> series: anatomy_of_a_breach —— part: 149 —— target: colonial_pipeline —— fuel: 45%_of_us_east_coast —— ransom: $4,400,000 —— consequence: fuel_shortage<span class="cursor-blink">_</span>_
On 7 May 2021, Colonial Pipeline — the largest refined fuel pipeline in the United States, transporting 2.5 million barrels per day and supplying approximately 45% of the fuel consumed on the East Coast — shut down its entire 5,500-mile pipeline system after DarkSide ransomware encrypted its billing and IT systems. The company stated it shut down the pipeline as a precautionary measure because it could not bill customers for fuel delivered — demonstrating that ransomware against IT systems can halt physical operations even when the operational technology (OT) systems are not directly compromised.
The consequences were immediate and severe: fuel shortages spread across the southeastern US, panic buying emptied petrol stations, the average price of fuel rose above $3 per gallon for the first time since 2014, and the Federal Motor Carrier Safety Administration issued an emergency declaration allowing fuel tanker drivers to work extended hours. Colonial Pipeline paid the $4.4 million ransom in Bitcoin within hours of the attack. The initial access was later traced to a compromised password on an inactive VPN account that did not use multi-factor authentication. President Biden issued an Executive Order on Improving the Nation's Cybersecurity in direct response.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Colonial Pipeline attack is directly relevant to UK energy, water, transport, and other critical infrastructure operators. The attack vector — a compromised VPN credential without MFA — exists in critical infrastructure networks worldwide. The operational impact — IT ransomware halting physical operations through process interdependency — applies wherever IT and OT systems are connected. And the societal consequence — fuel shortages affecting millions of people — demonstrates the cascading impact of critical infrastructure disruption.
Cyber Essentials Danzell mandates MFA on remote access and disabling of unused accounts — the two controls that would have prevented Colonial. Our infrastructure testing assesses VPN security, IT/OT boundaries, and operational resilience. SOC in a Box monitors for VPN compromise and lateral movement. And UK Cyber Defence provides the crisis management capability for critical infrastructure incidents.
<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA on all remote access. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses VPN and OT security. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects ransomware deployment.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call