All: please don't post flamebait such as calls for war and whatnot. It's incredibly tedious. We're trying for <i>interesting</i> conversation here.<p><a href="https://news.ycombinator.com/newsguidelines.html" rel="nofollow">https://news.ycombinator.com/newsguidelines.html</a>
Colonial Pipeline precisely does keep it's control network disconnected from the internet - the only thing that was ransomwared is their corporate network. They shut the pipelines down voluntarily to prevent further spread.
That gang may have bitten off more than they can chew. They've now gotten the US government involved officially, which means that beyond the sheer mass of resources that will go into tracking this gang, the government also has something to prove now.<p>Being at the center of an international incident is probably not good for business.
So, a very limited state of emergency which allows fuel that is ordinarily piped to be transported by truck.<p>Ancillarily, It's not evident this cyberattack actually compromised the industrial controls, but rather trashed the administrative system controlling the controls.
"Multiple sources have confirmed that the ransomware attack was caused by a cyber-criminal gang called DarkSide, who infiltrated Colonial's network on Thursday and took almost 100GB of data hostage."<p>re: "infiltrated Colonial's network"<p>I have been reading some of the other reports of this incident from different publications.<p>Many of the stories include a line about attackers downloading "100 GB in only 2 hours" as if that was being downloaded from the company's on premises servers.<p>Eventually I found a story that disclosed the data was actually downloaded from a cloud provider.
>The gang even has a website on the dark web where it brags about its work in detail, listing all the companies it has hacked and what was stolen, and an "ethics" page where it says which organisations it will not attack.<p>And yet they don't give the URL.<p>I wanna see this page. Does anyone have it?
I like how they are charging 10% more if you pay with Bitcoin than with Monero.<p>I think commerce would greatly improve if other networks had Tor clients, especially because of the stablecoin and private stablecoin availability as of this year. All EVMs as well as Tendermint networks have no out of the box solutions for Tor nodes and connectivity. But they both have ways for ERC20 tokens to have a great degree of privacy. One Tendermint network called Secret Network has private smart contract execution, and a variety of bridges. So as all tokens are smart contracts the metadata and variables would not be visible onchain.<p>sDAI would be more useful for commerce if the nodes and wallets could easily resolve over Tor.<p>Is anybody working on that?
The reason that cyberattacks are proliferating is because it has only recently become easy for the threat actors to receive massive payments quickly and anonymously. Remove that ability and the entire cyberattack ecosystem shuts down instantly. It is only a matter of time before this happens.
I looked at their available posted jobs on Friday as news broke about the attack. Colonial has had a position for Cybersecurity Manager open for over 30+ days. I wonder what happened to the old manager....
Seems like this company has more than just IT problems
<a href="https://newrepublic.com/article/161498/huntersville-north-carolina-colonial-pipeline-spill" rel="nofollow">https://newrepublic.com/article/161498/huntersville-north-ca...</a>
Ransom ware seems like a potential antidote to vulnerable US digital infrastructure. It provides a persistent, material bug bounty which incentivises the C-suite to fix them.
A lot of people are talking about the the results of this hack and a little bit about the industrial control systems, but no one is really addressing the hack itself.<p>>James Chappell, co-founder and chief innovation officer at Digital Shadows, believes DarkSide bought account login details relating to remote desktop software like TeamViewer and Microsoft Remote Desktop.<p>>He says it is possible for anyone to look up the login portals for computers connected to the internet on search engines like Shodan, and then "have-a-go" hackers just keep trying usernames and passwords until they get some to work.<p>Nothing sophisticated, nothing difficult, you just need some capital in the bank to buy some leaked credentials someone else worked hard to poke at, that is, some academic security person on a PhD worked hard for months to find some bug in software back in 2014, that turned into code someone else copy and pasted back in 2017, that yielded a dump in 2019 that some other hackers actually probed for some sucker's old login details he probably didn't even realize was in a dump, or might not even use anymore! The only hard work in this story is that academic in 2014 did and he definitely probably no connection to the criminals who basically got the president to issue a national emergency.
