<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Colonial &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/colonial/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Sun, 30 May 2021 03:28:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>US issues new security guidelines after Colonial Pipeline attack</title>
		<link>https://en.spress.net/us-issues-new-security-guidelines-after-colonial-pipeline-attack/</link>
		
		<dc:creator><![CDATA[Minh Châu (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Sun, 30 May 2021 03:28:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alejandro Mayorkas]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Cisa]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Department of Cybersecurity]]></category>
		<category><![CDATA[Department of Transportation Security]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Guidelines]]></category>
		<category><![CDATA[issues]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Obligatory]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Promulgate]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Show]]></category>
		<category><![CDATA[State of Maryland]]></category>
		<category><![CDATA[TANK]]></category>
		<category><![CDATA[The gas station]]></category>
		<category><![CDATA[TSA]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-issues-new-security-guidelines-after-colonial-pipeline-attack/</guid>

					<description><![CDATA[The DHS statement said TSA is considering additional mandatory measures to enhance cybersecurity to protect the US fuel system. Colonial Pipeline Company&#8217;s fuel tanks in Baltimore, Maryland, USA. (Photo: AFP/VNA) US Department of Homeland Security (DHS) on May 27 issued new security guidance for owners and operators of fuel pipelines. This move follows a cyber [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The DHS statement said TSA is considering additional mandatory measures to enhance cybersecurity to protect the US fuel system.</strong><br />
<span id="more-19182"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_293_38989113/b5ac52c9448badd5f49a.jpg" width="625" height="415"> </p>
<p> <em> Colonial Pipeline Company&#8217;s fuel tanks in Baltimore, Maryland, USA. (Photo: AFP/VNA)</em> <strong> US Department of Homeland Security</strong> (DHS) on May 27 issued new security guidance for owners and operators of fuel pipelines. This move follows a cyber attack on the company&#8217;s fuel pipeline system <strong> Colonial Pipeline</strong> , leading to gas supply disruptions on the US East Coast this month. Homeland Security Secretary Alejandro Mayorkas said: &#8220;The recent malware attack on a major fuel pipeline shows that the cybersecurity of pipeline systems is a critical factor. pivotal to the homeland security of the United States.” Under DHS, owners and operators of <strong> fuel pipeline</strong> Key players will be required to immediately report confirmed and probable cyber-attacks to the Department of Cybersecurity and Infrastructure Security under their respective jurisdictions. <strong> DHS</strong> (CISA), and appoint a cybersecurity coordinator available 24 hours a day and 7 days a week. The issuance of the new guidance also requires fuel pipeline owners and operators to review current cybersecurity measures to detect any vulnerabilities, as well as remedial actions if necessary. there is a risk of a cyber attack. They must notify this result to the Transportation Security Administration (TSA), a unit of DHA, and CISA within 30 days. The DHS statement said TSA is considering additional mandatory measures to enhance cybersecurity to protect the US fuel system. Previously, on May 7, Colonial Pipeline announced that it was attacked by ransomware and forced to close some systems. This incident caused a large-scale supply disruption, causing thousands of gas stations on the US East Coast to fall into shortages and gasoline prices to the highest level since 2017. The US government has issued an order. state of emergency in 17 states and Washington, D.C. After more than 1 week of being affected, the Colonial Pipeline oil pipeline has returned to normal operation. Colonial Pipeline has publicly confirmed paying a ransom to restore computer networks. Meanwhile, the US Federal Bureau of Investigation (FBI) identified DarkSide as the hacker group behind the attack.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19182</post-id>	</item>
		<item>
		<title>Is Colonial Pipeline covered by insurance?</title>
		<link>https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 27 May 2021 09:40:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[CNA]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Covered]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Evil Corp]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hades myth]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Insurance company]]></category>
		<category><![CDATA[Insurrance]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[OFAC]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[sensitive]]></category>
		<category><![CDATA[Steal]]></category>
		<guid isPermaLink="false">https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</guid>

