{"id":40858,"date":"2021-05-13T07:17:00","date_gmt":"2021-05-13T07:17:00","guid":{"rendered":"http:\/\/8955be13-c03f-4937-be80-32f002b1123a"},"modified":"2021-05-13T07:17:00","modified_gmt":"2021-05-13T07:17:00","slug":"colonial-pipeline-attack-everything-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/","title":{"rendered":"Colonial Pipeline attack: Everything you need to know"},"content":{"rendered":"<p>The real-world consequences of a successful cyberattack have been clearly highlighted this week with the closure of one of the US&#8217; largest pipelines due to ransomware.&nbsp; <\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<\/p><\/div>\n<p>Here&#8217;s everything we know so far.&nbsp; <\/p>\n<p>On Friday, May 7, Colonial Pipeline <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-cyberattack-shuts-down-pipeline-that-supplies-45-of-east-coasts-fuel\/\" target=\"_blank\" rel=\"noopener noreferrer\">said that a cyberattack<\/a> forced the company to proactively close down operations and freeze IT systems after becoming the victim of a cyberattack.&nbsp; <\/p>\n<p>This measure &#8220;temporarily halted all pipeline operations&#8221; and cybersecurity firm <a href=\"https:\/\/www.reuters.com\/article\/usa-stocks-fireeye\/fireeye-shares-jump-after-pipeline-cyberattack-idUSL1N2MX19M\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">FireEye<\/a>, which operates the Mandiant cyberforensics team, was reportedly pulled in to assist.&nbsp;<\/p>\n<div id=\"listicle-07c9c827-1f24-499b-8034-a1201f2aef01\" class=\"shortcode listicle listicle-07c9c827-1f24-499b-8034-a1201f2aef01\" readability=\"18.248837209302\">\n<h2> What is Colonial Pipeline? <\/h2>\n<p>Founded in 1962 and headquartered in Alpharetta, Georgia, privately-held&nbsp;<a href=\"https:\/\/www.colpipe.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Colonial Pipeline<\/a>&nbsp;is one of the largest pipeline operators in the United States and provides roughly 45% of the East Coast&#8217;s fuel, including gasoline, diesel, home heating oil, jet fuel, and military supplies.&nbsp;<\/p>\n<p>The company says that it transports over 100 million gallons of fuel daily across an area spanning Texas to New York.<\/p>\n<\/p><\/div>\n<div id=\"listicle-eb0f159d-a28a-4f6d-b107-daec736947ef\" class=\"shortcode listicle listicle-eb0f159d-a28a-4f6d-b107-daec736947ef\" readability=\"54.382653061224\">\n<h2> How did the Colonial Pipeline ransomware attack happen? <\/h2>\n<p>There are few concrete details on how the cyberattack took place, and it is likely that this will not change until Colonial Pipeline and the third-party company brought in to investigate have concluded their analysis of the incident.&nbsp;<\/p>\n<p>However, what did occur was a ransomware outbreak, linked to the DarkSide group, that struck Colonial Pipeline&#8217;s networks.&nbsp;<\/p>\n<p>The initial attack vector isn&#8217;t known, but it may have been an old, unpatched vulnerability in a system; a phishing email that successfully fooled an employee; the use of access credentials purchased or obtained elsewhere that were leaked previously, or any other number of tactics employed by cybercriminals to infiltrate a company&#8217;s network.<\/p>\n<p>It should be noted that DarkSide operators targeted the business side rather than operational systems, which implies the intent was money-orientated rather than designed to send the pipeline crashing down.<\/p>\n<p>The oil giant said it &#8220;proactively took certain systems offline to contain the threat, which temporarily halted all pipeline operations, and affected some of our IT systems.&#8221;<\/p>\n<p>Colonial Pipeline&#8217;s update,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-aims-to-restore-operations-by-end-of-the-week-after-cyberattack\/\" target=\"_blank\" rel=\"noopener noreferrer\">published on Monday 10<\/a>, said that remediation is ongoing and each system is being worked on in an &#8220;incremental approach.&#8221;<\/p>\n<p>&#8220;This plan is based on a number of factors with safety and compliance driving our operational decisions, and the goal of substantially restoring operational service by the end of the week,&#8221; the company added.