Cyber Criminal gang DarkSide claims attack and Biden declares state of emergency over fuel

The US government declared a state of emergency on Sunday after the largest fuel pipeline in the US was hit by a ransomware cyber-attack.

Colonial Pipeline - EnergyNewsBeat.com

The Colonial Pipeline carries 2.5 million barrels a day – 45% of the East Coast’s supply of diesel, gasoline and jet fuel.

It was completely knocked offline by a cyber-criminal gang on Friday and is still working to restore service.

The emergency status enables fuel to be transported by road.

Experts say fuel prices are likely to rise 2-3% on Monday, but the impact will be far worse if it goes on for much longer.

Multiple sources have confirmed that the ransomware attack was caused by a cyber-criminal gang called DarkSide, who infiltrated Colonial’s network on Thursday and took almost 100GB of data hostage.

After seizing the data, the hackers locked the data on some computers and servers, demanding a ransom on Friday. If it is not paid, they are threatening to leak it onto the internet.

Colonial said it is working with law enforcement, cyber-security experts and the Department of Energy to restore service.

On Sunday evening it said that although its four mainlines remain offline, some smaller lateral lines between terminals and delivery points are now operational.

The Colonial PipelineIMAGE COPYRIGHTCOLONIAL PIPELINE
image captionThe Colonial Pipeline carries 2.5 million barrels a day

“Quickly after learning of the attack, Colonial proactively took certain systems offline to contain the threat. These actions temporarily halted all pipeline operations and affected some of our IT systems, which we are actively in the process of restoring,” the firm said.

“We are in the process of restoring service to other laterals and will bring our full system back online only when we believe it is safe to do so, and in full compliance with the approval of all federal regulations.”

Independent oil market analyst Gaurav Sharma told the BBC there is a lot of fuel now stranded at refineries in Texas.

The emergency amendment of the Jones Act enables oil products to be shipped in tankers up to New York, but this would not be anywhere near enough to match the pipeline’s capacity, he warned.

“Unless they sort it out by Tuesday, they’re in big trouble,” said Mr Sharma. “The first areas to be impacted would be Atlanta and Tennessee, then the domino effect goes up to New York.”

He said oil futures traders were now “scrambling” to meet demand, at a time when US inventories are declining, and demand – especially for vehicular fuels – is on the rise as consumers return to the roads and the US economy attempts to shake off the effects of the pandemic.

Ransomware as a service

A DarkSide ransomware notice
image captionA DarkSide ransomware notice that appears on victims’ computer screens

While DarkSide is not the largest such gang in this space, the incident highlights the increasing risk ransomware is posing to critical national industrial infrastructure, not just businesses.

It also marks the rise of an insidious criminal IT eco-system worth tens of millions of pounds, that is unlike anything the cyber-security industry has ever seen before.

In addition to a notice on their computer screens, victims of a DarkSide attack receive an information pack informing them that their computers and servers are encrypted.

The gang lists all the types of data it has stolen, and sends victims the URL of a “personal leak page” where the data is already loaded, waiting to be automatically published, should the company or organisation not pay before the deadline is up.

DarkSide also tells victims it will provide proof of the data it has obtained, and is prepared to delete all of it from the victim’s network.

According to Digital Shadows, a London-based cyber-security firm that tracks global cyber-criminal groups to help enterprises limit their exposure online, DarkSide operates like a business.

A redacted screenshot of DarkSide's website on the dark web details its success in attacking a large US manufacturer
image captionA redacted screenshot of DarkSide’s website on the dark web details its success in attacking a large US manufacturer

The gang develops the software used to encrypt and steal data, then trains up “affiliates”, who receive a toolkit containing the software, a template ransomware demand email, and training on how to carry out attacks.

The affiliate cyber-criminals then pay DarkSide a percentage of their earnings from any successful ransomware attacks.

And when it released a new software in March that could encrypt data faster than before, the gang issued a press release and invited journalists to interview it.

The gang even has a website on the dark web where it brags about its work in detail, listing all the companies it has hacked and what was stolen, and an “ethics” page where it says which organisations it will not attack.

It also works with “access brokers” – nefarious hackers who work to harvest the login details for as many working user accounts on various services as they can find.

Rather than break into these accounts and alert users or the service providers, these brokers sit on the usernames and passwords and sell them off to the highest bidders – cyber-criminal gangs who want to use them to carry out much larger crimes.

How did the attack occur?

Digital Shadows thinks the Colonial Pipeline cyber-attack has come about due to the coronavirus pandemic – the rise of engineers remotely accessing control systems for the pipeline from home.

James Chappell, co-founder and chief innovation officer at Digital Shadows, believes DarkSide bought account login details relating to remote desktop software like TeamViewer and Microsoft Remote Desktop.

DarkSide's website on the dark web
image captionDarkSide’s website on the dark web details its achievements and sets out “ethics” of sorts

He says it is possible for anyone to look up the login portals for computers connected to the internet on search engines like Shodan, and then “have-a-go” hackers just keep trying usernames and passwords until they get some to work.

“We’re seeing a lot of victims now, this is seriously a big problem now,” said Mr Chappell.

“Every day there’s new victims. The amount of small businesses that are falling victim to this – it’s becoming a big problem for the economy globally.”

Mr Chappell added that Digital Shadows’ research showed the cyber-criminal gang is likely based in a Russian-speaking country, as it seems to avoid attacking companies in the Commonwealth of Independent States – an organisation of the countries of Russia, Ukraine, Belarus, Georgia, Armenia, Moldova, Azerbaijan, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan.

About Stu Turley 3356 Articles
Stuart Turley is President and CEO of Sandstone Group, a top energy data, and finance consultancy working with companies all throughout the energy value chain. Sandstone helps both small and large-cap energy companies to develop customized applications and manage data workflows/integration throughout the entire business. With experience implementing enterprise networks, supercomputers, and cellular tower solutions, Sandstone has become a trusted source and advisor.   He is also the Executive Publisher of www.energynewsbeat.com, the best source for 24/7 energy news coverage, and is the Co-Host of the energy news video and Podcast Energy News Beat. Energy should be used to elevate humanity out of poverty. Let's use all forms of energy with the least impact on the environment while being sustainable without printing money. Stu is also a co-host on the 3 Podcasters Walk into A Bar podcast with David Blackmon, and Rey Trevino. Stuart is guided by over 30 years of business management experience, having successfully built and help sell multiple small and medium businesses while consulting for numerous Fortune 500 companies. He holds a B.A in Business Administration from Oklahoma State and an MBA from Oklahoma City University.