					<description><![CDATA[CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack. Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack.</strong><br />
<span id="more-18536"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_232_38971994/d799f8a1ede304bd5df2.jpg" width="625" height="312"> </p>
<p> Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The hackers then demanded a payment to unlock the files and promised not to leak the stolen data. In recent years, hackers have targeted victims with cyber insurance policies, and large volumes of sensitive consumer data make them more likely to pay ransoms, according to cybersecurity experts. According to the unnamed source, CNA paid the hackers about two weeks after a bunch of company data was stolen and CNA officials were locked out of its own network. CNA does not comment on the ransom, with a CNA spokesperson saying CNA followed all laws, regulations and guidelines, including OFAC&#8217;s 2020 ransomware guide, in handling the matter. CAN also shares attack intelligence and hackers&#8217; identities with the FBI and the Treasury Department&#8217;s Office of Foreign Assets Control because facilitating ransom payments to hackers can cause punishment risk. <strong> The largest ransom amount</strong> Ransomware attacks &#8211; and payments in particular &#8211; are rarely disclosed so it&#8217;s difficult to know what the largest ransom is. The $40 million payout is larger than any previously disclosed payments to hackers. The hackers attacking CNA used malware called Phoenix Locker, a variant of ransomware called &#8216;Hades.&#8217; According to cybersecurity experts, Hades was created by a Russian cybercrime organization called Evil Corp. Evil Corp. was sanctioned by the United States in 2019. However, identifying attacks can be difficult because hacking groups can share code or sell malware to each other. CNA, which provides cyber insurance, said its investigation concluded that the Phoenix hacker group was not on the US sanctions list. The disclosure of the payment is likely to draw outrage from lawmakers and regulators who are unhappy that US companies are paying large sums of money to criminal hackers who over the past year have targeted hospitals, drug manufacturers, police forces and other entities critical to public safety. The FBI discourages organizations from paying ransoms because it encourages additional attacks and does not guarantee data will be returned. Last year was a standout year for ransomware groups, with a task force made up of security experts and law enforcement agencies estimating that victims paid around $350 million in ransom last year, up 311% compared to 2019. The Task Force suggested 48 actions the Biden administration and the private sector could take to mitigate such attacks, including better regulation of money markets. digital currency used to make ransom payments. The report, prepared by the Institute for Security and Technology, was delivered to the White House days before the Colonial Pipeline Company was compromised in a ransomware attack that resulted in fuel shortages and long lines at stores. gas stations along the US East Coast Bloomberg reported that Colonial paid hackers nearly $5 million shortly after the attack. Colonial CEO Joseph Blount, in an interview with the Wall Street Journal published Wednesday, confirmed that the company paid the hackers &#8211; $4.4 million in ransom. According to two people familiar with the CNA attack, the company initially ignored the hacker&#8217;s request and attempted to recover the data without negotiating with the criminals. But within a week, the company decided to start negotiating with the hackers, who were demanding $60 million. Residents said the payment was made a week later. According to Barry Hensley, chief intelligence officer at cybersecurity firm Secureworks Corp. then the Phoenix Locker seems to be a variation of Hades based on the overlap of the code used in each. He said they have not yet identified which hackers used the Hades variant to attack CNA. Cybersecurity firm CrowdStrike Holdings Inc believes Hades was created by Evil Corp. to bypass US sanctions against the hacking group. In December 2019, the Treasury Department announced sanctions against 17 individuals and six entities associated with Evil Corp. At the time, the Treasury Department said Evil Corp used malware &#8220;to infect computers and collect login information from hundreds of banks and financial institutions in more than 40 countries, causing more than 100 million dollars of theft. “It is illegal for any U.S. company to knowingly pay a ransom to Evil Corp. According to Melissa Hathaway, President of Hathaway Global Strategies and a former cybersecurity adviser to Presidents George W. Bush and Barack Obama, demand for ransomware has grown exponentially over the past six months. Hathaway said the average hacker&#8217;s ransom demand is between $50 million and $70 million. Those claims are often negotiable, and companies often pay ransoms in the tens of millions of dollars, in part because cyber insurance policies cover some or all of the costs. Hathaway estimates that the average payout is between $10 and $15 million. <strong> Ngoc Linh </strong> &#8211; According to Insurance Journal</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18536</post-id>	</item>
		<item>
		<title>Gasoline shortage continues after Colonial Pipeline attack tấn</title>
		<link>https://en.spress.net/gasoline-shortage-continues-after-colonial-pipeline-attack-tan/</link>
		
