Everything you need to know about the ransomware attack on Colonial
Pipeline
GET UP TO SPEED: Ransomware is rampant.
The biggest fuel pipeline in the United States was shut down in recent days
after hackers stole some one hundred gigabytes of data
from Colonial Pipeline and threatened to release it unless the company paid
up. The hack has been tied to an Eastern European (and possibly
Russia-based) collective known as DarkSide, and US President Joe
Biden has said that Russia bears some responsibility for the hack, even
though the attack does not appear to have been state-sponsored. How can
companies fight back against this rising trend of ransomware attacks? What
can the Biden administration do? And what will this mean for the prices you
pay at the pump? Our experts are here to fill you in, free of charge.
|
|
A RISING THREAT
·
Colonial Pipeline is aiming to restore most of its
operations by the end of this week, as lines of panic buyers form at gas
stations across the Southeastern United States. Cynthia says any increase in
gas prices “is likely to be mildly escalatory and short-lived.”
But she adds that the hack “exposes
the soft underbelly of the nation’s critical energy infrastructure.”
·
If a company like Colonial, which should have the
resources for robust cyber defenses, could be “paralyzed,” Cynthia adds, that means
smaller companies are even more vulnerable to attack. “In that circumstance, an
environmental, explosive, or economic catastrophe might not be
averted.”
·
The threat goes well beyond energy. The Colonial
Pipeline hack is one of the most high-profile ransomware incidents in
recent years, but it’s part of a surging trend, David points out. According
to data compiled by the GeoTech Center, the global cost of ransomware attacks soared
from $11.5 billion in 2019 to $20 billion in 2020, with the
average downtime for an organization rising from 6.2 days to 16.2 days.
·
“The good news is technology is getting democratized,
and the bad news is technology is getting democratized,” David says. Ordinary “people can do things that
only sophisticated nation-states could do 40 years ago.”
HOW TO FIGHT BACK
·
If everyone is at risk, how can companies prepare? Andy suggests developing a “Plan
B” in case your operations are shut down and making sure all your IT “crown
jewels” are “fully backed up off-line and restorable.” He
adds that “conducting recurring and very realistic exercises will let you
know whether your plans work or need revision. Do all of that, then rinse
and repeat, and don't stop.”
·
David floats another idea:
space. Commercial satellites can be used to store company data as a backup.
“If you have
something that compromises ground-based assets, then you move to the space
cloud,” he says.
·
But couldn’t someone just hack your satellite? David says communication to
space assets would be limited, via only laser modems that would catch the
satellite as it passes overhead. “You have a little more control than over
the regular internet,” he says.
THE ROLE OF GOVERNMENT
·
Biden on Monday promised a “global effort” led by the US
Department of Justice against “transnational criminals,” along with
new public-private collaboration to improve cybersecurity. But Cynthia notes that the
government’s role of coordinating cybersecurity and advising private
companies “is
daunting and grossly underfunded.” When there’s a massive
breach, the typical solution would be for the government to take over, but
“there is no clear solution, no clearly articulated vision of what the
government would do if it took over.”
·
David urges more transparency
from governments and particularly private companies when they do get
hacked. Right now, many of them withhold information because they fear
reactions from customers or shareholders. But if we could map ransomware
attacks with the same precision that we have for COVID-19 cases, for
instance, it could be a real wake-up call.
·
“We’ve got cyber fatigue,” David says. “No one event is
going to motivate people to do anything. It’s when you quantify"
security breaches that more people will get involved in fixing it. “The solutions will come not from
policymakers, but from entrepreneurs.”
Dive deep on cybersecurity →
|
|
No comments:
Post a Comment