NEW YORK (BLOOMBERG) – The hack that took down the largest fuel pipeline in the United States and led to shortages across the East Coast was the result of a single compromised password, according to a cyber-security consultant who responded to the attack.
Hackers gained entry into the networks of Colonial Pipeline on April 29 through a virtual private network (VPN) account, which allowed employees to remotely access the company’s computer network, said Mr Charles Carmakal, senior vice-president at cyber-security firm Mandiant, part of FireEye, in an interview.
The account was no longer in use at the time of the attack but could still be used to access Colonial’s network, he said.
The account’s password has since been discovered inside a batch of leaked passwords on the Dark Web. That means a Colonial employee may have used the same password on another account that was previously hacked, he said. However, Mr Carmakal said he is not certain that is how hackers obtained the password, and he said investigators may never know for certain how the credential was obtained.
The VPN account, which has since been deactivated, did not use multifactor authentication, a basic cyber-security tool, allowing the hackers to breach Colonial’s network using just a compromised username and password. It is not known how the hackers obtained the correct username or if they were able to determine it on their own.
“We did a pretty exhaustive search of the environment to try and determine how they actually got those credentials,” Mr Carmakal said. “We don’t see any evidence of phishing for the attacker whose credentials were used. We have not seen any other evidence of attacker activity before April 29.”
A little more than one week later, on May 7, an employee in Colonial’s control room saw a ransom note demanding cryptocurrency appear on a computer just before 5am.
The employee notified an operations supervisor who immediately began to start the process of shutting down the pipeline, Colonial chief executive officer Joseph Blount said in an interview. By 6.10am, the entire pipeline had been shut down, he said.
It was the first time Colonial had shut down the entirety of its petrol pipeline system in its 57-year history, he said.
“We had no choice at that point,” he said. “It was absolutely the right thing to do. At that time, we had no idea who was attacking us or what their motives were.”
Colonial Pipeline made Mr Carmakal and Mr Blount available for an interview in advance of Mr Blount’s testimony next week before Congressional committees, in which he is expected to provide further detail regarding the scope of the compromise and address the company’s decision to pay ransom to the attackers.
It did not take long for news of Colonial’s shutdown to spread. The company’s system transports roughly 2.5 million barrels of fuel daily from the Gulf Coast to the Eastern Seaboard. The outage led to long lines at gas stations, many of which ran out, and higher fuel prices. Colonial began resuming service on May 12.
Soon after the attack, Colonial embarked on an exhaustive examination of the pipeline, tracking 47,000km on the ground and through the air to look for visible damage. The company ultimately determined that the pipeline was not damaged.
In the meantime, Mandiant was sweeping the network to understand how far hackers had probed while installing new detection tools that would alert Colonial of any follow-on attacks – which are not uncommon after a substantial breach, Mr Carmakal said. Investigators have not found any evidence the same group of hackers tried to regain access.
“The last thing we wanted was for a threat actor to have active access to a network where there is any possible risk to a pipeline. That was the biggest focus until it was turned back on,” Mr Carmakal said.
Mandiant also traced the hackers’ movements in the network to determine how close they got to compromising systems adjacent to Colonial’s operational technology network – the system of computers that control the actual flow of gasoline.
While the hackers did move around within the company’s information technology network, there was not any indication they were able to breach the more critical operational technology systems, he said.
It was only after Mandiant and Colonial were able to conclusively determine that the attack had been contained that they considered re-opening their pipeline, said Mr Blount.
Colonial paid the hackers, who were an affiliate of a Russia-linked cyber-crime group known as DarkSide, a US$5.83 million (S$7.7 million) ransom shortly after the hack. The hackers also stole nearly 100 gigabytes of data from Colonial Pipeline and threatened to leak it if the ransom was not paid, Bloomberg News reported last month.
Colonial has hired Mr Rob Lee, the founder and chief executive officer of Dragos, a cyber-security firm that focuses on industrial control systems, and Mr John Strand, owner and security analyst at Black Hills Information Security, to consult on its cyber defences and to focus on warding off future attacks.
In the wake of the attack on his company, Mr Blount said he would like the US government to go after hackers who have found safe haven in Russia. “Ultimately the government needs to focus on the actors themselves. As a private company, we don’t have a political capability of shutting down the host countries that have these bad actors in them.”