		<dc:creator><![CDATA[Trang Hoàng]]></dc:creator>
		<pubDate>Tue, 25 May 2021 04:31:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Continue]]></category>
		<category><![CDATA[continues]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Panic]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Rio Grande Valley]]></category>
		<category><![CDATA[shortage]]></category>
		<category><![CDATA[South Caroline]]></category>
		<category><![CDATA[Southeast America]]></category>
		<category><![CDATA[Status]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[Tan]]></category>
		<category><![CDATA[The gas station]]></category>
		<category><![CDATA[US East Coast]]></category>
		<category><![CDATA[Virginia]]></category>
		<guid isPermaLink="false">https://en.spress.net/gasoline-shortage-continues-after-colonial-pipeline-attack-tan/</guid>

					<description><![CDATA[Two weeks after the pipeline was disrupted due to the hack, gasoline shortages in the Southeast have been rectified, but some drivers are still finding it difficult to find gas. Illustration. https://tinhtexaydung.petrotimes.vn According to GasBuddy, about 30% of all retail gas stations in North Carolina, South Carolina and George are out of gas. Virginia and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Two weeks after the pipeline was disrupted due to the hack, gasoline shortages in the Southeast have been rectified, but some drivers are still finding it difficult to find gas.</strong><br />
<span id="more-18031"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_232_38942005/9a8ccdedd9af30f169be.jpg" width="625" height="261"> </p>
<p> <em> Illustration. https://tinhtexaydung.petrotimes.vn</em> According to GasBuddy, about 30% of all retail gas stations in North Carolina, South Carolina and George are out of gas. Virginia and Tennessee are also experiencing significant blackouts. Colonial Pipeline&#8217;s main pipeline transporting gasoline and diesel to the US East Coast has been shut down, following a ransomware attack earlier this month. More than a thousand fuel stations in the Southeast have run out of petrol and diesel due to panic buying and pipeline closures. Even people in Texas, in the Rio Grande Valley, are flocking to gas stations to fill up with fuel, when news of gas stations running out of fuel. Colonial Pipeline paid almost $5 million in ransom in the form of a cryptocurrency to the hackers. But 2 weeks after shutting down, some gas stations are still shutting down. In Georgia, according to AAA data, the average price of a gallon of regular retail gasoline was $2,944 as of May 20, up from $2,708 a month before the pipeline failure. In North Carolina, the average price for gasoline is $2,929 per gallon, compared with $2,627 a month ago. According to Reuters, U.S. gasoline consumption is nearing pre-pandemic levels and is now down just 4% in the four weeks since May 14 from the five-year pre-pandemic average. https://tinhtexaydung.petrotimes.vn</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18031</post-id>	</item>
		<item>
		<title>US fuel supply crisis after cyber attack on Colonial Pipeline</title>
		<link>https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</link>
		
		<dc:creator><![CDATA[Lê Quân]]></dc:creator>
		<pubDate>Tue, 18 May 2021 12:18:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[The gas station]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</guid>

					<description><![CDATA[Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago. Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago.</strong><br />
<span id="more-15836"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_72_38808364/c96b64f97abb93e5caaa.jpg" width="625" height="416"> </p>
<p> Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel season. Colonial Pipeline said the company is trying to resume operations this weekend after its fuel pipeline system was paralyzed since May 7 after being hit by a cyber attack. The shutdown of the Colonial Pipeline&#8217;s fuel pipeline system shut down nearly half of the US East Coast&#8217;s fuel supply. The US Energy Administration on May 10 called for mandatory cybersecurity standards for fuel pipeline operators and operators. &#8220;Incentivizing the voluntary application of standards to pipelines is inadequate,&#8221; said US Federal Energy Regulatory Commission Chairman Richard Glick. The US Federal Bureau of Investigation (FBI) has accused a cybercriminal group called &#8220;DarkSide&#8221; of causing a ransomware attack on Colonial Pipeline. Reuters news agency quoted cybersecurity experts as saying that DarkSide is based in Russia or Eastern Europe, so the gang usually avoids targeting computers that use the languages ​​of the former Soviet republics. However, US President Joe Biden on May 10 expressed he did not believe that the Russian government was behind the cyber attack on the Colonial Pipeline. &#8220;So far there is no evidence based on our intelligence that Russia is involved,&#8221; Biden said. A statement titled DarkSide group on May 10 stated: &#8220;Our goal is to make money and not create problems for society.&#8221; Ransomware attack is a type of malware designed to disable computers by encrypting data and blackmailing victims if they want to regain system access. It is not clear what price the hackers offered for Colonial Pipeline, and the company has not commented on the matter. Fuel demand in the southeastern United States has increased sharply in recent days as consumers fear fuel shortages. The Southeastern region of the United States has long depended mainly on the supply of fuel flowing through the Colonial Pipeline&#8217;s pipeline system. The average national gasoline price rose 6 cents to $2.96 a gallon last week, the highest since May 2018 and close to a peak set in 2014, the American Automobile Association said. also warned of speculation about fuel hoarding as the supply continued to decrease. Katina Willey, a resident of Florida on May 10, said she had to go to 5 gas stations to buy gas. &#8220;Consumers have to wait in long lines at three of the five gas stations I go to,&#8221; added Katina Willey. Many other car owners said they were also looking to refill their gas tanks out of fear that the fuel situation could worsen. If the Colonial Pipeline&#8217;s pipeline disruptions continue, fuel suppliers may be able to force fuel transportation by trucks and trains to partially ease the fuel shortage. The US Department of Transportation on May 9 lifted travel restrictions for fuel truck drivers in 17 states affected by supply disruptions.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15836</post-id>	</item>
		<item>
		<title>Things to know about the US Colonial Pipeline attackline</title>
		<link>https://en.spress.net/things-to-know-about-the-us-colonial-pipeline-attackline/</link>
		