&nbsp;<\/p>\n<p>In a further update, Colonial Pipeline said that one line is operating under manual control while supplies of gas are &#8220;available.&#8221;<\/p>\n<p>&#8220;While our main lines continue to be offline, some smaller lateral lines between terminals and delivery points are now operational as well. We continue to evaluate product inventory in storage tanks at our facilities and others along our system and are working with our shippers to move this product to terminals for local delivery.&#8221;<\/p>\n<\/p><\/div>\n<div id=\"listicle-a8ed0835-cfb2-4319-81ad-4cc24507533a\" class=\"shortcode listicle listicle-a8ed0835-cfb2-4319-81ad-4cc24507533a\" readability=\"28.387461459404\">\n<h2> Why does the Colonial Pipeline ransomware attack matter? <\/h2>\n<p> <span class=\"imageContainer\"> <span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" class=\"lazy\" alt=\"colonial-pipeline-system-map.jpg\" height=\"auto\" width=\"1200\" data-original=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/08\/a9ec5ed0-d186-4ef4-b8aa-af02d1a0901c\/resize\/1200xauto\/b2bd88d06e246c597c8a6aac9a141b93\/colonial-pipeline-system-map.jpg\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/08\/a9ec5ed0-d186-4ef4-b8aa-af02d1a0901c\/resize\/1200xauto\/b2bd88d06e246c597c8a6aac9a141b93\/colonial-pipeline-system-map.jpg\" class alt=\"colonial-pipeline-system-map.jpg\" height=\"auto\" width=\"1200\"><\/span><\/noscript> <\/span> <\/p>\n<p>As shown in the company&#8217;s operations map, by taking out the systems supporting and managing pipeline operation and fuel distribution, vast swathes of the US have been impacted.&nbsp;<\/p>\n<p>At the time of the attack, supply shortage concerns prompted gasoline futures to reach their highest level in&nbsp;<a href=\"https:\/\/www.cnbc.com\/2021\/05\/09\/gasoline-futures-jump-as-much-of-vital-pipeline-remains-shutdown-following-cyberattack.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">three years<\/a>. Demand has risen, but drivers are being urged not to panic buy, as this could impact prices that have already increased due to the pipeline disruption&nbsp;<a href=\"https:\/\/www.reuters.com\/article\/usa-gasoline-colonial-pipeline\/us-pump-prices-head-for-highest-since-2014-as-hacked-fuel-pipeline-shut-idUSL1N2MX1NL\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">by six cents<\/a>&nbsp;per gallon in the past week.&nbsp;<\/p>\n<p>With normal operations not expected to resume until, at best, the end of the week, we are likely to see fluctuations &#8212; and potentially further price increases &#8212; in fuel supplies across impacted areas in the US.&nbsp;<\/p>\n<p>US President Biden has also been briefed on the event. If anything highlights just how serious a cyberattack has become, it is this.&nbsp;<\/p>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-just-got-very-real-and-its-likely-to-get-worse\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Ransomware just got very real. And it&#8217;s likely to get worse<\/strong><\/a><\/p>\n<\/p><\/div>\n<div id=\"listicle-43935a5c-bfe7-49d9-9e6f-d21d88eb032d\" class=\"shortcode listicle listicle-43935a5c-bfe7-49d9-9e6f-d21d88eb032d\" readability=\"58.802992518703\">\n<h2> Will there be gas shortages? <\/h2>\n<p> <span class=\"imageContainer\"> <span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" class=\"lazy\" alt=\"screenshot-2021-05-12-at-12-15-13.png\" height=\"auto\" width=\"1200\" data-original=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/12\/50ce6827-4b4d-4338-95b1-98d4e8134e74\/resize\/1200xauto\/55a97deacb881047c42e4d3460b11830\/screenshot-2021-05-12-at-12-15-13.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/12\/50ce6827-4b4d-4338-95b1-98d4e8134e74\/resize\/1200xauto\/55a97deacb881047c42e4d3460b11830\/screenshot-2021-05-12-at-12-15-13.png\" class alt=\"screenshot-2021-05-12-at-12-15-13.png\" height=\"auto\" width=\"1200\"><\/span><\/noscript> <\/span><figcaption> <span class=\"credit\">Patrick De Haan<\/span> <\/figcaption><p>Late Tuesday evening, White House press secretary Jen Psaki said the US government is &#8220;monitoring supply shortages in parts of the Southeast,&#8221; as <a href=\"https:\/\/www.independent.co.uk\/news\/world\/americas\/us-politics\/colonial-pipeline-gas-prices-white-house-b1845563.