U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack – Security Intelligence

U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack
More than a year ago, a ransomware attack made the news across the nation. The Colonial Pipeline Company announced on May 7, 2021, that the DarkSide Ransomware-as-a-Service group, based in eastern Europe, had hit it. The FBI has since confirmed DarkSide, which has since shut down, as the threat actors. What’s changed about U.S. cyber policy since then, including in the wake of the Russian attack on Ukraine
An important note: the attack impacted the IT side of the business. As a precaution, the company shut down the operational technology (OT) side, meaning the pipeline itself. The Colonial Pipeline stretches 5,500 miles from Texas to New York, carrying up to 3 million barrels of fuel per day. The five-day shutdown cut off the East Coast from roughly half the normal supply of gasoline and jet fuel. That led to a sharp rise in gas prices, as well as gas shortages, panic buying and long lines at gas stations. 
More than that, it shocked the national security and law enforcement worlds. Both learned anew that the nation’s critical infrastructure was open to attack. 
Colonial Pipeline paid $4.5 million in ransom to restore its compromised systems. The DarkSide recovery tools were so slow that the company ended up mostly using its business continuity tools instead. 
In the wake of the attack, negotiations between the United States and Russia began. The Russian Federal Security Service arrested a person alleged to be behind the attack. (Any cooperation here ended after the Russian invasion of Ukraine in February.) Meanwhile, the U.S. State Department is still offering a reward of up to $10 million to name or locate any DarkSide leader.
Now, Colonial Pipeline is facing a possible $1 million fine for operational lapses and management failures leading up to the attack. The biggest alleged failure was poor preparation for the shutdown and restart of its pipeline. 
The attack also sped up the political momentum for the government to pass new laws. New cybersecurity directives apply to pipeline operators and other critical infrastructure companies.
The Transportation Security Administration issued two major mandatory directives for all U.S. pipeline operators around cybersecurity and disclosure.
The federal Cybersecurity and Infrastructure Security Agency announced on April 20 that they’re expanding their Joint Cyber Defense Collaborative advisory board, itself established in August 2021, to include industrial control systems experts. They also published a document filled with nitty-gritty details about specific Russia-sponsored threats to IT and OT systems in response to heightened risk resulting from the Russia-Ukraine conflict. 
In other words, the government, the pipeline industry and the cybersecurity world are still grappling with the aftermath of the Colonial Pipeline attack. 
The Colonial Pipeline attack shows how small lapses or easy attacks can lead to major problems. It’s a chance for other businesses to consider improvements to their own policies and procedures. It also unearthed a new, previously under-appreciated link between IT and OT. (Remember, the voluntary shutdown of its OT — stopping the pipeline flow of gas — did all the damage. That created all the public concern, but it was IT the attackers targeted.)
DarkSide hackers used an old password to access Colonial’s IT networks through a VPN without multi-factor authentication. How well this simple attack worked reveals five points that should be top of mind today: 
The bottom line takeaway from the Colonial Pipeline attack: the part of the business attacked and the part of the business affected are not always connected. The sophistication of the attack and the impact aren’t, either. 
Yes, embrace high-tech tools, AI and other leading-edge solutions. But also get the basics and the architecture right. Have a backup plan for the actions you’ll take if an attack actually does occur. That way, you’ll have more options than a complete shutdown, whatever the future brings. 
I write a popular weekly column for Computerworld, contribute news analysis pieces for Fast Company, and also write special features, columns and think piece…
3 min readThe protection of the SAP systems, as mission-critical applications, is becoming the priority for the most relevant organizations all over the world. The security hardening of SAP systems is key in these uncertain times, where threat actors start seeing SAP…
As ransomware-related payments surged toward $600 million in the first half of 2021, the U.S. government knew it needed to do more to fight back against cyber criminals. For many years, the Treasury’s Office of Foreign Assets Control (OFAC) had a Specially Designated Nationals and Blocked Persons List (SDN List for people or organizations acting against the national security, foreign…
Cybersecurity at U.S. federal agencies has been running behind the times for years. It took an executive order by President Joe Biden to kickstart a fix across the agencies. The government initiative also serves as a wake-up call to enterprises lagging in getting zero trust up and running. Several organizations, including the Office of Management and Budget (OMB), the Cybersecurity and…
The Cybersecurity and Infrastructure Security Agency (CISA) recently published a report highlighting a range of critical security vulnerabilities requiring attention from organizations of all types. The report was published with input from the National Security Agency (NSA) and similar agencies worldwide. It should be considered essential reading.  Many of the vulnerabilities in the report are not new. Instead, the report…
What happens when attackers breach local government, police departments or public health services? What would happen if attackers compromised the U.S. Treasury’s network? These types of incidents happen every month and lead to service interruptions at the very least. More serious problems could occur, such as leakage of classified data or damage to critical infrastructure. What about the cost of…
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.

source

Leave a Comment