Federal Government Prepares to Take Lead in Protecting Industry Computer Networks
WASHINGTON — Testimony at a congressional hearing Wednesday on last month’s Colonial Pipeline Co. ransomware attack demonstrated that a bigger role for the federal government is coming soon to protect private computer networks.
The Georgia-based company’s chief executive officer admitted to internal failures in protecting the 5,500-mile pipeline’s computer network but also expressed frustration in dealing with sophisticated, foreign-based cybercriminals.
“We need the government’s help to put pressure on these host countries,” said Joe Blount, Colonial Pipeline’s chief executive officer.
The network was compromised on May 7 by a Russian gang of cybercriminals that use the name Darkside. They encrypted access to the Colonial Pipeline computer system in a way that blocked employees from using it.
Darkside released the encryption only after Colonial Pipeline paid a $4.4 million ransom through cryptocurrency into an anonymous account. By then, the ransomware attack shut down 45% of the fuel deliveries to the U.S. East Coast until the company restarted the pipeline on May 12.
The FBI recovered $2.3 million of the money this week by breaking into the account but did not lessen public outrage over the incident.
The outrage continued Wednesday among corporate executives and lawmakers at the House Homeland Security Committee hearing.
Colonial Pipeline has spent more than $200 million to protect its pipeline, including on cybersecurity, Blount said. Nevertheless, “The unfortunate reality is that those defenses were compromised.”
Charles Carmakal, chief technology officer for the cybersecurity firm FireEye Mandiant, said the Colonial Pipeline attack was traced to a single employee who used a company password designed for access to the network on more than one website. Hackers then tapped into the password on the second website and published it on the dark web, where Darkside picked it up.
Colonial Pipeline has hired Alexandria, Va.-based FireEye Mandiant to harden its computer networks against further intrusions.
Carmakal could not give assurances that the risks from cyberattacks will diminish soon in the United States.
“We are dealing with cyber intrusions every single day,” Carmakal said at the hearing. He also said that “threat actors will exert immense pressure” to get money.
Officials from JBS S.A., the world’s largest meatpacking company, said their cyber defenses were similarly overwhelmed on May 30 when Russian hackers launched an attack against their system. The attack shut down the Brazilian company’s plants in the United States and Australia until June 2.
The hearing preceded a meeting scheduled for June 16 between President Joe Biden and Russian President Vladimir Putin.
Biden has told the media the U.S. government is considering striking back against the Russian hackers in ways he did not disclose in detail. Putin has called any implication the Russian government sponsors or condones the attacks “nonsense.”
The Biden administration said the hacking attacks will be discussed during the summit meeting.
Meanwhile, several bills are pending in Congress that would expand the federal government’s leadership in guarding U.S. industry against cyberattacks.
One of them, introduced by Rep. John Katko, R-N.Y., would grant more authority to the U.S. Cybersecurity and Infrastructure Security Agency to coordinate government and industry responses to threats against computer networks.
“We must break the ransomware business model once and for all,” Katko said.
Another pending bill, introduced by Rep. Michael McCaul, R-Texas, and called the Cyber Diplomacy Act, would direct the U.S. State Department to take the lead in setting up international cybersecurity standards.
“I think we need to think about going on the offense and hitting them back,” McCaul said.
In The News
WASHINGTON — The Government Accountability Office issued a report this week addressing cybersecurity vulnerabilities in the Department of Defense inventory management systems used to manage the national defense supply chain. Risks in six inventory management systems run by the Defense Logistics Agency were reviewed in the... Read More
BOSTON (AP) — If your business falls victim to ransomware and you want simple advice on whether to pay the criminals, don't expect much help from the U.S. government. The answer is apt to be: It depends. "It is the position of the U.S. government that... Read More
WASHINGTON -- A group of U.S. senators responded Thursday to recent ransomware attacks by introducing legislation to impose new tactics and harsh penalties on cyberattackers. They pinned much of the blame on Russia, despite denials a day earlier by Russian President Vladimir Putin. “The Russians do... Read More
WASHINGTON — The rise in profit-driven cyberattacks has prompted Senate Select Committee on Intelligence Chairman Mark Warner, D-Va., to contemplate a mandatory reporting bill so law enforcement can promptly take action on urgent threats. Warner told Axios recently that he anticipates broad support for such upcoming... Read More
WASHINGTON - As Congress edges closer to putting a final infrastructure bill on President Joe Biden’s desk, it looks like lawmakers and the White House are aligned in their commitment to bolster U.S. cybersecurity through increased federal investment, focusing on prevention and utilizing public-private partnerships to... Read More
Rep. John Katko, R-N.Y. recently went into a couple of Lincoln car dealerships in Syracuse, New York, but “neither one of them had any cars.” “And they’re not going to have any cars for several weeks because of the chip shortage,” Katko said during a "fireside... Read More