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">reported by<\/a> The Independent, and &#8220;are evaluating every action the Administration can take to mitigate the impact as much as possible.&#8221;<\/p>\n<p>In other words, it is possible. Disruption to the supply lines for potentially a full week, or more, could lead to supply problems for consumers, aviation, and the military &#8212; especially if the security incident incites the former to panic-buy. Some gas stations have already begun running dry and panic buying <a href=\"https:\/\/www.nytimes.com\/2021\/05\/11\/business\/colonial-pipeline-shutdown-latest-news.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">has been reported<\/a> in some areas.&nbsp;<\/p>\n<p>On May 12, Colonial Pipeline said the company continues to &#8220;make forward progress in our around-the-clock efforts to return our system to service.&#8221;<\/p>\n<p>Additional lateral systems are now being operated manually to deliver supplies, with priority given to areas that are either not being supported by other fuel delivery services or currently experiencing shortages.&nbsp;<\/p>\n<p>Over 50 members of staff are now walking or driving along over 5,000 miles of pipeline per day in addition to increased aerial patrols.&nbsp;<\/p>\n<p>Since the pipeline system was taken offline, the company has delivered roughly 41 million gallons of fuel.&nbsp;<\/p>\n<p>Colonial Pipeline is working with the US Department of Energy (DOE) to &#8220;evaluate market conditions&#8221; and deliver supplies to where they are needed most.&nbsp;<\/p>\n<p>84 million gallons of fuel have been accepted from refineries for &#8220;deployment upon restart&#8221; of the firm&#8217;s network.&nbsp;<\/p>\n<p>On May 13, the <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-restarts-operations-brought-down-by-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">company said<\/a>&nbsp;that operations had restarted, but it could take several days for the delivery supply chain to return to normal.<\/p>\n<p>&#8220;Some markets served by Colonial Pipeline may experience, or continue to experience, intermittent service interruptions during the start-up period,&#8221; Colonial Pipeline commented. &#8220;Colonial will move as much gasoline, diesel, and jet fuel as is safely possible and will continue to do so until markets return to normal.&#8221;<\/p>\n<\/p><\/div>\n<div id=\"listicle-c5f1efc4-3368-480f-9b84-22d529777b6e\" class=\"shortcode listicle listicle-c5f1efc4-3368-480f-9b84-22d529777b6e\" readability=\"49.717629846379\">\n<h2> Have any agencies become involved? <\/h2>\n<p><strong>FMCSA<\/strong><\/p>\n<p>To keep supplies flowing, the USDOT Federal Motor Carrier Safety Administration (FMCSA) issued a&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/pipeline-ransomware-attack-us-invokes-emergency-transport-rules-to-keep-fuel-flowing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Regional Emergency Declaration<\/a>&nbsp;on Sunday 9, easing standard restrictions on the land transport of fuel and the permissible working hours of drivers.&nbsp;<\/p>\n<p>&#8220;FMCSA is issuing a temporary hours of service exemption that applies to those transporting gasoline, diesel, jet fuel and other refined petroleum products to Alabama, Arkansas, District of Columbia, Delaware, Florida, Georgia, Kentucky, Louisiana, Maryland, Mississippi, New Jersey, New York, North Carolina, Pennsylvania, South Carolina, Tennessee, Texas and Virginia,&#8221; the agency&nbsp;<a href=\"https:\/\/www.fmcsa.dot.gov\/newsroom\/fmcsa-responds-unanticipated-shutdown-colonial-pipeline\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">said<\/a>.&nbsp;<\/p>\n<p><strong>The FBI<\/strong><br \/>The US Federal Bureau of Investigation (FBI) is also aware of the incident. On May 10, the law enforcement&nbsp;<a href=\"https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/fbi-statement-on-compromise-of-colonial-pipeline-networks\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">agency said<\/a>:<\/p>\n<blockquote readability=\"7\">\n<p>&#8220;The FBI confirms that the Darkside ransomware is responsible for the compromise of the Colonial Pipeline networks. We continue to work with the company and our government partners on the investigation.