#298944 - 05/11/21 01:13 PM
Pipeline Ransomware Attack
|
INTERCEPTOR
Carpal Tunnel
Registered: 07/15/02
Posts: 3760
Loc: TX
|
Those of you on the East Coast have my sympathy. Your gas prices (when you can even get it) are going to be through the roof. Here's a good article on what happened and what's currently being done. https://www.npr.org/2021/05/10/995405459...al-u-s-pipelineIt attack isn't at all surprising. Similar ransomware attacks have shut down hospitals and even cities. It's one more thing you need to keep in mind. My brother used to be in charge of the IT security for a powerplant up in Alaska and he said back eight years ago they were attacked multiple times per day. I'm sure it's even worse now. -Blast
Edited by Blast (05/11/21 01:15 PM)
|
Top
|
|
|
|
#298949 - 05/11/21 07:27 PM
Re: Pipeline Ransomware Attack
[Re: Blast]
|
Addict
Registered: 11/05/07
Posts: 543
Loc: Wales, UK
|
Seems the attackers didn't shut down the pipeline, but was shutdown as a "precautionary measure". It seems Colonial's automatic invoicing system has been affected. So they can't invoice their clients. https://zetter.substack.com/p/biden-declares-state-of-emergency
Edited by Ren (05/11/21 07:28 PM)
|
Top
|
|
|
|
#298950 - 05/11/21 09:48 PM
Re: Pipeline Ransomware Attack
[Re: Blast]
|
Veteran
Registered: 12/14/09
Posts: 1419
Loc: Nothern Ontario
|
I have been reading Brian Kreb's blog for years due to the in-depth and knowledge he has on many different types of security issues. His latest post is on the Colonial Pipeline ransomware attack and is a very good (and long) read. https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/#more-55529
_________________________
Earth and sky, woods and fields, lakes and rivers, the mountain and the sea, are excellent schoolmasters, and teach some of us more than we can ever learn from books.
John Lubbock
|
Top
|
|
|
|
#298952 - 05/11/21 11:24 PM
Re: Pipeline Ransomware Attack
[Re: Blast]
|
Addict
Registered: 11/05/07
Posts: 543
Loc: Wales, UK
|
It appears Colonial's website is fubar. Throwing 502s and also advertising it's using a 3 year old version of nginx. *facepalm*
Edited by Ren (05/11/21 11:24 PM)
|
Top
|
|
|
|
#298953 - 05/12/21 03:33 AM
Re: Pipeline Ransomware Attack
[Re: chaosmagnet]
|
Crazy Canuck
Carpal Tunnel
Registered: 02/03/07
Posts: 3240
Loc: Alberta, Canada
|
In other words, the threat actor probably regrets this attack due to not getting paid for success and due to the extra attention they will receive from law enforcement and private entities that work on attribution. Yes, I imagine being reclassified from "criminal nuisance" to "terrorist actor" could introduce all sorts of pesky complications into one's business plan.
|
Top
|
|
|
|
#298958 - 05/13/21 10:10 PM
Re: Pipeline Ransomware Attack
[Re: Blast]
|
Addict
Registered: 11/05/07
Posts: 543
Loc: Wales, UK
|
|
Top
|
|
|
|
#298965 - 05/14/21 02:43 PM
Re: Pipeline Ransomware Attack
[Re: Blast]
|
Sheriff
Carpal Tunnel
Registered: 12/03/09
Posts: 3842
Loc: USA
|
Good article, thank you Ren. With regard to paying ransoms, I personally oppose it. Many companies don't have a comprehensive incident response plan, one that goes beyond IT to include Legal, Public Relations, other internal stakeholders, and external stakeholders like business partners and law enforcement. In these events, companies are learning as they go. Often those lessons are quite a bit more painful without a plan. I don't know about the victim in this case, but if we suppose for the sake of the argument that they had an excellent plan including all relevant stakeholders, I imagine their thinking could have gone like this: - We're losing $BIGNUM per hour
- The ransom will save us way more money than it will cost
- We're obligated to our shareholders to stop the losses
Barring a Board of Directors policy forbidding the payment of ransom, the executive leadership of the victim company may very well feel legally compelled to pay it to preserve shareholder value.