		<dc:creator><![CDATA[Nhã Trúc]]></dc:creator>
		<pubDate>Tue, 18 May 2021 04:02:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[attackline]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Fuel tank]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[The infrastructure]]></category>
		<category><![CDATA[Things to know]]></category>
		<guid isPermaLink="false">https://en.spress.net/things-to-know-about-the-us-colonial-pipeline-attackline/</guid>

					<description><![CDATA[The cyberattack that forced the closure of the largest fuel pipeline on the East Coast of the United States has raised new questions about the vulnerability of the country&#8217;s critical infrastructure to cyberattacks. Illustration. The breach at Alpharetta, Georgia-based Colonial Pipeline is the latest in a series of cybersecurity incidents confronting the administration of President [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The cyberattack that forced the closure of the largest fuel pipeline on the East Coast of the United States has raised new questions about the vulnerability of the country&#8217;s critical infrastructure to cyberattacks.</strong><br />
<span id="more-15729"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_318_38811244/db8d4bc05582bcdce593.jpg" width="625" height="416"> </p>
<p> <em> Illustration.</em> The breach at Alpharetta, Georgia-based Colonial Pipeline is the latest in a series of cybersecurity incidents confronting the administration of President Joe Biden &#8211; as well as a striking reminder that many companies Operators of the nation&#8217;s most basic infrastructure, from dams to power plants, are still unprepared to deal with the threats posed by toxic numbers. Here&#8217;s a summary of how a criminal gang managed to get into Colonial&#8217;s systems and why the tool they use &#8211; ransomware &#8211; is such a persistent threat. <strong> How can a hacker shut down a pipeline?</strong> On May 7, Colonial Pipeline said it learned that hackers had infected their computer networks with ransomware, malicious code used to take control of computers and extract payments from victims. The breach affected Colonial&#8217;s business network, which it uses for tasks like payroll management and data reporting to regulators. Colonial disabled those systems, but it also turned off the much more sensitive technology running its pipeline operations — a precaution meant to prevent hackers from accessing it if they hadn&#8217;t already. These systems monitor air flow for impurities and leaks, control power levels, and perform other automated tasks to keep pipelines running smoothly. <strong> What exactly was closed?</strong> Colonial shut down its entire main pipeline, more than 5,500 miles long from Houston, Texas, to Linden, New Jersey. The pipeline transports 45% of gasoline, jet fuel and diesel to the US East Coast, according to the company. The short-lived outage sent wholesale gas prices up on financial markets in the affected region, but that rally cooled slightly during trading on May 10. And while some gasoline retailers may try to add a few cents a gallon to the price at the pump, there have been no reports of shortages at suppliers serving those retail points. Market analysts say the pipeline shutdown will need to last through at least the middle of the week to start affecting supply in some parts of the Southeast, and Houston&#8217;s refineries won&#8217;t start. reduce production unless Colonial shuts down until next week. Overall, the US is stockpiling 235 million barrels of gasoline, enough to supply the whole country for nearly a month. However, retail gasoline prices have risen steadily in recent weeks and any anxiety could accelerate gains as the country approaches Memorial Day weekend, which the industry considers is the beginning of the “summer driving season” in high demand. <strong> How bad could this be?</strong> It depends on whether the outage turns into a protracted crisis for Colonial&#8217;s customers, which include busy airports and US military bases. Some customers can buy fuel from foreign suppliers, but they will face more financial pressure as Colonial&#8217;s pipeline network remains offline. Colonial said on May 10 that it has begun reactivating segments of the pipeline and anticipates &#8220;significantly restoring operational service by the end of the week&#8221;. However, they did not explain what &#8220;basically&#8221; means and did provide some other details about the attack investigation. <strong> What is Ransomware?</strong> Ransomware is software that hackers deploy to lock down victims&#8217; data so they can&#8217;t access or use it &#8211; in the worst case scenario, essentially shutting down an entire company or government office. The hacker then demands a ransom in exchange for providing a digital key to unlock the files. Over the past few years, ransomware has grown from an occasional nuisance to a ubiquitous threat. Victims include the hospital system, the school district and the DC police department, as well as many small businesses. According to the FBI report, ransomware attacks increased by 37% from 2018-2019 and 20% from 2019-2020. According to one report, the pandemic has led to a significant increase in ransomware, with the number of attacks Attacks more than doubled year-on-year, with a particularly large increase in the healthcare sector. The Department of Justice recently launched a task force to explore new solutions to the problem. But in the meantime, the problem continues to get worse as criminal motives grow. <strong> Why aren&#8217;t pipelines and power plants better protected against ransomware?