Colonial Pipeline Disrupted by Now-Defunct DarkSide Operation
![man next to computer with hands in air](/sites/default/files/styles/resource_image/public/2021-05/pipeline_image.jpg?itok=H9_Nyq_i)
The Colonial Pipeline Company fell victim to DarkSide, a ransomware operation which closed shop after its attack made international headlines and attracted the attention of the FBI.
A Look at What Happened at Colonial Pipeline
On May 8, the disclosed that it had suffered a digital attack involving ransomware a day earlier.
The Company responded by suspending its pipeline operations, which according to its consists of transporting 100 million gallons of fuel each day to customers located between Houston, Texas and New York Harbor.
It also said that it was working with a third-party digital security firm to investigate what happened and that it was in contact with law enforcement as well as federal authorities.
The next day, Colonial Pipeline issued an update in which it said that it was in the process of restoring service to some of its smaller lateral pipelines while mainlines 1-4 remained offline.
The Company clarified that these steps were part of 鈥渁n incremental process that will facilitate a听return to service in a听phased approach... [with] the goal of substantially restoring operational service by the end of the week.鈥
It was five days later when the Colonial Pipeline Company announced that it had restarted its entire market and that it had resumed service of all its markets.
DarkSide Behind the Attack
On May 11, the FBI along with the
听(CISA) confirmed that DarkSide was responsible for the Colonial Pipeline attack.
The DarkSide Ransomware-as-a-Service (RaaS) operation first started up in mid-August 2020, according to .
Those responsible for the threat made a name for themselves by claiming to spare organizations in the healthcare, education, not-for-profit and government sectors from attack. The fact that DarkSide handlers also embraced double extortion as one of the techniques and began demanding ransoms as high as $2 million only helped their notoriety grow.
This backfired in the case of Colonial Pipeline. Yes, attackers associated with the RaaS apparently collected a ransom payment of $5 million from the Company in exchange for a decryption key, per . But DarkSide still ended up in the crosshairs of the FBI and CISA鈥攕omething which no digital threat operation ever really wants.
It鈥檚 no wonder, therefore, that the attackers adopted a conciliatory tone on their data leaks site after the Colonial Pipeline incident made news. They used their platform to assert that they 鈥渄o not participate in geopolitics,鈥 noted . They also promised to 鈥渃heck each company that our partners want to encrypt to avoid social consequences in the future,鈥 a statement which seems to suggest that one of their affiliates was responsible for the Colonial Pipeline attack.
The End of DarkSide
Those assurances weren鈥檛 enough for someone familiar with DarkSide鈥檚 infrastructure. On May 14, reported that DarkSide decided to shutter its doors after suffering a security incident of its own.
A message posted on the program鈥檚 Telegram channel (and at least partially written by a representative of the REvil RaaS operation) indicated that someone had seized control of the attackers鈥 data leaks site, payment server and DOS servers, according to KrebsonSecurity. Shortly thereafter, the gang found that those servers weren鈥檛 available via SSH and that the hosting panels were blocked.
They also observed that someone had withdrawn the funds from their payment server and transferred them to an unknown location. This action prevented the attackers from paying their affiliates for the attacks that they had already completed.
A Shifting Threat Landscape
DarkSide might now be gone, but the ransomware landscape is still shifting in the aftermath of the Colonial Pipeline attack. In the farewell message cited above, for instance, the REvil representative said that their own operation would thenceforth prohibit affiliates from targeting the same types of organizations deemed by DarkSide as out of bounds. They also said that affiliates would now need to gain permission before launching their attacks.
The Colonial Pipeline attack could have an even longer-lasting effect on how REvil and other ransomware operations conduct their business. That鈥檚 because many Russian digital crime forums are now preventing members from posting about ransomware. Those web locations include XSS, an underground forum whose admin recently announced that members could no longer discuss 鈥淩ansomware affiliate programs,鈥 鈥淩ansomware rental鈥 or the 鈥渟ale of lockers (ransomware software),鈥 according to .
鈥淭here鈥檚 too much publicity,鈥 the XSS administrator explained, as quoted by KrebsOnSecurity. 鈥淩ansomware has gathered a critical mass of nonsense, bullshit, hype, and fuss around it. The word 鈥榬ansomware鈥 has been put on a par with a number of unpleasant phenomena, such as geopolitical tensions, extortion, and government-backed hacks. This word has become dangerous and toxic.鈥
It鈥檚 unclear whether this decision will have an impact on ransomware actors鈥 ability to recruit new affiliates and/or on how ransomware attackers conduct themselves more generally.
The Legacy of the Colonial Pipeline Attack
Troy Gill, manager of security research at 秋葵视频色 | AppRiver, recognizes that the Colonial Pipeline attack reflects the reality of the growing ransomware threat.
鈥淭he recent attack on the Colonial Pipeline highlights the risk ransomware can pose not only to businesses but to critical national industrial infrastructure,鈥 he said. 鈥淭he听attack听also听showcases听that听the trend of 鈥榬ansomware as service鈥櫶齣s prolific in today鈥檚 world听in addition听to听seeing听the growing trend of听more joint听involvement from听both听private companies and government agencies听to help halt the impact as quickly as possible.听Similar to听the FBI听stepping in and removing Microsoft Exchange web shells听to听help safeguard organizations, I believe this involvement by the FBI and other government agencies have听become听critical听to听assist听and prevent further damage with the Colonial Pipeline attack.鈥听
From a broader perspective, DarkSide鈥檚 targeting of the Colonial Pipeline also underscores the need for organizations in every sector to strengthen their defenses against ransomware. One of the ways they can do that is by investing in an email threat protection solution that scans for disallowed IP addresses, campaign patterns and other indicators of potential threats such as ransomware. Such a solution should perform this type of analysis in real time so that legitimate business correspondence can reach its intended destination within the organization, all while preventing a ransomware infection from occurring in the first place.
Organizations also need to make sure they鈥檙e covered if they suffer a ransomware attack. Specifically, they need to maintain backups of their data.
Anne Neuberger, national security adviser for cyber and emerging technologies at the White House, said the same thing to .
Companies are often in a difficult position if their data is encrypted and they do not have backups and cannot recover the data.
That said, not just any old backup utility will do. They need a comprehensive backup and recovery solution that protects critical data not only on-premises but also in SaaS applications like Dropbox, Google Workplace and more. It鈥檚 this type of tool that will help them achieve compliance with GDPR and other data protection regulations as well as perform point-in-time recovery should ransomware infect their systems. 听
Both email threat protection as well as backup and recovery are needed as part of a corporate resilience plan to ransomware. Not many companies offer both. But 秋葵视频色 does.
Strengthen your organization鈥檚 ransomware defense strategy with 秋葵视频色 today.