Pipeline Ransom Has Been Paid

The Colonial Pipeline company has paid $5 million to the DarkSide, a criminal hacking group, to restore operations after a ransomware attack paralysed fuel supplies across the US eastern seaboard. 

DarkSide are the suspected Russian-based group that the FBI has said was responsible for the attack, has told its affiliates it is 'closing its services', according  to FireEye, the leading cyber security group appointed to investigate the incident. 

Experts are warning that ransomware attacks, which are partly ransom, partly blackmail, are becoming more frequent, as the often Russia-based hackers are becoming more sophisticated with their hacking cyber attacks which have hit power generation, federal and local government agencies, water treatment plants and even police departments across the US.

Hit by a cyber attack, the operator of a major US fuel pipeline was forced to shut down service that is currently causing gas shortages throughout the Southeast. And the US sanctioned the Kremlin recently for a hack of federal government agencies, known as the SolarWinds breach, that officials have linked to a Russian intelligence unit and characterised as an intelligence-gathering operation.

As the US was focused on the pipeline attack, another hacker group hit the Washington DC Metro Police.  A day after US President Joe Biden said the US plans to disrupt the hackers behind the Colonial Pipeline cyber attack, the operator of the Darkside ransomware said the group lost control of its web servers and some of the funds it made from ransom payments. “A few hours ago, we lost access to the public part of our infrastructure, namely: Blog. Payment server. CDN servers,” said Darksupp, the operator of the Darkside ransomware in a post.  “Now these servers are unavailable via SSH, and the hosting panels are blocked,” said the Darkside operator while also complaining that the web hosting provider refused to cooperate.

In addition, the Darkside operator also reported that crypto currency funds were also withdrawn from the gang’s payment server, which was hosting ransom payments made by victims. 

The funds, which the Darkside gang was supposed to split between itself and its affiliates were transferred to an unknown wallet, Darksupp said.

Background

One of the first known cases involving Darkside ransomware occurred in late August 2020. The victim was a Canadian construction firm, which  refused to pay the ransom and instead restored their data and systems from backups.  Another company, hit with the Darkside ransomware around the same time, did pay the ransom, $2 million. The Darkside ransomware locked about 5,000 of the company’s computers and servers, including data backups that they’d kept online. According to Stephen Boyce, a former FBI investigator then working for the US security company Crypsis who led the team that investigated the infection. “Our victim paid, so they were not publicly named and/or shamed,” The the victim was a privately held US-based holding company, which Boyce declined to name.   

FireEye has published a detailed timeline of DarkSide’s movements, revealing that threat actors have “become more proficient at conducting multifaceted extortion operations”, adding that this success has “directly contributed to the rapid increase in the number of high-impact ransomware incidents over the past few years”.and they expect to see varying extortion techniques leveraging DarkSide malware that “will continue to evolve throughout 2021”.

Biden Orders Better Cyber Defence

President  Biden has now signed an Executive Order to improve US cyber defences in light of recent attack meant to strengthen US cybersecurity defences in response to a series of headline-grabbing hacking incidents that highlight how vulnerable the country''s public and private sectors are to high-tech spies and criminals operating from half a world away. Since December, the US has been on the receiving end of three of the worst cyber-attacks in history, each one different, as if testing the administration in different ways.

The order comes as the administration has been grappling with its response to a massive breach by Russia of federal agencies and ransomware attacks on private corporations.

The detailed order issues strict deadlines for all government departments to tighten security. It comes as the US deals with a hack on the country's biggest pipeline that has seen fuel shortages and panic-buying across multiple states. Colonial Pipeline says it has restarted its pumps but it will be "several days" until fuel supplies return to normal.

FireEye:    Recorded Future:     Guardian:     Zero Day:   Portswigger:     

 Bloomberg:      BBC:     DTNext:    TEISS:     Image: Unsplash

You Might Also Read:

Running Out Of Cyber Gas:

 

« Stop Taking Risks Online
The Next E-Industrial Revolution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Eden Legal

Eden Legal

Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.