I guess they showed us they can cut us off at will
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
said that saturday. and nobody ever answered what about all the gas in the Doraville tank farm.That pipeline has been there for more than 50 years. Was operated long before Al Gore invented the internet. It could be operated with phones and on site operators at the pumping stations. If they had an emergency plan, the public would have never even known it was down.
Plantation pipeline operates a line just a few miles from the Colonial line and largely parallel, it was not down. The “shortage” was caused by panic buyers, plain and simple. Supply would have been ample had people not gone stupid and started filling Walmart bags with gas.
Rant over
IDK, but my experience with that same scenario, is that they paid the ransom. It would take months to airgap a back up and restart from a blank slate.So, did they air gap it? Or is it still connected to the internet?
I do believe that one on the right is a whale, not a seal.View attachment 3260818these guys are available
Can we all say... Bull ****.From what I read Colonial's accounting systems were hacked, not their pumping operations.
Colonial voluntarily took their pumping/storage computer systems off-line to stop a potentially hack.
Colonial brought in so-called experts who say all is good, so tonight Colonial is back to pumping.
I think that is yet to be determined.
I follow some security industry pros on Twitter and one of them said the company was using a previous version of Microsoft Exchange. Not the current version.
My speculation: If an MS Exchange mail server was used to gain entry, the hackers could have compromised the laptops of some employees who work on the SCADA control network. If the field techs have sim cards installed in the laptops, and they were working on the SCADA equipment, they would infect the SCADA equipment, compromise the air gap and connect via the sim card connection to the hackers control servers. At that point, the hackers could move from SCADA to SCADA once they get set up.
I'm just "Tom Clancy-ing" it here. I don't really know what happened.