{"id":6336,"date":"2021-05-13T19:09:53","date_gmt":"2021-05-14T02:09:53","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6336"},"modified":"2024-04-26T13:20:41","modified_gmt":"2024-04-26T20:20:41","slug":"cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/","title":{"rendered":"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline"},"content":{"rendered":"<h3>Author: Yadu Nadh<\/h3>\n<h3>TLP: WHITE<\/h3>\n<p>&nbsp;<\/p>\n<h3>1. Executive Summary<\/h3>\n<p>On 11 May, the Cybersecurity and Infrastructure Security Agency (CISA) published analytic report AA21-131A,<sup>1<\/sup> which detailed a ransomware attack on the Colonial Pipeline, an important infrastructure entity in the U.S. In this attack, the threat actor(s) deployed DarkSide ransomware against the pipeline company\u2019s critical IT infrastructure, causing the company to take the precautionary measure of shutting down 5,550 miles of the pipeline, which left fuel stranded on the Gulf Coast.<sup>2<\/sup><\/p>\n<p>Although first observed in the wild in August 2020, DarkSide ransomware officially appeared on XSS, a popular Russian-language hacker forum in November 2020.<sup>3<\/sup> Infoblox has observed and can confirm this activity since early 2021.<\/p>\n<p>DarkSide is a ransomware-as-a-service (RaaS), where the threat actors who deploy the ransomware, also known as \u201caffiliates,\u201d share a portion of the profits with the developers. Threat actors use DarkSide to encrypt and steal sensitive data, and have been known to target large, high-revenue organizations that can afford to pay large ransoms versus hospitals, schools, governments, etc.<\/p>\n<p>Once the DarkSide actors gain access to a victim\u2019s network, they deploy the ransomware to encrypt and exfiltrate sensitive data. The actors then use a double extortion method where they threaten to publicly release this data to pressure the victims into paying the ransom demand, as well as demand another ransom for a digital key to decrypt their files.<\/p>\n<h3>2. Analysis<\/h3>\n<p>DarkSide affiliates have been known to use a variety of strategies to gain initial access to networks such as brute-force attacks, spam campaigns, credentials purchased from underground forums, or by exploiting vulnerable software such as Remote Desktop Web (RDWeb), Remote Desktop Protocol (RDP) or Citrix. Actors have also purchased access to popular botnets, including Dridex, Trickbot and Zloader.<\/p>\n<p>The DarkSide attackers establish communication with a command and control (C&amp;C) system using an RDP that runs over a TOR network. As a secondary C&amp;C communication method, the attackers used Cobalt Strike and other post-exploitation tools. Threat actors associated with DarkSide have also been known to use additional tools such as Metasploit, Mimikatz and BloodHound.<\/p>\n<p>DarkSide uses a \u201cliving off the land\u201d (LotL) tactic,<sup>4<\/sup> but researchers at Varonis observed the ransomware also scanning for networks, running commands, dumping processes, and stealing credentials. It will use Salsa20 encryption with an RSA-1024 public key to encrypt files on both fixed and removable hardware, as well as on network devices.<sup>5<\/sup> This malware also specifically creates executables and extensions to evade signature-based detection mechanisms.<\/p>\n<p>On execution, DarkSide copies itself to the path \u201c%Temp%\u201d and injects its code into an existing process. It will dynamically load its libraries to avoid detection by an antivirus (AV) or an endpoint detection and response (EDR) solution, as well as stop running if it observes any indication that it is being run in a virtual machine.<sup>6<\/sup><\/p>\n<h3>3. Prevention and Mitigation<\/h3>\n<p>CISA urges critical infrastructure owners and operators to apply the following mitigations to reduce the risk of compromise by ransomware attacks:<\/p>\n<ul>\n<li>Require multi-factor authentication for remote access to OT and IT networks.<\/li>\n<li>Filter network traffic to prohibit ingress and egress communications with known malicious IP.<\/li>\n<li>Update software, including operating systems, applications and firmware on IT network assets in a timely manner.<\/li>\n<li>Limit access to resources over networks, especially by restricting RDP.<\/li>\n<li>Set antivirus\/antimalware programs to conduct regular scans of IT network assets using up-to-date signatures.<\/li>\n<li>Monitor and\/or block inbound connections from TOR exit nodes Originating from TOR.<\/li>\n<li>Deploy signatures to detect and\/or block inbound connections from Cobalt Strike.<\/li>\n<li>Implement and ensure robust network segmentation between IT and OT networks.<\/li>\n<li>Organize OT assets into logical zones.<\/li>\n<li>Identify OT and IT network inter-dependencies and develop workarounds manual controls.<\/li>\n<li>Implement regular data backup procedures on both the IT and OT networks.