Folks,
The Colonial Pipeline Hack may be one of the most high visible impact breaches the world has witnessed yet because it resulted in the shut down of one of America's largest gasoline pipelines for an entire week due to ransomware.
Today, from the U.S. Government to the Fortune 1000, including almost all cyber security and cloud computing companies, at the very foundation of IT, cyber security and privileged access at 85% of organizations worldwide lies Active Directory.
Overview
The Colonial Pipeline Hack is the largest cyberattack yet on an oil infrastructure target in the history of the United States.
In short, perpetrators gained entry in the networks of Colonial Pipeline through a virtual private network account (which allowed employees to remotely access the company's computer network) and they subsequently and ultimately deployed ransomware across the company's entire computer network, resulting in Colonial Pipeline having to shut down its pipeline for an entire week (, causing gas shortages nationwide,) and having to pay millions of dollars in ransom (via Bitcoin.)
The Salient Step
The most important, enabling and salient (cardinal) step in the entire Colonial Pipeline hack was the following one -
The perpetrators first gained privileged access in Active Directory and then leveraged the ability to deploy group policies to domain-joined computers via Active Directory to automatically deploy their ransomware across Colonial Pipeline's network!In fact, they seem to have used the exact technique I had warned about and described in sufficient technical detail last year - How Attackers Could Unleash Ransomware on Thousands of Computers in an Organization using Active Directory
Evidence
Both FireEye and Arete seemed to have researched the Colonial Pipeline Hack and published detailed blog posts.
The evidence lies in this snippet from Arete's post Darkside Ransomware: Caviar Taste on your Big-Game Budget -
"We observed Darkside payload (e.g. azure_agent.exe.exe) staged on the domain controller in a network shareable folder (e.g. C:\Windows\IME\azure), followed by the establishment of a scheduled task (e.g. \Windows\SYSVOL\domain\Policies\{L0NGMGU1D}\User\Preferences\ScheduledTasks) set with Group Policy and instructing hosts to obtain and execute the payload. This resulted in a fully automated enterprise-wide deployment in less than 24 hours after data was exfiltrated."
There you have it! Its clear that the perpetrators first* gained privileged access in Colonial Pipeline's Active Directory and once they had done so, they used that gained privileged access to leverage Active Directory integrated group policy to automate the effortless deployment of ransomware domain-wide (, eerily similar to as described here over a year ago.)
*It should be clear to most that in order to perform the above, one requires privileged access in Active Directory.
Active Directory - The Heart of Privileged Access Worldwide
Today, from the entire United States Government to the global Fortune 1000, Active Directory is the very foundation of IT, bedrock of cyber security and heart of privileged access, at 85% of all government at business organizations worldwide.
Here's why -- The entirety of an organization's user accounts and their credentials reside in Active Directory
- The entirety of an organization's computers are joined to and have a secure channel with Active Directory
- The entirety of an organization's IT assets (files, folders etc.) are protected by Active Directory security groups
- The entirety of an organization's end-point management and security policies are deployed from Active Directory
- The credentials of the entirety of an organization's Active Directory accounts are synced with Azure AD in the Cloud
Further, to facilitate the management and protection of these organizational user and computer accounts, security groups and policies, OUs and containers, an ocean of privileged access is delegated and provisioned inside Active Directory.
Finally, the most powerful administrative (privileged) accounts and groups, i.e. all Domain Admin equivalent accounts and groups, that possess unrestricted organization-wide access, are all stored, managed and protected in Active Directory.
In other words, worldwide, not just the Keys to the Kingdom, the keys to every door in the kingdom lie in Active Directory.
(As such, in Windows based networks, Active Directory is the account/credential database used by Kerberos, the native authentication protocol in Windows, and every domain controller is a Kerberos Key Distribution Center (KDC). Based on this fact alone, Active Directory is also the foundation of cyber security in a Windows Server based IT infrastructure.)
Thus, factually speaking, an organization's Active Directory is the single most valuable IT and corporate asset, worthy of the highest protection, because it is the heart of privileged access and the foundation of an organization's cyber security.
"The backdoor also determines if the system is joined to an Active Directory (AD) domain, and if so, retrieves the domain name. Execution ceases if the system is not joined to an AD domain."
- Bloomberg - Hackers Breached Colonial Pipeline Using Compromised Password
- CNN - Cyberattack forces major US fuel pipeline to shut down
- Wall Street Journal - U.S. Pipeline Cyberattack Forces Closure
- New York Times - Cyberattack Forces a Shutdown of a Top U.S. Pipeline
- Forbes - The Colonial Pipeline Attack Is A Major National Security Incident
- FBI - FBI Statement on Compromise of Colonial Pipeline Networks
- CrowdStrike - DarkSide Pipeline Attack Shakes Up the Ransomware-as-a-Service Landscape
- FireEye - Shining a Light on DARKSIDE Ransomware Operations
- KrebsOnSecurity - A Closer Look at the DarkSide Ransomware Gang
- ZDNET - Colonial Pipeline attack - Everything you need to know
- Use Mimikatz DCSync to replicate secrets (i.e. password hashes) from an Active Directory domain
- Reset the password of any existing Active Directory Privileged User account e.g. the Administrator account
- Change the membership of any existing Active Directory Privileged Group e.g. the Domain Admins group
- Modify the ACL (access control list) protecting the special AdminSDHolder object in Active Directory
- If Smartcards are in use, disable use of Smartcards on an AD Privileged User's account, then reset its password
Note: The risk posed by the use of these advanced techniques is adequately described in The Paramount Brief.
Note: This is not about pride or competition. We do not do what the other thousand cyber security companies do, and they do not and cannot do what we do. This is about collaboration and helping make the world a safer place.