a possible $1 million fine for operational lapses and management failures leading up to the attack. The biggest alleged failure was poor preparation for the shutdown and restart of its pipeline.

The attack also sped up the political momentum for the government to pass new laws. New cybersecurity directives apply to pipeline operators and other critical infrastructure companies.

New U.S. directives for pipelines

The Transportation Security Administration issued two major mandatory directives for all U.S. pipeline operators around cybersecurity and disclosure.

The federal Cybersecurity and Infrastructure Security Agency announced on April 20 that they’re expanding their Joint Cyber Defense Collaborative advisory board, itself established in August 2021, to include industrial control systems experts. They also published a document filled with nitty-gritty details about specific Russia-sponsored threats to IT and OT systems in response to heightened risk resulting from the Russia-Ukraine conflict.

In other words, the government, the pipeline industry and the cybersecurity world are still grappling with the aftermath of the Colonial Pipeline attack.

The Colonial Pipeline attack shows how small lapses or easy attacks can lead to major problems. It’s a chance for other businesses to consider improvements to their own policies and procedures. It also unearthed a new, previously under-appreciated link between IT and OT. (Remember, the voluntary shutdown of its OT — stopping the pipeline flow of gas — did all the damage. That created all the public concern, but it was IT the attackers targeted.)

Takeaways for businesses

DarkSide hackers used an old password to access Colonial’s IT networks through a VPN without multi-factor authentication. How well this simple attack worked reveals five points that should be top of mind today:

  1. All passwords must expire. Businesses need good password management in general, and to sunset passwords in particular. It’s not enough to add new, strong passwords.
  2. Passwords aren’t a good idea. To rely on passwords for security is to rely on people. That leaves you open to human error, insider threats and social engineering. The sooner we can move beyond passwords, the better.
  3. Multi-factor authentication is a must. Any single-factor authentication scheme represents a nearly open door to cyber attackers.
  4. Know your air gaps. Where are the air gaps (if any) between IT and OT systems? Know what your network segmentation looks like.
  5. Zero trust works. Perimeter security is a thing of the past. Getting inside the perimeter, through a virtual private network or any other means, creates massive vulnerability. Strong zero trust would have thwarted this attack. Even if an attacker managed to defeat user authentication protocols, they wouldn’t be able to progress further into the device and software.

The bottom line takeaway from the Colonial Pipeline attack: the part of the business attacked and the part of the business affected are not always connected. The sophistication of the attack and the impact aren’t, either.

Yes, embrace high-tech tools, AI and other leading-edge solutions. But also get the basics and the architecture right. Have a backup plan for the actions you’ll take if an attack actually does occur. That way, you’ll have more options than a complete shutdown, whatever the future brings.

More from Government

CIRCIA feedback update: Critical infrastructure providers weigh in on NPRM

3 min read - In 2022, the Cyber Incident for Reporting Critical Infrastructure Act (CIRCIA) went into effect. According to Secretary of Homeland Security Alejandro N. Mayorkas, "CIRCIA enhances our ability to spot trends, render assistance to victims of cyber incidents and quickly share information with other potential victims, driving cyber risk reduction across all critical infrastructure sectors."While the law itself is on the books, the reporting requirements for covered entities won't come into force until CISA completes its rulemaking process. As part of…

Important details about CIRCIA ransomware reporting

4 min read - In March 2022, the Biden Administration signed into law the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency (CISA) to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments.The CIRCIA incident reports are meant to enable CISA to:Rapidly deploy resources and render assistance to victims suffering attacksAnalyze incoming reporting across sectors to spot trendsQuickly share information with network defenders to warn other…

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today