<\/li>\n<\/ul>\n<h3>\u00a0\u00a0\u00a0 4. Indicators of Compromise<\/h3>\n<table width=\"700\">\n<tbody>\n<tr>\n<td width=\"584\">\n<p style=\"text-align: center;\"><strong>Indicator<\/strong><\/p>\n<\/td>\n<td width=\"116\">\n<p style=\"text-align: center;\"><strong>Description<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"584\">\n<p style=\"text-align: center;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 5467a0aa064d7340031e9087cdbdacc2c656c80a45 8a913889f308056533d9eb<\/p>\n<p style=\"text-align: center;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9<\/p>\n<p style=\"text-align: center;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 48a848bc9e0f126b41e5ca196707412c7c40087404c0c8ed70e5cee4a418203a<\/p>\n<p style=\"text-align: center;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 7375adedb82fd62cefc6b6fd20a704a164e056022f3b8c2e1b94f3a9b8361478<\/p>\n<p style=\"text-align: center;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 9cee5522a7ca2bfca7cd3d9daba23e9a30deb6205f56c12045839075f7627297<\/p>\n<p style=\"text-align: center;\">b9d60d450664c1e8fbfd6b2ec58fdeb2fd81797e183906a4536b59bc4f79846f<\/p>\n<\/td>\n<td width=\"116\">\n<p style=\"text-align: center;\">Hashes related to Darkside ransomware\u00a0attack<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"584\">\n<p style=\"text-align: center;\">51[.]210[.]138[.]71<\/p>\n<p style=\"text-align: center;\">185[.]105[.]109[.]19<\/p>\n<p style=\"text-align: center;\">104[.]21[.]69[.]79<\/p>\n<p style=\"text-align: center;\">185[.]203[.]116[.]7<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]197<\/p>\n<p style=\"text-align: center;\">172[.]67[.]206[.]76<\/p>\n<p style=\"text-align: center;\">159[.]65[.]225[.]72<\/p>\n<p style=\"text-align: center;\">198[.]54[.]117[.]199<\/p>\n<p style=\"text-align: center;\">108[.]62[.]118[.]232<\/p>\n<p style=\"text-align: center;\">212[.]109[.]221[.]205<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"116\">Associated IPs<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1 style=\"text-align: center;\"><\/h1>\n<h1 style=\"text-align: center;\"><\/h1>\n<table width=\"700\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"584\">fotoeuropa[.]ro<\/p>\n<p>kgtwiakkdooplnihvali[.]com<\/p>\n<p>ironnetworks[.]xyz<\/p>\n<p>lagrom[.]com<\/p>\n<p>ironnetworks[.]xyz<\/p>\n<p>darksidfqzcuhtk2[.]onion<\/p>\n<p>de2pv25fb37xbq32qqfjooyegaucbnaupfu3aoti56c2i744hjxuwpqd[.]onion<\/td>\n<td width=\"116\">\n<p style=\"text-align: center;\">Associated domains<\/p>\n<p style=\"text-align: center;\">\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1><\/h1>\n<h3><strong>\u00a0<\/strong>Endnotes<\/h3>\n<ol>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-131a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-131a<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2021\/05\/a-closer-look-at-the-darkside-ransomware-gang\/\">https:\/\/krebsonsecurity.com\/2021\/05\/a-closer-look-at-the-darkside-ransomware-gang\/<\/a><\/li>\n<li><a href=\"https:\/\/www.intel471.com\/blog\/darkside-ransomware-colonial-pipeline-attack\">https:\/\/www.intel471.com\/blog\/darkside-ransomware-colonial-pipeline-attack<\/a><\/li>\n<li><a href=\"https:\/\/logrhythm.com\/blog\/what-are-living-off-the-land-attacks\/\">https:\/\/logrhythm.com\/blog\/what-are-living-off-the-land-attacks\/<\/a><\/li>\n<li><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2021\/05\/shining-a-light-on-darkside-ransomware-operations.html\">https:\/\/www.fireeye.com\/blog\/threat-research\/2021\/05\/shining-a-light-on-darkside-ransomware-operations.html<\/a><\/li>\n<li><a href=\"https:\/\/www.varonis.com\/blog\/darkside-ransomware\/\">https:\/\/www.varonis.com\/blog\/darkside-ransomware\/<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Yadu Nadh TLP: WHITE &nbsp; 1. Executive Summary On 11 May, the Cybersecurity and Infrastructure Security Agency (CISA) published analytic report AA21-131A,1 which detailed a ransomware attack on the Colonial Pipeline, an important infrastructure entity in the U.S. In this attack, the threat actor(s) deployed DarkSide ransomware against the pipeline company\u2019s critical IT infrastructure, [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6733,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[554],"tags":[498,499,288],"class_list":{"0":"post-6336","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-threat-advisory","8":"tag-colonial-pipeline","9":"tag-darkside","10":"tag-ransomware","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline<\/title>\n<meta name=\"description\" content=\"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline. On 11 May, the Cybersecurity and Infrastructure Security Agency (CISA) published analytic report AA21-131A,1 which detailed a ransomware attack on the Colonial Pipeline, an important infrastructure entity in the U.S. In this attack, the threat actor(s) deployed DarkSide ransomware against the pipeline company\u2019s critical IT infrastructure, causing the company to take the precautionary measure of shutting down 5,550 miles of the pipeline, which left fuel stranded on the Gulf Coast.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline\" \/>\n<meta property=\"og:description\" content=\"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline. On 11 May, the Cybersecurity and Infrastructure Security Agency (CISA) published analytic report AA21-131A,1 which detailed a ransomware attack on the Colonial Pipeline, an important infrastructure entity in the U.S. In this attack, the threat actor(s) deployed DarkSide ransomware against the pipeline company\u2019s critical IT infrastructure, causing the company to take the precautionary measure of shutting down 5,550 miles of the pipeline, which left fuel stranded on the Gulf Coast.