I seriously don't understand why the pipeline operators don't have some contingency plan or have simulated scenarios like this which enables them to roll-back systems immediately to some usable state.<p>How the hell is some random ransomware gang able to shut down critical infrastructure at purely a software level
Something doesn't quite add up. I feel like we don't have the full story:<p>>After seizing the data, the hackers locked the data on some computers and servers, demanding a ransom on Friday. If it is not paid, they are threatening to leak it onto the internet.<p>So... that constitutes a state of emergency? What data would they have that would be so sensitive? More likely they have hooks deep into the operation of the pipeline and may be threatening to shut it down/destroy it if not paid. Or, rather, they may be having trouble restoring operations without paying the ransom.<p>Side note/speculation: Will the feds make a move against crypto?
* There exists a decryption tool for DarkSide
<a href="https://labs.bitdefender.com/2021/01/darkside-ransomware-decryption-tool/" rel="nofollow">https://labs.bitdefender.com/2021/01/darkside-ransomware-dec...</a><p>* Critical infrastructure should not be allowed to run on Microsoft Windows<p>* The remote workers, through which the attack was performed, didn't even use a VPN, just TeamViewer and MS Remote Desktop.
I don't see this being called a "State of Emergency" anywhere but that BBC article. There's nothing on the Whitehouse.Gov briefing room, google news, etc.<p><a href="https://www.whitehouse.gov/briefing-room/" rel="nofollow">https://www.whitehouse.gov/briefing-room/</a>
It's not clear to me that this is actually a "state of emergency". The BBC has now quietly amended their headline to say "US passes emergency waiver over fuel pipeline cyber-attack." (The web page calls it a "Regional emergency declaration.")
Any chance this acts as a catalyst to face the ransomware problem head-on? <i>Someone</i> in a position of power in US intelligence agencies has to know this won't be the last time that a massive piece of infrastructure is taken down.
We knew about this since before 2000 probably, earliest articles I could find : 2007, 2009 : <a href="https://www.cfr.org/backgrounder/americas-vulnerable-energy-grid" rel="nofollow">https://www.cfr.org/backgrounder/americas-vulnerable-energy-...</a> , <a href="https://www.wsj.com/articles/SB123914805204099085" rel="nofollow">https://www.wsj.com/articles/SB123914805204099085</a>
This is depressing and not going to stop because it is so lucrative and relatively easy for these malware companies to find victims. It makes me wonder if cybersecurity should be considered a state responsibility and infrastructure so it will be uniform and available for every business like electricity or police protection.
I know exactly what stocks I'm buying at 930am tomorrow morning.<p>Keep your eyes on the oil major folks on twitter to see what happens:<p><a href="https://twitter.com/anasalhajji" rel="nofollow">https://twitter.com/anasalhajji</a><p><a href="https://twitter.com/calvinfroedge" rel="nofollow">https://twitter.com/calvinfroedge</a>
It needs to be asked again, why are critical services on the Internet ?<p>We all know why, companies are chasing profits at any cost, so hiring more people to monitor these systems as the did 40 years ago will lower the execs bonuses.<p>The US Gov should make it clear, if you are a critical service and if your service drops due to items being on the internet, for each occurances 10% of your total revenue (including your parent companies) are forfeited.<p>That will get them serious about security.
Seems they got in through a password brute-force attack?<p>It might be time to switch to hardware tokens, encryption keys or to enforce fully random passphrases or diceware/xkcd passphrases.
Nothing to do with this article, but...<p>when did "legitimate interest" become the thing advertisers^Wtrackers are (ab)using to keep tracking on by default? It's not due to a change in legislation afaikt, the GDPR hasn't changed in this regard, right?
Who decides how many hours we're allowed to work, driving trucks, fixing jet engines, taking care of children, or doing anything else?<p>Our and our employer's liability for errors is enough motivation to maintain safety at a reasonable level.<p>Put another way, is there statistical evidence of the efficacy of these regulations in reducing trucking accidents? Not that I could find!
Forgive my ignorance, but is it incredibly hard to determine the actual identities of the people behind this? I don’t know why a government wouldn’t simply assassinate culprits who were guilty of crimes at a level that would qualify as an act of war.
Breaking: U.S. government is inept at carrying out procedures which are standard in the technology industry, including the proper safeguarding of important tools & data, despite a budget larger than any other entity on earth.<p>Not Breaking: Citizens’ disappointment in the aforementioned, particularly given their direct contribution to said budget.<p>The Unsaid: Much of this will not change, unless incentives are realigned.