&#8221;<\/p>\n<\/blockquote>\n<p><strong>CISA<\/strong><\/p>\n<p>The Cybersecurity and Infrastructure Security Agency (CISA), together with the FBI, <a href=\"https:\/\/www.zdnet.com\/article\/fbi-cisa-publish-alert-on-darkside-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">issued an alert<\/a> warning organizations that DarkSide affiliates have &#8220;recently been targeting organizations across various CI sectors including manufacturing, legal, insurance, healthcare, and energy.&#8221; Best practices and cybersecurity recommendations were also provided.<\/p>\n<\/p><\/div>\n<div id=\"listicle-ed3f856d-7209-4375-a83d-fabea7f12d37\" class=\"shortcode listicle listicle-ed3f856d-7209-4375-a83d-fabea7f12d37\" readability=\"80.050665800585\">\n<h2> Who is DarkSide? <\/h2>\n<p> <span class=\"imageContainer\"> <span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" class=\"lazy\" alt=\"screenshot-2021-05-12-at-11-53-15.png\" height=\"auto\" width=\"1200\" data-original=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/12\/042112a3-6233-47f9-9d5f-93bec8f782d2\/resize\/1200xauto\/7ba6647e5669a0b7d5b7b2199f36b48f\/screenshot-2021-05-12-at-11-53-15.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/05\/12\/042112a3-6233-47f9-9d5f-93bec8f782d2\/resize\/1200xauto\/7ba6647e5669a0b7d5b7b2199f36b48f\/screenshot-2021-05-12-at-11-53-15.png\" class alt=\"screenshot-2021-05-12-at-11-53-15.png\" height=\"auto\" width=\"1200\"><\/span><\/noscript> <\/span><figcaption> <span class=\"credit\">Sophos<\/span> <\/figcaption><p>DarkSide is a&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/darkside-the-ransomware-group-responsible-for-colonial-pipeline-cyberattack-explained\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware-as-a-Service (RaaS) group<\/a>&nbsp;that offers its own brand of malware to customers on a subscription basis. The ransomware is currently in version 2.&nbsp;<\/p>\n<p>According to&nbsp;<a href=\"https:\/\/exchange.xforce.ibmcloud.com\/collection\/06d0917405c36ca91f5db1fe0c01d1ad\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">IBM X-Force<\/a>, the malware, once deployed, steals data, encrypts systems using Salsa20 and RSA-1024 encryption protocols, and executes an encoded PowerShell command to delete volume shadow copies.<\/p>\n<p>SecureWorks tracks them as&nbsp;<a href=\"https:\/\/www.secureworks.com\/research\/threat-profiles\/gold-waterfall\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Gold Waterfall<\/a>&nbsp;and attributes the group as a Russian-speaking past affiliate of the REvil ransomware RaaS service.&nbsp;<\/p>\n<p>A decryptor for DarkSide malware on Windows machines was released by&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/free-decrypter-released-for-victims-of-darkside-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bitdefender in January<\/a>&nbsp;2021. In response, the group said the decryptor was based on a key previously purchased and may no longer work as &#8220;this problem has been fixed.&#8221;&nbsp;<\/p>\n<p>Bitdefender told ZDNet that the decryption tool, unfortunately, does not work with the latest version of DarkSide malware.&nbsp;<\/p>\n<p>&#8220;We&#8217;re constantly working on new versions of our tools as cybercriminals fix vulnerabilities that make decryption possible,&#8221; the firm added.<\/p>\n<p>While believed to be relatively new to the ransomware scene, first spotted in the summer of 2020, DarkSide has already created a leak website used in double-extortion campaigns, in which victim companies are not only locked out of their systems, but also have their information stolen.&nbsp;<\/p>\n<p>If these organizations refuse to pay up, stolen data may be published on the platform and made available to the public.&nbsp;<\/p>\n<p>DarkSide isn&#8217;t just content in making money from ransomware demands, however, as the group has indicated it will happily work with competitors or investors before leaks are published.