|
Top
|
|
|
|
#298967 - 05/14/21 02:57 PM
Re: Pipeline Ransomware Attack
[Re: Blast]
|
Crazy Canuck
Carpal Tunnel
Registered: 02/03/07
Posts: 3240
Loc: Alberta, Canada
|
Well said, Chaos. I wonder if it's becoming a cost of doing business, akin to settling petty lawsuits instead of fighting them in court. I think ransomware insurance is also available now, and that becomes part of the calculation.
|
Top
|
|
|
|
#298968 - 05/14/21 03:21 PM
Re: Pipeline Ransomware Attack
[Re: Blast]
|
Addict
Registered: 11/05/07
Posts: 543
Loc: Wales, UK
|
Does seem to be on the rise, or it's just getting more widely reported. The DC Metropolitan police were prepared to pay $100,000 to prevent officer's records being released publicly. https://arstechnica.com/gadgets/2021/05/...c-police-stall/
Edited by Ren (05/14/21 07:59 PM)
|
Top
|
|
|
|
#298975 - 05/16/21 10:29 PM
Re: Pipeline Ransomware Attack
[Re: Blast]
|
Addict
Registered: 11/05/07
Posts: 543
Loc: Wales, UK
|
It's quite a demonstration of a companies incompetence. Critical infrastructure should be expected to hold up against state actors. Never mind some group trying to make a buck.
Guess they got access pretty easily, much like the Florida water plant attack awhile back. The plant was running a remote desktop server (team viewer IIRC) on the machine that also had the software to control the amount of which chemicals were added to the water.
|
Top
|
|
|
|
#298978 - 05/17/21 06:46 PM
Re: Pipeline Ransomware Attack
[Re: Blast]
|
Crazy Canuck
Carpal Tunnel
Registered: 02/03/07
Posts: 3240
Loc: Alberta, Canada
|
Oh, what a tangled web we weave ...
|
Top
|
|
|
|
#298979 - 05/18/21 01:10 PM
Re: Pipeline Ransomware Attack
[Re: haertig]
|
Sheriff
Carpal Tunnel
Registered: 12/03/09
Posts: 3842
Loc: USA
|
I meant those as a sequence of steps to remedy the current problem. e.g., "(1) Take everything offline" is a limited duration step to allow restoring from backups and fixing of security flaws before going back online in step "(5) Carefully open minimal external networking". I apologize for not being clear; I did understand your meaning. For many organizations, it's safe to say that they do not believe that they can do this without suffering catastrophic financial losses, losses far greater than those caused directly by the ransomware attack. Whether or not that's actually true is a different story. The reputational hit that comes from a shutdown can also be perceived as being too expensive.
|
Top
|
|
|
|
#298982 - 05/19/21 12:49 PM
Re: Pipeline Ransomware Attack
[Re: haertig]
|
Addict
Registered: 03/15/01
Posts: 518
|
"(2) Restore from backups" Not a sure thing. One of my colleagues got hit, and evidently the ransomware was injected months before the attack, so the backup was infected also.
|
Top
|
|
|
|
#298983 - 05/19/21 01:36 PM
Re: Pipeline Ransomware Attack
[Re: NAro]
|
Pooh-Bah
Registered: 03/13/05
Posts: 2322
Loc: Colorado
|
"(2) Restore from backups" Not a sure thing. One of my colleagues got hit, and evidently the ransomware was injected months before the attack, so the backup was infected also. Certainly the quicker you discover a problem, the more likely you are to be able to fix it. Different backup strategies can help. For example, my backups are automated. I keep daily snapshots for six computers on my backup server. Those rollover and are replaced with newer backups when the disks get full. Currently I have a bit less than a years worth of daily file backups for each computer available. And half a years worth of monthly image backups for the Windows computers (I don't do image backups for the Linux ones). This is a more sophisticated backup system than most people have at home.
|
Top
|
|
|
|
|
|
|
|
|
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
8
|
9
|
10
|
11
|
12
|
13
|
14
|
15
|
16
|
17
|
18
|
19
|
20
|
21
|
22
|
23
|
24
|
25
|
26
|
27
|
28
|
29
|
30
|
|
0 registered (),
756
Guests and
13
Spiders online. |
Key:
Admin,
Global Mod,
Mod
|
|
|