The Senate Homeland Security Committee is about to kick off a hearing on the Colonial Pipeline hack with CEO Joseph Blount.

hsgac.senate.gov/hearings/threa…

I'll tweet highlights.
While questioning Colonial CEO Joseph Blount, Senate HSGAC Chair Gary Peters says lawmakers are "working on legislation right now to make sure that information is...being shared" w/ govt.

As we reported: politico.com/news/2021/05/1…
Peters: Where are you today in the restoration process?

Blount: “This week, we're bringing back online seven finance systems that we haven't had since the morning of May 7. ... The remediation is ongoing.”
HSGAC RM Rob Portman: When did you pay the ransom?

Blount: We made the decision to negotiate on the evening of May 7, the day of the hack. But we didn’t make the payment until May 8.
Portman: Did you talked to OFAC before paying, given the potential sanctions implications?

Blount: We hired experts for legal and negotiating assistance, and we checked to make sure that DarkSide was not "an OFAC-sanctioned entity."
Portman: Did DarkSide’s decryption tool work?

Blount: “It has worked.”

Portman: So WSJ story was wrong?

Blount: “That article came out pretty early on...we know subsequently that the encryption decryption tool actually does work to some degree. … It's not a perfect tool.”
Portman: Did you require MFA on all systems prior to the attack?

Blount: Not on the legacy VPN system that was hacked. But that VPN’s password was complicated. “It was not a ‘colonial123’-type password.”

Portman: Agree MFA is critical?

Blount: Yes.
Portman: Do you support TSA’s new pipeline cybersecurity regulations?

Blount: “If you look at our actions starting on May 7, we, almost to the tee, duplicated what the new standards are, and we are in full compliance today as well.”
Portman: Should there be cyber hygiene requirements for critical infrastructure?

Blount: “Anything that can help industry have better security practices standards to follow would be extremely helpful," esp. for smaller companies.
Tom Carper: What’s the most important advice you can offer to other companies?

Blount: Look at your defenses, have an emergency response plan, and be transparent with the authorities.
Carper: How quickly did you contact the FBI?

Blount: “Within hours.”
Blount says Colonial called the FBI's Atlanta office, which referred the company to the FBI’s DarkSide “center of excellence” in California.

Several years ago, the FBI reorganized its cyber operations around threats. This is an example of the specialization in various offices.
Ron Johnson opens his time by saying that Colonial was "not the bad guy here" and encouraging people to treat the company as "the victim of a crime" rather than focusing on what they could have done better.
Maggie Hassan: Did your spending analyses incorporate your responsibility to the public?

Blount: “That's always been our focus our investment.”
Hassan: Cybersecurity doesn’t seem to have been a “formal factor” in your spending analyses.

Blount: “We take cybersecurity very seriously. … We’ve never had our board deny us any funds associated with safety and security. … If my CIO wants funds, she gets them.”
James Lankford says the Colonial hack shows the need for pipelines, calling them "essential to America" and mentioning liberal opposition to projects such as the Keystone XL pipeline.
Jacky Rosen: Is it true, as press reported, that you refused to participate in a voluntary CISA/TSA security review?

Blount: “That [report] was quite a shock to me and quite a shock to our CIO.”

He doesn't deny it.
Rosen: Do you participate in security reviews on a regular basis?

Blount: “We do participate in periodic penetration tests, we do auditing, outside auditing, of our cyber procedures and our IT department."
Rosen: Should you have been personally involved in security reviews?

Blount: "While it'd be nice to be involved in every conversation ... I can't be every place at once. ... It was well taken care of by any number of my management team members."
Rosen: Why didn’t you directly share information with CISA?

Blount: “We knew that CISA would be notified and brought into the conversation. We had a conversation with CISA the first day as a result of that connection with the FBI. If the FBI had not called them, we would have.”
Blount on acting CISA Director Brandon Wales saying Colonial wasn't sharing data:

“I don't know why he made that statement, but I can tell you, we would have called him. There's no reason not to. We were extremely transparent, and we wanted all the help that we could get..."
Josh Hawley: Why didn’t you accept TSA’s offer of a comprehensive cybersecurity review?

Blount: We were setting it up. Covid and bldg move made it difficult.

Hawley: Do you regret not doing it?

Blount: “Anything that you could do is always helpful.”
Hawley: Do you think the TSA review would have just duplicated what you were already checking?

Blount: “I think in this case, it probably would not have resulted in finding that legacy VPN. They don't actually go into the system. It's a questionnaire-format type thing.”
Hawley: What should Congress require companies like yours to do?

Blount: “I think what Congress should require is that we have a focus on safety and security of this critical asset.”
Jon Ossoff: Can you share Mandiant’s incident report once it’s finished?

Blount: “I don’t think there’s any issue with that. ... We'll be very transparent."
Peters, adjourning the hearing, says, “Cyberattacks used to be merely an inconvenience. We now know that they're becoming attacks on our very way of life.”

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Eric Geller

Eric Geller Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ericgeller

7 Jun
"[B]ehind the scenes, the company had taken early steps to notify the FBI and followed instructions that helped investigators track the payment to a cryptocurrency wallet used by the hackers..."

Some good PR for Colonial and a much-needed bright spot for USG in all this.
DOJ press conference starting now.

justice.gov/live

“Ransomware attacks have increased in both scope and sophistication in the last year, targeting our critical infrastructure businesses of all types, whole cities, and even law enforcement," Deputy AG Lisa Monaco says.
Monaco: “The Department of Justice has found and recaptured the majority of the ransom Colonial paid to the DarkSide network in the wake of last month’s ransomware attack.”
Read 15 tweets
12 May
BREAKING: Biden signs sweeping cyber EO to close gaps exposed by SolarWinds.

Highlights:
* Incident reporting reqs for IT contractors
* Security reqs for software contractors
* Encryption, MFA, EDR reqs for agencies
* Cyber incident review board

Story: subscriber.politicopro.com/article/2021/0…
More highlights:

* Pushes toward zero-trust architecture
* FedRAMP cloud security modernization
* New fed cloud strategy
IoT security labeling pilot program
* Encourages SBOM
* CISA incident response "playbooks" for agencies
* Govt-wide log retention/analysis policy
The EO "makes a down-payment towards modernizing our cyber defenses" and "reflects a fundamental shift in our mindset from incident response to prevention, from talking about security to doing security," a sr admin official told reporters.
Read 17 tweets
11 May
Senate Homeland Security Committee hearing on SolarWinds and federal cybersecurity is starting now: hsgac.senate.gov/hearings/preve…
In opening statement, ranking member Rob Portman questions why HHS didn't declare its SolarWinds breach to be a "major incident" per FISMA. He also questions why HSGAC learned from news reports that SolarWinds had hit DHS/CISA, including DHS secretary and incident responders.
In opening statement, Acting CISA Director Brandon Wales says one of CISA's top priorities this year is creating joint cyber planning office (authorized in NDAA) to strengthen public-private collaboration, which he says was key to successful SolarWinds/Exchange responses.
Read 18 tweets
10 May
Biden addressed the Colonial Pipeline hack a few minutes ago.

"So far there is no evidence from our intelligence people that Russia is involved, although there is evidence that the actor's ransomware is in Russia. They have some responsibility to deal with this."
Biden was asked, if you can't protect U.S. critical infrastructure from a criminal gang, how can you protect it from a nation-state actor?

"We can do both," he responded, "and we will."
"This is something that our administration has been tracking extremely carefully, and I have been personally briefed every day," Biden said at the top of his remarks.
Read 4 tweets
10 May
White House briefing starting now, with Homeland Security Adviser Elizabeth Sherwood-Randall and Deputy National Security Adviser for Cyber and Emerging Technologies Anne Neuberger.
Sherwood-Randall: "Thus far, Colonial has told us that [its pipeline] has not suffered damage and can be brought back online relatively quickly, but that safety is a priority, given that it is never before taken the entire pipeline down."
A White House-convened interagency team with DOE, CISA, FBI, DOT, Treasury, and DoD "met throughout the weekend," Sherwood-Randall said.
Read 17 tweets
30 Mar
DHS just wrapped up a background briefing with senior officials on the department's cybersecurity agenda.

Nothing earth-shattering, but I'll share a few comments that stood out to me.
We've previously heard from Anne Neuberger that the Biden administration has an EO coming with mitigations related to the SolarWinds/Exchange vulnerabilities. Today, a senior DHS official told us that it will contain "close to a dozen actions."
DHS Sec Mayorkas will be discussing cyber tomorrow during an RSA event.

Per sr official, he will offer a "comprehensive vision" for using DHS/CISA to defend the country, incl through several "cybersecurity sprints" that he previously teased.

1st sprint will focus on ransomware.
Read 11 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(