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-14T02:09:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline\",\"datePublished\":\"2021-05-14T02:09:53+00:00\",\"dateModified\":\"2024-04-26T20:20:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/\"},\"wordCount\":800,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-37.jpg\",\"keywords\":[\"Colonial Pipeline\",\"DarkSide\",\"Ransomware\"],\"articleSection\":[\"Cyber Threat Advisory\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/\",\"name\":\"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-37.jpg\",\"datePublished\":\"2021-05-14T02:09:53+00:00\",\"dateModified\":\"2024-04-26T20:20:41+00:00\",\"description\":\"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline. On 11 May, the Cybersecurity and Infrastructure Security Agency (CISA) published analytic report AA21-131A,1 which detailed a ransomware attack on the Colonial Pipeline, an important infrastructure entity in the U.S. In this attack, the threat actor(s) deployed DarkSide ransomware against the pipeline company\u2019s critical IT infrastructure, causing the company to take the precautionary measure of shutting down 5,550 miles of the pipeline, which left fuel stranded on the Gulf Coast.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-37.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-37.jpg\",\"width\":612,\"height\":344,\"caption\":\"computer screen with programming code and an alert message, concept of computer security, malware or hacker attack (3d render)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-threat-advisory\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline","description":"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline. On 11 May, the Cybersecurity and Infrastructure Security Agency (CISA) published analytic report AA21-131A,1 which detailed a ransomware attack on the Colonial Pipeline, an important infrastructure entity in the U.S. In this attack, the threat actor(s) deployed DarkSide ransomware against the pipeline company\u2019s critical IT infrastructure, causing the company to take the precautionary measure of shutting down 5,550 miles of the pipeline, which left fuel stranded on the Gulf Coast.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline","og_description":"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline. On 11 May, the Cybersecurity and Infrastructure Security Agency (CISA) published analytic report AA21-131A,1 which detailed a ransomware attack on the Colonial Pipeline, an important infrastructure entity in the U.S. In this attack, the threat actor(s) deployed DarkSide ransomware against the pipeline company\u2019s critical IT infrastructure, causing the company to take the precautionary measure of shutting down 5,550 miles of the pipeline, which left fuel stranded on the Gulf Coast.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/","og_site_name":"Infoblox Blog","article_published_time":"2021-05-14T02:09:53+00:00","article_modified_time":"2024-04-26T20:20:41+00:00","og_image":[{"width":612,"height":344,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline","datePublished":"2021-05-14T02:09:53+00:00","dateModified":"2024-04-26T20:20:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/"},"wordCount":800,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","keywords":["Colonial Pipeline","DarkSide","Ransomware"],"articleSection":["Cyber Threat Advisory"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/","name":"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","datePublished":"2021-05-14T02:09:53+00:00","dateModified":"2024-04-26T20:20:41+00:00","description":"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline. On 11 May, the Cybersecurity and Infrastructure Security Agency (CISA) published analytic report AA21-131A,1 which detailed a ransomware attack on the Colonial Pipeline, an important infrastructure entity in the U.S. In this attack, the threat actor(s) deployed DarkSide ransomware against the pipeline company\u2019s critical IT infrastructure, causing the company to take the precautionary measure of shutting down 5,550 miles of the pipeline, which left fuel stranded on the Gulf Coast.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","width":612,"height":344,"caption":"computer screen with programming code and an alert message, concept of computer security, malware or hacker attack (3d render)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-threat-advisory\/"},{"@type":"ListItem","position":4,"name":"Cyber Threat Advisory: DarkSide Ransomware Attack on Colonial Pipeline"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6336"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6336\/revisions"}],"predecessor-version":[{"id":6340,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6336\/revisions\/6340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6733"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}