Attacks/Colonial Pipeline
CRITICAL SEVERITY

Colonial Pipeline

2021
ransomware

DarkSide ransomware shut down largest US fuel pipeline.

infrastructureenergy

!What Happened

Compromised VPN without MFA. $4.4M ransom paid.

Vulnerability Exploited

VPN credentials without MFA

Attack Flow

1
recon

Credential Discovery

Found leaked VPN creds

[CRED] VPN access acquired
2
exploitation

VPN Access

No MFA required

[VPN] Access granted - no MFA
3
installation

Ransomware Deploy

DarkSide spreading

[ENCRYPT] Systems locked
4
actions

Ransom Demand

$4.4M demanded

[RANSOM] $4.4M in BTC

💥Impact

Pipeline shut 6 days. Gas shortages.

Records Compromised
100
Financial Cost
$4.4 million ransom + $1+ billion economic impact

🔧Technical Details

Target System
Colonial IT
server • Windows
VPN
Attacker Profile
DarkSide
workstation • Linux
Vulnerability / CVE
VPN credentials without MFA

📅Attack Timeline

Initial Attack
2021
Attack initiated and vulnerability exploited
Discovery & Impact
Shortly after 2021
Pipeline shut 6 days. Gas shortages.
Response & Mitigation
Remediation Phase
FBI recovered $2.3M.

🎯Is This Attack Still Relevant Today?

Ransomware attacks like Colonial Pipeline remain one of the most prevalent cyber threats today. The techniques pioneered in this attack are still actively used, with modern variants incorporating double extortion, RaaS (Ransomware-as-a-Service), and targeting critical infrastructure.

⚠️ Still Active Threat

💡Key Takeaways

  • MFA essential for VPN.
  • Regular backups stored offline are critical for ransomware recovery
  • Network segmentation can limit the spread of ransomware
  • Key defense: Enable Multi-Factor Authentication - Blocks credential-based attacks completely

Defense Applied

FBI recovered $2.3M.

Lessons Learned

MFA essential for VPN.

Attacker Tools

DarkSide
RaaS platform

Defense Options

Enable Multi-Factor Authentication
Require hardware token or app-based 2FA for all VPN connections
Forced Password Rotation
Invalidate old VPN credentials found on dark web
OT/IT Network Segmentation
Isolate operational technology from corporate IT network
Incident Response Plan
Rapid containment and manual pipeline operation procedures
Basic VPN Logging
Standard access logs without real-time alerting

MITRE ATT&CK

Tactics
Initial AccessImpact
Techniques
T1078T1486