Anatomy of a Breach

Anatomy of a Breach: Colonial Pipeline — The Ransomware Attack That Shut Down America's Fuel Supply

> series: anatomy_of_a_breach —— part: 149 —— target: colonial_pipeline —— fuel: 45%_of_us_east_coast —— ransom: $4,400,000 —— consequence: fuel_shortage<span class="cursor-blink">_</span>_

Hedgehog Security 31 May 2021 15 min read

45% of America's East Coast fuel. Shut down. By ransomware. For six days.

On 7 May 2021, Colonial Pipeline — the largest refined fuel pipeline in the United States, transporting 2.5 million barrels per day and supplying approximately 45% of the fuel consumed on the East Coast — shut down its entire 5,500-mile pipeline system after DarkSide ransomware encrypted its billing and IT systems. The company stated it shut down the pipeline as a precautionary measure because it could not bill customers for fuel delivered — demonstrating that ransomware against IT systems can halt physical operations even when the operational technology (OT) systems are not directly compromised.

The consequences were immediate and severe: fuel shortages spread across the southeastern US, panic buying emptied petrol stations, the average price of fuel rose above $3 per gallon for the first time since 2014, and the Federal Motor Carrier Safety Administration issued an emergency declaration allowing fuel tanker drivers to work extended hours. Colonial Pipeline paid the $4.4 million ransom in Bitcoin within hours of the attack. The initial access was later traced to a compromised password on an inactive VPN account that did not use multi-factor authentication. President Biden issued an Executive Order on Improving the Nation's Cybersecurity in direct response.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

A compromised VPN password. No MFA. $4.4 million ransom. National fuel crisis.

One Compromised Password, No MFA
The initial access was through a compromised password on a legacy VPN account that was no longer in active use — but had not been disabled — and did not have MFA enabled. A single credential, without MFA, gave attackers access to the network of America's largest fuel pipeline. <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates MFA on all remote access and requires that unused accounts are disabled. This single control would have prevented the entire incident.
IT Ransomware Halted Physical Operations
Colonial's pipeline OT systems were not encrypted — the company shut down the pipeline because its billing systems were offline. Ransomware against IT systems can halt physical operations when IT and OT processes are interdependent. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses IT/OT dependencies and the operational impact of IT system loss.
$4.4M Paid — $2.3M Recovered
Colonial paid $4.4 million within hours. The DOJ later recovered approximately $2.3 million by seizing the Bitcoin wallet — a rare success enabled by law enforcement's ability to trace the cryptocurrency. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides incident response including ransom negotiation guidance and law enforcement liaison.
Presidential Executive Order
The Colonial Pipeline attack prompted a US presidential Executive Order mandating cybersecurity improvements including MFA, encryption, zero-trust architectures, and software supply chain security for federal agencies and their contractors. For UK organisations in the defence supply chain or operating critical infrastructure, the US executive order's requirements increasingly influence <a href="/blog/sector-under-the-microscope-defence-supply-chain">UK standards</a>.

Colonial Pipeline runs on the same technology as UK critical infrastructure.

The Colonial Pipeline attack is directly relevant to UK energy, water, transport, and other critical infrastructure operators. The attack vector — a compromised VPN credential without MFA — exists in critical infrastructure networks worldwide. The operational impact — IT ransomware halting physical operations through process interdependency — applies wherever IT and OT systems are connected. And the societal consequence — fuel shortages affecting millions of people — demonstrates the cascading impact of critical infrastructure disruption.

Cyber Essentials Danzell mandates MFA on remote access and disabling of unused accounts — the two controls that would have prevented Colonial. Our infrastructure testing assesses VPN security, IT/OT boundaries, and operational resilience. SOC in a Box monitors for VPN compromise and lateral movement. And UK Cyber Defence provides the crisis management capability for critical infrastructure incidents.


One password. No MFA. National fuel crisis. Would your critical infrastructure survive the same?

<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA on all remote access. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses VPN and OT security. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects ransomware deployment.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles