ATTENTION!! Hackers DID NOT shut down colonial pipeline, Colonial pipeline did. | |
Anonymous Coward User ID: 80083162 United States 05/12/2021 04:10 AM Report Abusive Post Report Copyright Violation | |
Paul Drake
User ID: 77420325 United States 05/12/2021 04:22 AM Report Abusive Post Report Copyright Violation | Maybe I haven't been paying close enough attention but with everything I've heard implied that it was the hackers that shut it down. Quoting: Uncle Monkey. The hackers did not shutdown the pipeline, it was shutdown by colonial as a precaution because of the attack. "In a statement published Saturday, Colonial Pipeline said a ransomware attack infected its IT network. As a precaution, the company also shut down all its pipeline operations, including its OT network- a separate network that controls its pipelines and distributes fuel." "Connecting IT and OT networks performs a critical business function for Colonial (and other critical infrastructure providers) by enabling timely and accurate billing for fuel. However, that same connection could allow ransomware or another security compromise to compromise OT systems. That possibility led Colonial to halt pipeline operations." So colonial has it within their power to restore the pipeline. They just don't want to risk their IT and OT networks from being hit and not allowing them to accurately bill the providers. Full article found here. [link to www.adamsandreese.com (secure)] I find it really hard to believe that their IT or CM department didn't have disaster prevention or emergency management plan of some sort with complete backups of the system stored in multiple locations, one of them at an offsite location - especially given government oversight over something so critical to the country's energy system. I'm not buying this bullshit. This scenario is planned and purposeful - I have zero doubt. There is no legitimate reason they are taking days to get it back online. |
Anonymous Coward User ID: 76710820 United States 05/12/2021 04:46 AM Report Abusive Post Report Copyright Violation | After four years of our media pushing the "Russian collusion" narrative during the Trump presidency, nobody with a brain should give them the benefit of the doubt when they assert that this was caused by a "Russian hacker". Quoting: WalrusRider The ruling elite have chosen to paint Russia as the enemy, but the real enemies are the ruling elite themselves, their zombified communist minions, and China. When every level of government and media is filled with corruption to such a degree that BLM is praised as they burn the country down, you know that none of them are trustworthy anymore. They were never trustworthy in the first place. |
Anonymous Coward User ID: 76564046 United States 05/12/2021 09:10 AM Report Abusive Post Report Copyright Violation | AIR Quoting: tkwasny GAP SECURITY No bluetooth, wifi, mikes, speakers. All unused ports hardware disabled by a desoldering station. Critical infrastructure requires SIPRNET or JWICS security levels. Idiots. For the win Exactly Brains must be engaged in their exercises... Brain dead zombies do not count... Redundancy may not be exciting but critical Even in medical field they are not secure... Seems it is a pronounced pattern.... Of the arrogant... Koch brothers qualifies Selling their pyramid to bass pro shops?!? (All of the pyramid???) |
Dark Monkey.
(OP) User ID: 77667036 United States 05/12/2021 12:28 PM Report Abusive Post Report Copyright Violation | I work for a printing company, our printing presses are all controlled by computers. Last year we were hit with a ransomware attack that shut down our computers that we use for emails, billing, bidding on jobs, logging in the production of the press etc. When the attack happened, we didnt stop using our printing presses because there was no need to. We kept our production going despite our other computers not connected to the machines were hacked. It took a couple weeks before the hacked network was up and runnibg again. This is no different from what happened to the pipeline but yet they shut diwn the whole thing. I'll take the vax when you inject it into my cold dead arm. Let's go Brandon Fuck Joe Biden. 80 million votes my ass. |
Redcat1
Redcat User ID: 59593423 United States 05/12/2021 12:55 PM Report Abusive Post Report Copyright Violation | Maybe I haven't been paying close enough attention but with everything I've heard implied that it was the hackers that shut it down. Quoting: Uncle Monkey. The hackers did not shutdown the pipeline, it was shutdown by colonial as a precaution because of the attack. "In a statement published Saturday, Colonial Pipeline said a ransomware attack infected its IT network. As a precaution, the company also shut down all its pipeline operations, including its OT network- a separate network that controls its pipelines and distributes fuel." "Connecting IT and OT networks performs a critical business function for Colonial (and other critical infrastructure providers) by enabling timely and accurate billing for fuel. However, that same connection could allow ransomware or another security compromise to compromise OT systems. That possibility led Colonial to halt pipeline operations." So colonial has it within their power to restore the pipeline. They just don't want to risk their IT and OT networks from being hit and not allowing them to accurately bill the providers. Full article found here. [link to www.adamsandreese.com (secure)] I find it really hard to believe that their IT or CM department didn't have disaster prevention or emergency management plan of some sort with complete backups of the system stored in multiple locations, one of them at an offsite location - especially given government oversight over something so critical to the country's energy system. I'm not buying this bullshit. This scenario is planned and purposeful - I have zero doubt. There is no legitimate reason they are taking days to get it back online. Even with all the things you mention above it will take longer than days to bring an entity back online when attacked by these insidious ransomware attacks. The attacks go after backups. And fewer organizations use offline "iron mountain" type tape backup. These attacks are very nasty. Not saying that is what happened, but if it was - a week or less is really good recovery time. Two weeks or more can be normal in larger entities hit by these things. |