Thursday, August 11, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

One year removed from the Colonial Pipeline attack, what have we learned?

Researcher by Researcher
May 6, 2022
in Cybersecurity
0
One year removed from the Colonial Pipeline attack, what have we learned?
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Several businesses in critical infrastructure were forced to confront some hard truths in the wake of the 2021 ransomware attack.

colonial-pipeline-one-year-later
Image: JHVEPhoto/Adobe Stock

With May 7 marking the one-year anniversary of the Colonial Pipeline ransomware attack, reflecting back on some of the lessons that have been gathered may help organizations be more prepared for attacks in the future. Several cybersecurity experts gave their opinions on both what enterprises should look out for and even what cybercriminals learned in the wake of the attack as well.

As a brief recap, hackers infiltrated the billing infrastructure of the company, disabling the pipeline operation as Colonial Pipeline could not adequately bill their customers. Attackers also stole nearly 100 gigabits of data resulting from the hack and requested a payout of 75 Bitcoin ($4.4 million at the time) to return Colonial’s access to their billing system. The ransom was paid by the company to the cybercriminals, and DarkSide was identified as the culprits behind the attack.

SEE: Password breach: Why pop culture and passwords don’t mix (free PDF) (TechRepublic)

What cybersecurity lessons were learned from the attack?

One of the most important revelations of the Colonial Pipeline attack was that cybersecurity in the critical operations sectors needed upgrading. One major side effect from the hack was the supply chain issues that arose, as gas stations and airports started being affected by the lack of oil from the pipeline itself.

“Organizations in this sector must take action to secure their operations if they haven’t done so already, as this is a seriously overlooked attack vector that’s vital to the United States’ national security,” said James Carder, chief security officer of LogRhythm. “Any organization leveraging technology to enable operations for critical infrastructure needs to ensure proper protection protocols are established, ranging from simple password hygiene, threat detection, preventative controls and response controls to quickly thwart and identify potential catastrophes.”

Must-read security coverage

The passing of President Biden’s Strengthening American Cybersecurity Act is one route being taken to mitigate the severity of these types of attacks. Through the act, signed into law on March 15, companies will be required to report hacks within a certain timeframe or risk being subject to financial penalties.

“A big thing that was learned was that our critical infrastructure really is less secure than we think,” said Matthew Parsons, director of network and security product management at Sungard Availability Services. “I think it raised the awareness of strengthening our cybersecurity posture in the critical infrastructure field. The Strengthening Cybersecurity Act of 2022 is trying to raise the requirements around critical infrastructure.”

Businesses in the industries of chemicals, critical manufacturing, energy, food, emergency services, healthcare and IT should also be engaged with increasing defenses not only in their technology, but also in better preparing employees in best practices when it comes to avoiding these new ransomware attacks.

“One lesson learned post-hack was there was a single password that was compromised with an out of date VPN account which was the conduit to hackers to get into the network and demand payment,” said Scott Schober, co-host of the Cyber Coast to Coast podcast. “A Zero Trust network requires at least an additional authenticator in the event the user name and password are compromised. Using MFA adds a layer of security that makes it significantly harder to breach the network. With zero trust, each account has limited trust and has segmented access, which in the event a hacker breaks in, they cannot work laterally throughout the network because they are limited in their access to that particular account segment.”

On the flip side, hackers may have also realized how profitable ransomware can truly be when looking at the millions of dollars extorted from Colonial Pipeline and other critical infrastructure attacks. Parsons says that an attack of this scale and the amount of money generated behind it may have emboldened similar groups to look into large-scale malicious operations.

“I think the biggest reinforcing factor for these groups after this attack is that it does pay out,” Parsons said. “These guys are specifically targeting operations they know are large and will have an impact on them and their customers. It can create a lot of panic and disruption to the populace. I think [hackers] are realizing that if these large corporations are successfully breached with ransomware, there’s going to be a nice payout.”

While the circumstances behind the attack were unfortunate, the information gleaned from the Colonial Pipeline attack may have been necessary long-term for everyone in the cybersecurity field. By forcing a variety of organizations from a number of industries to self-evaluate, the next big attack on critical infrastructure areas may be able to evade a costly and disastrous hack in the future.



Source link

Related articles

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Tags: attackColoniallearnedPipelineremovedyear
Share76Tweet47

Related Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
0

“This is something we’re seeing affecting more and more organizations, and it’s likely due to an increasingly crowded market for...

High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
0

Flashpoint is warning organizations of two newly identified critical vulnerabilities in NetModule Router Software (NRSW) that could be exploited in...

Top 5 best backup practices

Top 5 best backup practices

August 10, 2022
0

Give yourself peace of mind by implementing a new backup strategy with our tips. Image: apinan/Adobe Stock You know that...

NVIDIA Fixes High-Severity Flaws in Graphics Drivers For Windows, Linux

Microsoft Fixes Known, Exploited Flaw in Windows Diagnostic Tool

August 10, 2022
0

Microsoft said it fixed a variant of a publicly known vulnerability that was first reported to the company in 2019....

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
0

A former Twitter worker was found guilty on Tuesday of spying for Saudi officials keen to unmask critics on the...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022

Recent Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp security Software TFT Threat Top vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved