• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers breached colonial pipeline using compromised vpn password

Hackers Breached Colonial Pipeline Using Compromised VPN Password

You are here: Home / General Cyber Security News / Hackers Breached Colonial Pipeline Using Compromised VPN Password
June 7, 2021

The ransomware cartel that masterminded the Colonial Pipeline attack early final month crippled the pipeline operator’s network employing a compromised digital private network (VPN) account password, the most current investigation into the incident has uncovered.

The improvement, which was described by Bloomberg on Friday, associated attaining an preliminary foothold into the networks as early as April 29 by means of the VPN account, which allowed employees to obtain the firm’s networks remotely.

The VPN login was unused but lively at the time of the attack, the report mentioned, incorporating the password has since been found out inside of a batch of leaked passwords on the dark web, suggesting that an staff of the business could have reused the exact password on an additional account that was formerly breached.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


It is, on the other hand, unclear how the password was received, Charles Carmakal, senior vice president at the cybersecurity business Mandiant, was quoted as expressing to the publication. The FireEye-owned subsidiary is at present helping Colonial Pipeline with the incident reaction initiatives next a ransomware attack on Might 7 that led to the firm halting its operations for almost a week.

Stack Overflow Teams

DarkSide, the cybercrime syndicate powering the attack, has since disbanded, but not right before stealing virtually 100 gigabytes of details from Colonial Pipeline in the act of double extortion, forcing the company to pay a $4.4 million ransom soon just after the hack and prevent disclosure of delicate information. The gang is believed to have built away with virtually $90 million all through the 9 months of its operations.

The Colonial Pipeline incident has also prompted the U.S. Transportation Security Administration to issue a security directive on May possibly 28 necessitating pipeline operators to report cyberattacks to the Cybersecurity and Infrastructure Security Company (CISA) within just 12 hours, in addition to mandating facilities to post a vulnerability assessment determining any gaps in their existing methods in just 30 days.

The growth will come amid an explosion of ransomware attacks in the latest months, which includes that of Brazilian meat processing corporation JBS last week by Russia-connected REvil team, underscoring a danger to critical infrastructure and introducing a new position of failure that has had a significant impression on client offer chains and working day-to-day operations, leading to fuel shortages and delays in unexpected emergency well being treatments.

As the ransom requires have ballooned significantly, inflating from 1000’s to millions of pounds, so have the attacks on substantial-profile victims, with businesses in electrical power, education and learning, healthcare, and food stuff sectors ever more turning out to be primary targets, in flip fueling a vicious cycle that allows cybercriminals to request the major payouts attainable.

The profitable business enterprise model of double extortion — i.e., combining data exfiltration and ransomware threats — have also resulted in attackers growing on the strategy to what’s identified as triple extortion, whereby payments are demanded from clients, associates, and other third-get-togethers connected to the first breach to desire even additional revenue for their crimes.

Worryingly, this development of paying off felony actors has also set off mounting considerations that it could establish a harmful precedent, further more emboldening attackers to single out critical infrastructure and place them at risk.

Enterprise Password Management

REvil (aka Sodinokibi), for its section, has begun incorporating a new tactic into its ransomware-as-a-assistance (RaaS) playbook that incorporates staging dispersed denial-of-services (DDoS) attacks and building voice calls to the victim’s company partners and the media, “aimed at implementing even more strain on the victim’s organization to meet up with ransom needs within just the specified time body,” researchers from Look at Level disclosed very last thirty day period.

“By combining file encryption, information theft, and DDoS attacks, cybercriminals have primarily strike a ransomware trifecta intended to enhance the chance of payment,” network security agency NetScout said.

The disruptive energy of the ransomware pandemic has also set in movement a series of actions, what with the U.S. Federal Bureau of Investigation (FBI) creating the longstanding issue a “prime precedence.” The Justice Section mentioned it can be elevating investigations of ransomware attacks to a related precedence as terrorism, according to a report from Reuters final week.

Stating that the FBI is hunting at strategies to disrupt the felony ecosystem that supports the ransomware market, Director Christopher Wray instructed the Wall Avenue Journal that the company is investigating virtually 100 different kinds of ransomware, most of them traced backed to Russia, when evaluating the national security threat to the challenge posed by the September 11, 2001 terrorist attacks.

Located this posting interesting? Abide by THN on Facebook, Twitter  and LinkedIn to go through much more exceptional articles we post.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Warning of New Ransomware Surge in Education Sector
Next Post: NSW Health admits patient data was breached in Accellion attack nsw health admits patient data was breached in accellion attack»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.