Ransomware is still a challenge
The execution of ransomware attacks is, by now, almost an industrialised process. Its delivery is customised, professional and troublingly effective. Recent statements by those responsible for this latest Colonial Pipeline CI attack, reveal a touch of PR irony with their apparently socially responsible efforts to go after data for money, rather than to cause problems for society.
Ransomware continues to be a threat for all businesses, and of even greater concern for a society that relies on CI businesses that provide their every financial, communications, transportation and utility needs.
The Colonial Pipeline Co ransomware case
Frustratingly this will not be the last report of unplanned events that have led to disruption to one of the many and varied CI services that underpin much of our daily lives. For the company’s IT security team and Colonial Pipeline more generally, the weekend of May 8th and 9th went downhill pretty quickly.
Colonial Pipeline Co runs an oil distribution pipeline up and down the US east coast. For the US, with its heavy reliance on the automobile, this is about as close to mission critical as you can get. Any disruption was bound to lead to community concerns.
Colonial was hit by a ransomware attack. Initial signs were that the effects were contained and that only 100Gb of data was affected (although who knows at this stage what that data was). Nevertheless, the pipeline control systems and so the pipeline itself were shut down.
Whether the loss of the pipeline service was a result of the attack or a controlled response by the security team, the outcome has impacted the community way beyond the business itself. It is for this reason that in the eyes of many regulators, CI providers now carry broader social responsibilities to protect their businesses from cyber attacks and their communities that depend so much on them.
Society suffers disproportionately
We have seen several times now the effects of a ransomware attack on IT systems spilling over into the real world. There were cancelled operations and appointments when WannaCry hit the NHS in the UK, and lost and inaccessible foreign currency orders and transactions resulting from the Travelex case.
In this most recent Colonial Pipeline attack, the inability to pipe fuel meant the Declaration of a State of Emergency in several states following major concerns about how such massive volumes of oil could be safely moved and predictions of significant pump price rises for consumers. One can only contemplate the much broader implications if it was financial services, water or electricity that was disrupted.
Many governments are already moving to tighten up cyber security requirements for CI organisations, particularly those that are key to the normal functioning of society.
In the US this has been accelerated by recent events, in the UK and across Europe where the EU NIS directive is being reviewed and controls reconsidered.
In Australia, there are also changes happening in relation to categorisation of CI industries, with cyber security coming under greater focus from regulators, particularly priority industries, with the emergence of the concept of “positive security obligations”. There are also wider initiatives in corporate and IT governance around the duties and resulting risk management responsibilities for directors and officers.
At a more direct level:
- Patching and tracking vulnerabilities – Many attacks have happened because an attacker found vulnerable systems and exploited these vulnerabilities to gain access and then spread. Keeping software up to date and patched is key, although for CI networks with older systems and control platforms this is often difficult. So the task then becomes one of effective risk management and the mitigation of the security risks associated with ”un-patchable” technologies exposed to the wider corporate network and the Internet.
- Protecting the user and end point – Staff awareness and training also plays a role here; discouraging people from clicking on suspicious links or attachments and educating them on what to look out for. We already know that a clever attacker can sometimes fool users and deceive them enough to gain initial access to the network. So, the security of the endpoint – its own level of patching, the access rights of the user, the need for controls on the installation and execution of non-standard software (as described in Australia’s ACSC Essential 8 or equivalent Cyber Security Frameworks like NIST, CIS Controls etc) really becomes critical in the maintenance of security controls.
- Considering the implications of your response – if an infection does happen, and if it is (mercifully) in a part of the network that isn’t itself highly critical, then what will your response be? If that response means partitioning off networks or severing internet connections, or isolating subnets of office locations, then you must consider what else might be affected. In Colonial’s case this was the pipeline control system and the resulting physical disruption. For some CI business the implications will be quite different.
This containment of a threat in reaction to a malware incident can have implications for the business but also its broader stakeholders. Does it mean fuel shortages, a need for additional ground transportation as a contingency, the interruption to vital utilities or a closed hospital?
Critical Infrastructure is designated “critical” for a reason. The uninterrupted operation of many of these services is vital for the ongoing operation of our society and wellbeing. Many CI players are yet to satisfactorily renovate their IT and IoT systems and the introduction of ransomware results in a potentially incendiary mix.
The Colonial Pipeline Co experience could have been so much worse and it should act as a reminder for all of us. Implement a cyber improvement program that regularly measures your IT security performance against a recognised IT risk framework. Focus on improving the maturity of your cyber security controls and form a risk management perspective plan for the almost inevitability that you too will come under cyber attack.
Read the details of the Colonial story at the links below, but this situation is still unfolding, so we will all have to see how it develops: