Colonial Pipeline cyber attack: US seizes most of the ransom from hacker group DarkSide

Washington: The Department of Justice said on Monday that it had seized much of the ransom that a major US pipeline operator had paid last month to a Russian hacking collective, turning the tables on the hackers by reaching into a digital wallet to snatch back millions of dollars in cryptocurrency.

Investigators in recent weeks traced 75 bitcoins worth more than $4 million that Colonial Pipeline had paid to the hackers as the attack shut down its computer systems, prompting fuel shortages, a spike in gasoline prices and chaos at airlines.

Federal investigators tracked the ransom as it moved through a maze of at least 23 different electronic accounts belonging to DarkSide, the hacking group, before landing in one that a federal judge allowed them to break into, according to law enforcement officials and court documents.

The justice department said it seized 63.7 bitcoins, valued at about $2.3 million. (The value of Bitcoin has dropped over the past month.)

“The sophisticated use of technology to hold businesses and even whole cities hostage for profit is decidedly a 21st-century challenge, but the old adage ‘follow the money’ still applies,” Lisa Monaco, the deputy attorney general, said at the news conference at the justice department.

Law enforcement officials highlighted the seizure in an effort to warn cybercriminals that the United States planned to take aim at their profits, which are often gained through cryptocurrencies like Bitcoin. It was also intended to encourage victims of ransomware attacks — which occur every eight minutes, on average — to notify authorities to help recover ransoms.

For years, victims have opted to quietly pay cybercriminals, calculating that the payment would be cheaper than rebuilding data and services. Though the FBI discourages ransom payments, they are legal and even tax deductible. But the payments — which collectively total billions of dollars — have funded and emboldened ransomware groups.

Justice department officials said that Colonial’s willingness to quickly loop in the FBI helped recoup the ransom portion, and they credited the company for its role in a first-of-its-kind effort by a new ransomware task force in the department to hijack a cybercrime group’s profits.

“We must continue to take cyberthreats seriously and invest accordingly to harden our defences,” Joseph Blount, CEO of Colonial, said in a statement. Blount said that after his company contacted the FBI and the justice department to notify them of the attack, investigators helped Colonial understand the hackers and their tactics.

The justice department’s announcement also came before President Joe Biden’s scheduled meeting with President Vladimir Putin of Russia next week in Geneva, where Biden is expected to address what US officials see as the Kremlin’s willingness to provide protection for hackers. Russia typically does not arrest or extradite suspects in ransomware attacks.

The New York Times reported last month that Colonial Pipeline’s ransom payout had moved out of DarkSide’s Bitcoin wallet, though it was not clear who had orchestrated the move.

On Monday, the government filled in some of the blanks. DarkSide operates by providing ransomware to affiliates. In exchange, DarkSide reaps a cut of their profits.

Officials said they had identified a virtual currency account, often referred to as a wallet, that DarkSide used to collect payment from a ransomware victim — identified in court papers only as Victim X, but whose hacking details match Colonial’s. The officials said that a magistrate judge in the Northern District of California had approved a warrant Monday to seize funds from the wallet.

The FBI began investigating DarkSide last year and identified more than 90 victims across multiple sectors of the economy, including manufacturing, law, insurance, health care and energy, Paul Abbate, the deputy director of the FBI, said at the news conference.

DarkSide first surfaced in August and is believed to have started as an affiliate of another Russian hacking group, called REvil, before opening its own operation last year.

Weeks after DarkSide attacked Colonial, REvil used ransomware to try to extort money from JBS, one of the world’s largest meat processors. The attack forced the company to shutter nine beef plants in the United States, disrupted poultry and pork plants, and had significant effects on grocery stores and restaurants, which have had to charge more or remove meat products from their menus.

In recent weeks, ransomware has also crippled the hospital that serves The Villages in Florida, the largest retirement community in the United States; television networks; NBA and minor league baseball teams; and even ferries to Nantucket and Martha’s Vineyard in Massachusetts.

The episodes have elevated digital vulnerabilities into the national consciousness. White House officials said last week that they were working to address issues with cryptocurrency, which has enabled ransomware attacks for years.

Last week, Christopher Wray, the FBI director, likened the threat of ransomware attacks to the challenge of global terrorism in the days after the 11 September, 2001, attacks.

“There are a lot of parallels, there’s a lot of importance, and a lot of focus by us on disruption and prevention,” he said. “There’s a shared responsibility, not just across government agencies, but across the private sector and even the average American.”

Wray added that the FBI was investigating 100 software variants used in ransomware attacks, demonstrating the scale of the problem.

Though US officials have been careful not to directly tie the ransomware attacks to Russia, Biden, Wray and others have said that the country protects cybercriminals.

In many cases, Russia treats them as national assets. In a 2014 breach of Yahoo, for example, Russian intelligence officers worked side by side with cybercriminals, allowing them to profit off stolen data, while instructing them to pass email accounts to the FSB, the successor agency to the Soviet-era KGB.

Putin has likened hackers to “artists who wake up in the morning in a good mood and start painting.” The reality, US officials say, is that they give Putin and Russian intelligence services a layer of plausible deniability.

Not only is Biden expected to address the issue with Putin, but the State Department is also in talks with some two dozen other countries on ways to mutually pressure Russia to address cybercrime.

“If the Russian government wants to show that it’s serious about this issue, there’s a lot of room for them to demonstrate some real progress that we’re not seeing,” Wray said last week.

Anne Neuberger, the deputy national security adviser for cyber and emerging technologies, warned American businesses last week that ransomware had taken a dark turn, noting a recent shift “from stealing data to disrupting operations.”

The hackers took direct aim at Colonial’s billing systems. With those frozen, executives found they had no way to charge customers and preemptively shut down operations. A confidential government assessment determined that if the pipeline had been shuttered for even two more days, the attack could have brought mass transit and chemical refineries, which rely on Colonial to transport diesel, to their knees.

The White House held emergency meetings to address the attack. The Biden administration announced that it would require pipeline companies to report significant cyberattacks and that the government would create 24-hour emergency centres to handle serious hackings.

Cybersecurity experts welcomed the justice department’s move.

“It has become clear that we need to use several tools to stem the tide” of ransomware, said John Hultquist, a vice-president at the cybersecurity firm FireEye. “A stronger focus on disruption may disincentivise this behavior, which is growing in a vicious cycle.”

This article originally appeared in The New York Times.

Katie Benner and Nicole Perlroth c.2021 The New York Times Company



Post a Comment

0 Comments