Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

National Security Implications of the Colonial Pipeline Hack

By Emil Sayegh
June 01, 2021

It is difficult, if not impossible to think of a comparable cyber event to the one that effectively shut down the fuel pipeline that feeds over a third of the United States. The incident is unprecedented, and it is almost unfathomable that it occurred — despite warnings and longstanding fears about this very type of critical infrastructure incident. As the reports roll in of yet another critical widespread security incident, we are in the midst of a national cyber crisis, in addition to a border crisis, an economic crisis, and a winding pandemic. While we may have blueprints for the resolution of these other crises, things must urgently change on the cybersecurity front.

Over the last several months, major cyberattacks have been all too common mercilessly sparing no one including hospitals and schools, and even more recently an attack on JBS, the world's largest beef supplier, who was forced to close its meat processing plants in the United States and Australia. Many organizations are also still reeling from the effects of the widespread Microsoft Exchange vulnerability exploit known as "Hafnium". Affecting an untold number of companies at the core of their communications, this exploit was designed to silently steal data and it has been traced back to Chinese hacking collectives. A little further back, we found out about the SolarWinds attack, which ultimately affected thousands of companies, blinding them from their environments, injecting code and leaking data, this time tracing back to Russian sources. (For more on the SolarWinds attack, see, "How Should Directors Respond to the SolarWinds Attack," in the May 2021 issue of Cybersecurity Law & Strategy.) There is also the continual feed of ransomware incidents and a few months ago, a cyber-attack attempted to poison a water-treatment plant in Florida.

|

The Unthinkable

Unfortunately, Colonial Pipeline reportedly did the one thing that most security advisors and the FBI say should never be done — they paid close to $5 million in ransom to "Eastern European" hackers. (This price was apparently described as a 'bargain' based on comparisons to other ransomware attacks). This choice is only made when an organization has no strong cybersecurity plans, and no choice in the first place. Statistics show that less than 10 percent of companies that pay the ransom get all the data back they lost, and once a company pays, they will be known as a company that pays; meaning, hackers will come back for more.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
How Secure Is the AI System Your Law Firm Is Using? Image

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.