Skip to content Skip to footer

Who we are

Our website address is: https://shipip.com.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

Additional information

How we protect your data

What data breach procedures we have in place

What third parties we receive data from

What automated decision making and/or profiling we do with user data

Industry regulatory disclosure requirements

Colonial Pipeline Cyberattack Exposes Serious Vulnerabilities

Almost inadvertently, US energy security has been threatened by a ransomware attack which demonstrated dramatically how the consequences of such hacks are escalating.

This one probably won’t be the worst, but it will change the way governments respond to ransomware.

Colonial Pipeline carries gasoline, diesel and jet fuel from Houston to New York, with an array of branch lines servicing states across the eastern seaboard of the US. On Saturday May 8, Colonial announced that it had been the victim of a ransomware attack and that to contain the threat it “proactively took certain systems offline,” which “temporarily halted all pipeline operations.”

In a sense that highlights critical infrastructure’s vulnerability. The halt to pipeline operations was entirely unintended by those who carried out the ransomware attack and the operational disruption was “collateral damage.”

The hackers did not target the pipeline’s industrial control systems to deliberately stop the flow of oil. Colonial itself shut down systems to prevent further spread of malware. This disruption would likely have been far worse had the group intended to disrupt the pipeline.

As the shutdown continued over several days, petrol prices surged, service station queues lengthened, customers hoarded fuel as pumps ran dry and the US Consumer Product Safety Commission warned people to “not fill plastic bags with gasoline.” The US Department of Transportation temporarily loosened road transport rules to allow more road-based shipment of fuel as concern over shortages escalated within government.

By Monday May 10, the FBI announced that DarkSide ransomware was responsible for the Colonial hack.

DarkSide operates on a “ransomware as a service” business model, providing centralized services that their “affiliates” can use to extort money from victim organizations. The affiliates conduct the operations, but DarkSide receives a 10–25 percent cut of the ransom. Services fundamental to running ransomware operations include payment servers, encryption and decryption tools to lock and unlock victim data, and a blog to claim responsibility, advertise hacks and pressure companies.

But beyond ransomware, DarkSide affiliates also steal data and threaten to leak it. As victims with good backups may still be motivated by the threat of sensitive data being leaked, this second method of extortion is increasingly common among ransomware gangs. In these instances, DarkSide would collect and store victim data on staging servers.

Other services were even more innovative. It appears that DarkSide was also willing to let paying customers know when they’d hacked publicly listed companies ahead of their blog announcements, presumably so they could short sell stocks ahead of the news of a ransomware attack.

While they were developing a portfolio of extortion tools and tactics, DarkSide was also attempting to manage its reputation to avoid attracting law enforcement attention. It stated that it would not attack medical facilities, schools and universities, non-profits, governments and the funeral sector.

There’s good evidence that the criminals are Russian. They recruit Russian-speaking affiliates and advertise on Russian language forums, they don’t attack the former Soviet republics of the Commonwealth of Independent States and their malware won’t attack devices with Russian language settings.

In the aftermath of the Colonial Pipeline hack, DarkSide issued a statement saying:

We are apolitical, we do not participate in geopolitics, do not need to tie us with a defined government and look for other our motives. Our goal is to make money, and not creating problems for society. From today we introduce moderation and check each company that our partners want to encrypt to avoid social consequences in the future.

In part this seems to be an attempt to distance DarkSide from the Russian government; parts of Eastern Europe and Russia are a permissive environment where cyber criminals are tolerated, but if gangs start to cause geopolitical problems local law enforcement could suddenly become motivated to act.

And diplomatic pressure is being applied. US President Joe Biden said that although he didn’t believe the Russian government was involved, the criminals were Russian. “We have been in direct communication with Moscow about the imperative for responsible countries to take decisive action against these ransomware networks,” Biden said.

Within a day of discovering the attack the CEO of Colonial Pipeline had decided to pay the ransom, saying later that “it was the right thing to do for the country.” The pipeline returned to full operation within the week, although the decryption tool was reportedly so slow that Colonial continued to restore from backups.

Paying ransoms is clearly undesirable from a public policy point of view—it encourages further ransomware attacks and funds the evolution of the ransomware ecosystem. Yet at the same time ransom negotiations will settle on a price where the cost–benefit of paying can be justified and there are many situations where payment is clearly in the best interests of stakeholders.

But cyber insurance should not be used to pay ransoms. Unlike many other types of insurance, cyber insurance deals with a human adversary and the threat is rapidly evolving. Current practice is a vicious circle where insurance payouts encourage and fund improved ransomware which extracts more insurance payouts. Perversely, ransomware hackers will search for their victims’ insurance policies and then use the insured amount to set ransom demands.

In total, DarkSide appears to have extracted at least $90 million in ransoms since August, and more than $9 million in the month of May alone. That was made up of $4.4 million from a chemical distribution company and $5 million from Colonial Pipeline. With increasing attention—Biden said the US would “pursue a measure to disrupt their ability to operate” – the sum seems to have been enough for the hackers.

The day after Biden’s statement the DarkSide hackers said they’d lost access to their infrastructure including their blog and payment servers and would be shutting their service. Lightning-fast US retaliatory action seems unlikely given the time required to prepare for a cyber operation, and the DarkSide crew may simply have taken the money instead of paying their affiliates.

In the short term, DarkSide may have disappeared but, given the sheer volume of money available, other criminals will fill the void. Beyond improving defences, this story also shows that a promising approach is to focus on the ransomware ecosystem and its incentives.

DarkSide and similar groups actively try to avoid law enforcement attention and minimize associations with the state in which they operate. Western nations need to align diplomatic, intelligence and law enforcement efforts to make it much harder for ransomware crews to operate with impunity.

Tom Uren is a senior analyst in ASPI’s International Cyber Policy Centre. This article appears courtesy of The Strategist and may be found in its original form

 

SOURCE READ THE FULL ARTICLE https://www.maritime-executive.com/editorials/colonial-pipeline-cyberattack-exposes-serious-vulnerabilities