{"id":18331,"date":"2021-05-13T01:52:46","date_gmt":"2021-05-12T21:52:46","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/18331\/"},"modified":"2021-05-13T01:52:58","modified_gmt":"2021-05-12T21:52:58","slug":"pipeline-ransomware-mitigation","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/18331\/","title":{"rendered":"How Colonial Pipeline managed its ransomware attack"},"content":{"rendered":"<p>The recent ransomware attack on Colonial Pipeline, the company that controls the pipeline network supplying fuel to a large chunk of the US East Coast, is one of the most high-profile in living memory. Understandably, the details of the attack have not been made public, but some scraps of information have found their way into the media, and from that we can derive at least one lesson: Promptly informing law enforcement can reduce the damage. Of course, not everyone has a choice \u2014 in some states victims are obligated to inform regulators. However, even where that is not required, such a move may be useful.<\/p>\n<h2>The attack<\/h2>\n<p>On May 7, ransomware hit Colonial Pipeline, which operates the largest fuel transfer pipeline on the US East Coast. Employees had to take some information systems offline, partly because some computers were encrypted, and partly to prevent the infection from spreading. That caused fuel-supply delays along the East Coast, sparking a 4% rise in gasoline futures. To mitigate the damage, the company <a href=\"https:\/\/www.forbes.com\/sites\/christopherhelman\/2021\/05\/10\/fbi-colonial-pipeline-hacked-by-apolitical-group-darkside\/?sh=20ffb0134418\" target=\"_blank\" rel=\"nofollow noopener\">plans to increase fuel deliveries<\/a>.<\/p>\n<p>The company continues to restore its systems, but <a href=\"https:\/\/zetter.substack.com\/p\/biden-declares-state-of-emergency\" target=\"_blank\" rel=\"nofollow noopener\">according to sources on the Zero Day blog<\/a>, the problem lies less in the service networks than in the billing system.<\/p>\n<h2>Federal lockdown<\/h2>\n<p>Modern ransomware operators not only encrypt data and demand ransom to decrypt it, but also steal information as leverage for extortion. In the case of Colonial Pipeline, the attackers <a href=\"https:\/\/securityboulevard.com\/2021\/05\/colonial-pipeline-fail-ransomware-gang-threatens-gas-supplies\/\" target=\"_blank\" rel=\"nofollow noopener\">siphoned off about 100GB<\/a> of data from the corporate network.<\/p>\n<p>However, <a href=\"https:\/\/www.washingtonpost.com\/business\/2021\/05\/10\/colonial-pipeline-gas-oil-markets\/\" target=\"_blank\" rel=\"nofollow noopener\">according to the<em> Washington Post<\/em><\/a>, external incident investigators quickly figured out what had happened and where the stolen data was, and then contacted the FBI. The feds, in turn, approached the ISP that owned the server holding the uploaded information, and had it isolated. As a result, the cybercriminals may have lost access to the information they stole from Colonial Pipeline; that quick action at least partially mitigated the damage.<\/p>\n<p>Knowing that happened doesn\u2019t bring the company\u2019s main pipelines back online, but the damage, though considerable, could have been far worse.<\/p>\n<h2>Attribution<\/h2>\n<p>It seems the company was attacked by DarkSide ransomware, which can run on both Windows and Linux. Kaspersky products detect the malware as Trojan-Ransom.Win32.Darkside and Trojan-Ransom.Linux.Darkside. DarkSide uses strong encryption algorithms, making data restoration without the right key impossible.<\/p>\n<p>On the surface, <a href=\"https:\/\/www.kaspersky.com\/blog\/darkside-ransomware-industry\/39377\/\" target=\"_blank\" rel=\"noopener nofollow\">the DarkSide group looks like<\/a> an online service provider, complete with helpdesk, PR department, and press center. A note on the perpetrators\u2019 website says their motivation for the attack was financial, not political.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/05\/13015256\/pipeline-ransomware-mitigation-darkside.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/05\/13015256\/pipeline-ransomware-mitigation-darkside.jpg\" alt=\"DarkSide's reaction to the media\" width=\"933\" height=\"139\" class=\"aligncenter size-full wp-image-18332\"><\/a><\/p>\n<p>The DarkSide group uses a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ransomware-as-a-service-raas\/\" target=\"_blank\" rel=\"nofollow noopener\">ransomware-as-a-service<\/a> model, providing software and related infrastructure to partners that carry out the attacks. One of those partners was responsible for targeting Colonial Pipeline. According to DarkSide, the group did not intend to cause such serious social consequences, and it will henceforth keep a closer eye on which victims its \u201cintermediaries\u201d choose, but it\u2019s hard to take one statement in a long list of PR tricks too seriously.<\/p>\n<h2>How to stay safe<\/h2>\n<p>To protect your company from ransomware, our experts recommend the following:<\/p>\n<ul>\n<li>Prohibit unnecessary connections to remote desktop services (such as RDP) from public networks, and always use strong passwords for such services;<\/li>\n<li>Install all available patches for VPN solutions that you use to connect remote workers to the corporate network;<\/li>\n<li>Update software on all connected devices to prevent vulnerability exploitation;<\/li>\n<li>Focus defense strategy on detecting lateral movement and data exfiltration, with special attention to all outbound traffic;<\/li>\n<li>Back up data regularly and make sure that in case of emergency you have ready access to the backups;<\/li>\n<li>Leverage <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/threat-intelligence?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">threat intelligence<\/a> data to stay up-to-date on attack tactics, techniques, and procedures;<\/li>\n<li>Use security solutions such as <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/threat-management-defense-solution?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____tmd___\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Detection and Response<\/a> and <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Managed Detection and Response<\/a> that help stop attacks early on;<\/li>\n<li><a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Train employees to mind the security of the corporate environment<\/a>;<\/li>\n<li>Use <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">a reliable solution for endpoint protection<\/a> that counters exploits and detects anomalous behavior and can roll back malicious changes and restore the system.<\/li>\n<\/ul>\n<p>The Colonial Pipeline example shows the advantage of contacting legal authorities \u2014 and quickly. There\u2019s no guarantee they\u2019ll be able to help, of course, but it might just minimize the damage.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-top3\">\n","protected":false},"excerpt":{"rendered":"<p>Should you contact authorities about ransomware?<\/p>\n","protected":false},"author":700,"featured_media":18334,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[2452,2453,2040,433],"class_list":{"0":"post-18331","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-anti-ransomware-day","10":"tag-darkside","11":"tag-extortion","12":"tag-ransomware"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/18331\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/pipeline-ransomware-mitigation\/22848\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/24767\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/pipeline-ransomware-mitigation\/22760\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/21893\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pipeline-ransomware-mitigation\/25302\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pipeline-ransomware-mitigation\/24646\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pipeline-ransomware-mitigation\/30700\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pipeline-ransomware-mitigation\/9653\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/39907\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/pipeline-ransomware-mitigation\/16925\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/pipeline-ransomware-mitigation\/17490\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/pipeline-ransomware-mitigation\/14836\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pipeline-ransomware-mitigation\/26738\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/pipeline-ransomware-mitigation\/30681\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/pipeline-ransomware-mitigation\/23885\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pipeline-ransomware-mitigation\/29225\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pipeline-ransomware-mitigation\/29022\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18331"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18331\/revisions"}],"predecessor-version":[{"id":18333,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18331\/revisions\/18333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18334"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}