Why are people filling plastic bags and taking ill-thought-out plans with gasoline in the North-Eastern region of the United States of America?
The VPN account, which has since been deactivated, didn’t use multifactor authentication, an essential cybersecurity tool, allowing the hackers to breach Colonial’s network using just a compromised username and password. It’s not known how the hackers obtained the correct username or if they were able to determine it on their own.
“We did a pretty exhaustive search of the environment to try and determine how they actually got those credentials,” Carmakal said. “We don’t see any evidence of phishing for the employee whose credentials were used. We have not seen any other evidence of attacker activity before April 29.”
A little more than one week later, on May 7, an employee in Colonial’s control room saw a ransom note demanding cryptocurrency appear on a computer just before 5 a.m. The employee notified an operations supervisor, who immediately began to shut down the pipeline, Colonial Chief Executive Officer Joseph Blount said in an interview. By 6:10 a.m., the entire pipeline had been shut down, Blount said.
It was the first time Colonial had shut down the entirety of its gasoline pipeline system in its 57-year history, Blount said. “We had no choice at that point,” he said. “It was the right thing to do. At that time, we had no idea who was attacking us or their motives.”
Colonial Pipeline made Carmakal and Blount available for an interview in advance of Blount’s testimony next week before Congressional committees, in which he’s expected to provide further detail regarding the scope of the compromise and address the company’s decision to pay ransom to the attackers.
It didn’t take long for news of Colonial’s shutdown to spread. The company’s system transports roughly 2.5 million barrels of fuel daily from the Gulf Coast to the Eastern Seaboard. The outage led to long lines at gas stations, many running out, and higher fuel prices. Colonial began resuming service on May 12.
Soon after the attack, Colonial conducted an exhaustive examination of the pipeline, tracking 29,000 miles on the ground and through the air to look for visible damage. The company ultimately determined the channel wasn’t damaged.
In the meantime, Mandiant was sweeping the network to understand how far hackers had probed while installing new detection tools that would alert Colonial of any follow-on attacks — which aren’t uncommon after a substantial breach, Carmakal said. Investigators haven’t found any evidence the same group of hackers tried to regain access.
“The last thing we wanted was for a threat actor to have active access to a network where there is any possible risk to a pipeline. That was the biggest focus until it was turned back on,” Carmakal said.
Mandiant also traced the hackers’ movements in the network to determine how close they got to compromising systems adjacent to Colonial’s operational technology network — the system of computers that control the actual flow of gasoline. While the hackers did move around within the company’s information technology network, there wasn’t any indication they were able to breach the more critical operational technology systems, he said.
It was only after Mandiant and Colonial were able to conclusively determine that the attack had been contained that they considered re-opening their pipeline, said Blount.
Colonial paid the hackers, who were an affiliate of a Russia-linked cybercrime group known as DarkSide, a $4.4 million ransom shortly after the hack. The hackers also stole nearly 100 gigabytes of data from Colonial Pipeline and threatened to leak it if the ransom wasn’t paid, Bloomberg News reported last month.
Colonial has hired Rob Lee, the founder, and chief executive officer of the Dragos Inc., a cybersecurity firm that focuses on industrial control systems, and John Strand, owner and security analyst at Black Hills Information Security, to consult on its cyber defenses and to focus on warding off future attacks.
In the wake of the attack on his company, Blount said he would like the U.S. government to go after hackers who have found a haven in Russia. “Ultimately, the government needs to focus on the actors themselves. As a private company, we don’t have the political capability to shut down the host countries with these bad actors in them.”