<\/p>\n<p>&#8220;If the company refuses to pay, we are ready to provide information before the publication, so that it would be possible to earn in the reduction price of shares,&#8221; the group says.&nbsp;<\/p>\n<p><strong>Read on:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/darkside-the-ransomware-group-responsible-for-colonial-pipeline-cyberattack-explained\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>DarkSide explained: the ransomware group responsible for Colonial Pipeline cyberattack<\/strong><\/a><\/p>\n<p>Perhaps unusually, however, DarkSide also appears to be trying to cultivate a Robin Hood and good-guy image &#8212; stealing from the rich (the so-called &#8216;big game&#8217; targets) and giving a portion of the criminal proceeds to charity.&nbsp;<\/p>\n<p>Charities reportedly offered donations in stolen Bitcoin (BTC) have, so far, refused to accept them.&nbsp;<\/p>\n<p>The RaaS service operators have also tried to distance themselves from the incident by vaguely implying it was a customer at fault and that the cyberattack doesn&#8217;t fit the DarkSide ethos.<\/p>\n<p>&#8220;We are apolitical, we do not participate in geopolitics, do not need to tie us with a defined government and look for other our motives,&#8221; DarkSide said on May 10. &#8220;Our goal is to make money, and not creating problems for society. We [will] introduce moderation and check each company that our partners want to encrypt to avoid social consequences in the future.&#8221;<\/p>\n<p>FireEye has <a href=\"https:\/\/www.zdnet.com\/article\/researchers-track-down-five-affiliates-of-darkside-ransomware-service\/\" target=\"_blank\" rel=\"noopener noreferrer\">released the results<\/a> of an investigation into DarkSide affiliates. Sophos says that the cybersecurity company has been called in at least five times to deal with suspected DarkSide infections and has published research on the group&#8217;s typical <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/05\/11\/a-defenders-view-inside-a-darkside-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">attack methods and tools<\/a>.<\/p>\n<\/p><\/div>\n<div id=\"listicle-7859ddbb-5a36-4c80-aaeb-70d42d807318\" class=\"shortcode listicle listicle-7859ddbb-5a36-4c80-aaeb-70d42d807318\" readability=\"69.887072808321\">\n<h2> What happens next? <\/h2>\n<p>As a group known to double-extort victims, Colonial Pipeline could be the next company to face the threat of the leak of data unless they give in to blackmail and pay the attackers. It may be, however, that DarkSide could choose not to pursue this usual tactic due to the aforementioned &#8220;social&#8221; problems caused by the ransomware.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-05-09\/colonial-hackers-stole-data-thursday-ahead-of-pipeline-shutdown\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Bloomberg says<\/a>&nbsp;that during the attack, over 100GB in corporate data was stolen in just two hours.&nbsp;<\/p>\n<p>As of May 11, Colonial Pipeline has not been added to the DarkSide leak site. &nbsp;<\/p>\n<p>This appears to be one of the largest and most successful cyberattacks on a critical component of a country&#8217;s infrastructure to date &#8212; but it is not the first.&nbsp;<\/p>\n<p>In February, a cyberattacker attempted to add dangerous levels of a chemical to a city in Florida&#8217;s&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/hacker-modified-drinking-water-chemical-levels-in-a-us-city\/\" target=\"_blank\" rel=\"noopener noreferrer\">drinking water system<\/a>, and back in 2016, the city of Kieve, in Ukraine, lost all power for an hour due to&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/industroyer-an-in-depth-look-at-the-culprit-behind-ukraines-power-grid-blackout\/\" target=\"_blank\" rel=\"noopener noreferrer\">Industroyer malware<\/a>. &nbsp;&nbsp;<\/p>\n<p>If the prospect of fuel shortages, the invoking of emergency powers, and the briefing of a president is anything to go by, we may see a more urgent review of cybersecurity procedures and practices in the US soon &#8212; and perhaps the implementation of severe punitive actions to companies that do not maintain a strong security posture.