</strong> The private companies that operate much of America&#8217;s critical infrastructure — power plants, dams, natural gas pipelines, and other critical facilities — often neglect to implement safety protocols. government-recommended cybersecurity. While protecting against foreign government hackers sometimes requires complex technology that small critical infrastructure operators cannot afford, protecting against ransomware is are not. Use strong passwords, train employees not to click on suspicious links, and require employees to use multi-factor authentication &#8211; which involves entering a randomly generated number after entering one&#8217;s password &#8211; can prevent all but the most advanced types of hacks, including ransomware. Despite years of warnings from government officials and cybersecurity experts, most companies outside of the highly regulated financial sector have not taken many of these steps. And even organizations that try to take cybersecurity seriously can be covered by small holes. A long-neglected office worker or old computer in a closet is often the weak link that opens an organization&#8217;s doors to hackers. With so many companies leaving themselves with easy targets, many cybercriminals have started using ransomware to make money. By choosing victims they know there can be no downtime, these criminals virtually guarantee themselves an easy profit. Additionally, many ransomware operators have begun exploiting a secondary source of profit: reselling stolen data on the dark web, where sensitive personal information can fetch huge sums. Between victims and hackers is a burgeoning crypto ecosystem, consisting of unscrupulous payment facilitators ready to handle ransom transactions and rock wall law enforcement. <strong> How often do victims pay the ransom?</strong> The US government discourages ransomware victims from paying attackers to regain access to their data. While some ransomware operators honor their agreements and unlock victims&#8217; files to foster trust and increase their chances of receiving a future ransom, many of these criminals simply take the money and disappear. Paying the ransom also encourages cybercriminals to continue their attacks. Anne Neuberger, deputy national security adviser for cyber and emerging technologies, said: “We recognize that victims of cyberattacks often face very difficult situations and they must balance the cost-benefit when there is no other option about paying the ransom,&#8221; &#8211; told reporters on May 10 In the US, it is not illegal to pay a ransom to regain access to locked data. However, it is illegal to pay ransoms to entities on the Treasury&#8217;s sanctions list, and the Treasury Department has warned companies that assist ransomware victims to conduct due diligence on hackers. before making payment arrangements. <strong> DarkSide, what is the group behind the attack?</strong> The FBI has confirmed that the Colonial Pipeline hack was the work of the DarkSide ransomware gang. This group is a relatively newcomer to the ransomware ecosystem, but they are already well known for their professionalism, patience, and large ransom demand. Security firm Cybereason wrote in a report last month: “The team has a phone number and even a help desk to facilitate negotiations with the victim, and they are putting a lot of effort into gathering information. about their victims – not just technical information about their environment, but more general information about the company itself, like the size of the organization and estimated revenue.” DarkSide is based in Russia, but so far the US has said it does not believe the hackers acted on behalf of the government of Russian President Vladimir Putin. Mr. Biden said on the afternoon of May 10: &#8220;To date, there is no evidence &#8230; from our intelligence people that Russia is involved. However, he added: “There is evidence that the actor&#8217;s ransomware is in Russia. They have some responsibility to deal with this.” Like other ransomware gangs, DarkSide operates on a so-called &#8220;ransomware-as-a-service&#8221; model, in which it provides code to less sophisticated hackers and helps them carry out attacks enter in exchange for their share of the profits. After being closely watched by the Colonial Pipeline attack, DarkSide seems to be rethinking this model. On May 10, a purported statement from the DarkSide hackers announced the group&#8217;s intention to scrutinize the partners&#8217; planned attacks in the future to &#8220;avoid social consequences.&#8221; festival&#8221;. “Our goal is to make money, and not create problems for society.” <strong> What is the US government doing with this attack?</strong> The White House has established a working group that includes the Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Agency; The Department of Transport&#8217;s Pipeline and Hazardous Materials Safety Administration; FBI; and the Departments of Energy, Treasury and Defense. These agencies are working together to prepare for various scenarios should the pipeline remain shut, including planning for shortages and higher gas prices. In addition, the Department of Transportation waives regulations that limit the driving time without rest of fuel trucks in 17 states and Washington DC. That could make it easier to deliver to customers due to Colonial&#8217;s closure.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15729</post-id>	</item>
		<item>
		<title>Colonial Pipeline Company has no plans to pay hackers</title>
		<link>https://en.spress.net/colonial-pipeline-company-has-no-plans-to-pay-hackers/</link>
		
