Colonial Pipeline

Colonial Pipeline, the operator of the 5,500-mile fuel pipeline that supplies approximately 45% of the US East Coast's gasoline, diesel, and jet fuel, shut down its operations on Friday evening after detecting a DarkSide ransomware compromise of its IT systems (Colonial Pipeline statements through May 7-10). The operational impact has been substantial — fuel-supply disruption across the south-eastern US, panic-buying at retail filling stations, emergency declarations at federal and state level, and a political response that is, in scale, the largest the cyber-incident landscape has produced in the US.

The technical content. DarkSide is a ransomware-as-a-service operation that has been active since approximately August 2020, operating on the affiliate model where the operators provide the ransomware infrastructure and the affiliates conduct the actual victim-targeting and intrusion. The Colonial-affecting affiliate has, on the public reporting, used a credential-based initial-access vector — specifics not yet definitively confirmed but consistent with VPN-credential compromise from the secondary credential market — followed by the typical post-exploitation lateral movement and ransomware deployment. The affected Colonial systems were the IT-side billing and operations infrastructure rather than the OT-side pipeline-control systems directly; the pipeline shutdown was a precautionary response to the IT compromise rather than a direct OT-side compromise. The distinction matters for the threat-modelling conversation: the OT/IT segmentation at Colonial appears to have functioned as designed, but the IT-side compromise still produced operational shutdown because the IT systems were necessary for the pipeline's commercial operation (billing, scheduling, monitoring) even if not for its physical operation.

The ransom decision. Colonial paid approximately $4.4 million in Bitcoin to the DarkSide operators on the 8th, in exchange for a decryption tool. The decryption tool was, on subsequent reporting, slow enough that Colonial relied primarily on its own backups for recovery, with the decryption tool used as a secondary path. The payment-and-then-backup-recovery pattern is unusual and suggests that the immediate operational pressure of the disruption produced a payment decision that, in retrospect, was less operationally necessary than the moment had implied. The Department of Justice subsequently announced on the 7th of June the recovery of approximately $2.3 million of the ransom payment from a wallet under the operators' control (DOJ press release on the recovery, June 7), which is the first major successful US-side recovery of a ransomware payment and is operationally significant for the future of ransomware policy.

The political response is the part that has me reorganising the customer-organisation strategic conversations for the rest of the year. President Biden has issued an executive order on cybersecurity (Executive Order 14028, May 12) that addresses several substantive areas — software supply chain security, federal-government zero-trust architecture, incident-disclosure requirements for federal contractors, and the establishment of a Cyber Safety Review Board. The CISA / TSA-led pipeline-security directives that have followed in the past several days impose specific cyber-resilience requirements on US-based pipeline operators (TSA Security Directive Pipeline-2021-01, May 28). The aggregate political-and-regulatory response is, on scale and substance, the largest cyber-policy output the US has produced in a comparable timeframe.

For the customer-portfolio briefings, the Colonial case has produced several specific conversations. The OT/IT-segmentation question is sharpened — Colonial's segmentation worked, but the IT-shutdown still produced OT-side operational impact, and the customer organisations with operational technology need to plan against IT-side disruption as a category in its own right. The ransomware-no-pay policy question that has been a recurring theme since Norsk Hydro is being revisited at customer-organisation board level — Colonial's payment decision has produced more sympathy for the operational-pressure-driven payment choice than Norsk Hydro's no-pay-with-recovery posture did, even though Norsk Hydro's outcome was, in many respects, better. The customer-organisation policy conversations are reflecting the tension. The DOJ's payment-recovery action is encouraging in its operational implications and may shift the cost-benefit calculation for ransomware operators over time.

For the wider threat-landscape conversation, the post-Colonial environment will be more challenging for ransomware operators in some ways and more favourable in others. The political attention will produce sustained law-enforcement focus and more aggressive disruption operations against operator infrastructure. The political pressure on US-based payment-processor relationships and on cryptocurrency exchanges may reduce the operational ease of ransom monetisation. The targeting calibration may shift away from US critical-infrastructure targets specifically, with the operators substituting comparable targets in jurisdictions with less robust law-enforcement-and-political response. Whether the aggregate change reduces the ransomware-economics enough to materially decrease the operational threat is uncertain.

I will return to this through the rest of the year. The Colonial case is going to be a defining 2021 reference.


Back to all writing