&nbsp;<\/p>\n<p>However, cyberthreats continue to evolve and, either way, this is unlikely to be the last time we see such severe social disruption caused by cyberattackers just in it for the money.&nbsp;<\/p>\n<p>&#8220;This incident is not the first and will definitely not be the last, as US critical infrastructure spans across an entire continent and relies on engineers in remote places to log in and perform maintenance when needed,&#8221; Bitdefender commented. &#8220;It is common for ransomware operators to probe networks for such points of entry or even to buy phished credentials to remote desktop instances that they can use to mount an attack. Critical infrastructure is becoming increasingly appealing to ransomware operators &#8212; particularly those who are involved in Ransomware-as-a-Service schemes.&#8221;<\/p>\n<p><strong>Update 13\/5<\/strong>: On Wednesday, US President Biden <a href=\"https:\/\/www.zdnet.com\/article\/biden-signs-order-boosting-us-cyber-posture-saying-incremental-improvements-are-not-enough\/\" target=\"_blank\" rel=\"noopener noreferrer\">signed an executive order<\/a> to improve federal cybersecurity, noting that agencies need to &#8220;lead by example.&#8221;<\/p>\n<p>The order includes a shift to multi-factor authentication, data encryption both at rest and in transit, a zero-trust security model, and improvements in endpoint protection and incident response.<\/p>\n<p>A Cybersecurity Safety Review Board will also be established.&nbsp;<\/p>\n<p>&#8220;Incremental improvements will not give us the security we need; instead, the federal government needs to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life,&#8221; the order reads.<\/p>\n<\/p><\/div>\n<h3>Previous and related coverage<\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"> <span class=\"int\">more coverage<\/span> <\/h3>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated: DarkSide has claimed responsibility for the catastrophic ransomware outbreak.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-40858","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Colonial Pipeline attack: Everything you need to know 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Colonial Pipeline attack: Everything you need to know 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-13T07:17:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Colonial Pipeline attack: Everything you need to know\",\"datePublished\":\"2021-05-13T07:17:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/\"},\"wordCount\":2145,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/\",\"name\":\"Colonial Pipeline attack: Everything you need to know 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\\\/\",\"datePublished\":\"2021-05-13T07:17:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/colonial-pipeline-attack-everything-you-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Colonial Pipeline attack: Everything you need to know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Colonial Pipeline attack: Everything you need to know 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Colonial Pipeline attack: Everything you need to know 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-13T07:17:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Colonial Pipeline attack: Everything you need to know","datePublished":"2021-05-13T07:17:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/"},"wordCount":2145,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/","url":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/","name":"Colonial Pipeline attack: Everything you need to know 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/","datePublished":"2021-05-13T07:17:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/","contentUrl":"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/colonial-pipeline-attack-everything-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Colonial Pipeline attack: Everything you need to know"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40858"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40858\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}