		<dc:creator><![CDATA[Hồng Định]]></dc:creator>
		<pubDate>Sat, 15 May 2021 21:59:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Amount]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Ministry of Energy]]></category>
		<category><![CDATA[Oil]]></category>
		<category><![CDATA[owner]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[plans]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[Russian Government]]></category>
		<category><![CDATA[US East Coast]]></category>
		<category><![CDATA[Wednesday]]></category>
		<guid isPermaLink="false">https://en.spress.net/colonial-pipeline-company-has-no-plans-to-pay-hackers/</guid>

					<description><![CDATA[The owner of the Colonial pipeline has no plans to pay the ransom demanded by the hackers who encrypted their data, sources familiar with the company said Wednesday. Illustration. The hack brought down the pipeline, now in its sixth day, and led to panic buying and gas shortages in the Southeastern United States. Colonial said [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The owner of the Colonial pipeline has no plans to pay the ransom demanded by the hackers who encrypted their data, sources familiar with the company said Wednesday.</strong><br />
<span id="more-14756"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_318_38821723/4a11c3eedcac35f26cbd.jpg" width="625" height="390"> </p>
<p> <em> Illustration.</em> The hack brought down the pipeline, now in its sixth day, and led to panic buying and gas shortages in the Southeastern United States. Colonial said it began reopening its pipeline late Wednesday afternoon, a process that could take days, but declined to comment on the ransom issue. Colonial is working closely with law enforcement, the Department of Energy, and US cybersecurity company FireEye to minimize damage and restore operations. Colonial and government responses to the breach are being closely watched following one of the most direct hacking attacks on US critical infrastructure after years of warnings. Ransomware attacks have increased in number and ransom prices, with hackers encrypting data and seeking cryptocurrency payments to unlock. Investigators in the Colonial case say the malware was distributed by a gang known as DarkSide, which consisted of Russian-speaking people and evaded attack targets in the former Soviet Union. DarkSide previously said that it has no intention of meddling in geopolitics and will be more careful about its affiliates going forward. On Wednesday, the group said on its website that it was &#8220;dropping&#8221; data from three other victims, including a technology company in Chicago. Officials have so far found no significant connection to the Russian government, concluding instead that the pipeline company that supplies 45% of the US East Coast&#8217;s oil was crippled by the attack. ransomware. DarkSide allows &#8220;affiliates&#8221; to infiltrate targets in different places, then handle ransom negotiation and data release. Two people involved in the Colonial investigation said the man linked in this case was a Russian criminal with no special ties to the government.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14756</post-id>	</item>
	</channel>
</rss>