The Cyberattack: Colonial Pipeline

Al-Attiyah Foundation Research Series

Al-Attiyah Foundation Research Series

The Cyberattack: Colonial Pipeline

Executive Summary


The Colonial Pipeline, the largest refined oil products system in the US, supplying 45% of east coast fuel, was shut down between 7-12th May by a cyberattack for ransom.

Operations are now being restored, but there has been a brief spike in gasoline prices, and petrol stations in many east coast states have run out of fuel.

While cyberattacks on the energy industry have become increasingly common, this recent attack on the Colonial Pipeline is the most high-profile incident in the US, to date.

These cyberattacks may be for criminal (profit), espionage, or sabotage (politically-motivated reasons), which can be related to various international disputes involving the US, Russia, Iran, and other countries.

The energy industry needs urgent steps and better security measures to limit its vulnerability to cyberattacks.

However, no security can defeat a sufficiently capable and well-resourced attacker. Therefore, the energy system should, in general, be made more resilient, in order to help protect against cyberattacks and other threats.

The Colonial Pipeline system 


The Colonial Pipeline is the key refined products pipeline in the eastern United States. It transports gasoline (petrol), diesel, and jet fuel from the major refining centers on the Gulf of Mexico coast, in Texas and Louisiana to markets along the east coast, including the states of Alabama, Georgia, Tennessee, South Carolina, North Carolina, Virginia, Maryland, and New Jersey.

Line

Size (inch)

Route

Fuel

Capacity, Mbbl/day

Line 1

40

Houston-Greensboro, North Carolina

Gasoline

1.5

Line 2

36

Houston-Greensboro, North Carolina

Diesel, heating oil, jet fuel

1.2

Line 3

 

Greenboro-Linden, New Jersey

All

0.885

Line 4

32

Greensboro-Baltimore

All

0.7

Spurs

 

Atlanta-south Georgia; Atlanta-Tennessee; Greensboro-Raleigh-Durham, North Carolina; Mitchell, central Virginia-Richmond, Norfolk, Roanoke

Various

 

Table 1 Colonial Pipeline main components[i]

The pipeline also connects to major onward lines in the north-eastern US, to New York and Pennsylvania


The pipeline also connects to major onward lines in the north-eastern US, to New York and Pennsylvania


The Colonial pipeline operates in batches to be able to ship different products, with a minimum size of 75 kbbl for Lines 1 and 2 and 25 kbbl for Lines 3 and 4. Batches are scheduled in 5-day cycles and vary seasonally and according to demand.
 
Colonial is a private company owned by six investors: Koch Industries (28.09%), South Korea National Pension Service and KKR via Keats Pipeline Investors (23.44%), Caisse de depot et placement de Quebec (16.55%), Shell Pipeline, a unit of the oil major (16.12%) and Industry Funds Management, an Australian investor (15.8%).
 
It is the largest refined products pipeline in the US, supplying about 45% of east coast demand. The pipeline is particularly important because of the Jones Act, which requires cargoes between US ports to be carried on American-built, crewed, and flagged ships. This makes cabotage (intra-national) shipping expensive and limits capacity.

Events of the attack


On Friday, May 7, the Colonial Pipeline found it had been hit by ransomware, which encrypts or locks systems until a ransom is paid. The company had to take some systems offline to avoid further damage, and this required it to halt operations. Although it appears its routine corporate IT system, not its operations system, was compromised, the company had to take the pre-emptive measure to avoid possible escalation of further attacks.

 

The attack was confirmed to be by DarkSide, a hacker-for-hire, which stole 100 gigabytes of Colonial’s data before locking its systems. The group, believed to be based in Russia or Eastern Europe, issued a statement apologizing for the disruption, saying it was apolitical and blaming its client. DarkSide’s ransoms are typically in the single-digit million dollars.

 

Colonial’s operations are quite complex because of its multiple lines, fuel types, and qualities, and the number of shippers, and the elaborate procedures for capacity nomination. This makes returning to service much more difficult than it would be for a simple crude oil pipeline.

 

The US government and state governors took various measures to ease the problem, including declaring a state of emergency, waiving fuel quality specifications, and lifting weight and driving hours restrictions for tanker trucks. The Department of Homeland Security was ready to consider requests for waivers of the Jones Act to permit maritime shipments from other US ports.

 

By May 11, Colonial had returned Line 4 to service under manual control, using existing inventories. On May 12, the company announced it would restart operations, but that it could take several days to return to normal.


Impact


Gasoline shortages began noticeable by May 10th, with Virginia and North Carolina the worst-hit initially (Figure 2). By late on 12th May, Georgia, North Carolina, South Carolina, and Virginia were greatly affected, with between half and two-thirds of stations out of gasoline. Several other states, such as Tennessee, began to see serious effects the same day.



The shortages were driven by three factors:


  • The lack of fuel-driven by the pipeline outage itself;
  • A lack of diesel, which prevented fuel trucks from making deliveries to stations;
  • Panic-buying by motorists who feared running out of fuel.

 

For instance, Florida, which is mainly supplied by barges from the Gulf Coast, also experienced some shortages, probably due to panic buying. The inland states, such as Tennessee, are likely to be worst-affected as the problem proceeds, as they do not have access to seaborne deliveries.

 

The lack of offtake capacity would also force Gulf Coast refiners to reduce runs if they exhaust their storage capacity. Even now that Colonial has announced the restart of its operations, it will take about 2 weeks for fuel from Houston to reach the east coast.

 

Petrol prices jumped 4% on Sunday 9th May and another 1.5% on Monday in response to the news. By 13th May, shortages had begun to multiply, and prices passed $3 per gallon for the first time in six years. Traders have begun booking deliveries from Europe by seaborne tanker.

 

The temporary spike in prices should be reversed as the pipeline comes back online. European prices may be dragged upwards slightly because of the diversion of tankers. The fuel demand from the affected area should drop below normal for a few days as users draw down their precautionary stocks. Overall, the incident should cause only a slight hit to demand because of reduced driving.


Implications


Cyberattacks cover a range of approaches and motivations. These include financial (ransomware, extortion), espionage (corporate or national), and sabotage (which could be by state, state-sponsored or non-state groups).

 

The oil and gas industry has been widely suspected to be lax on cybersecurity. Spending on security is low, operational systems are not always “air-gapped” (i.e. they can be connected to the internet, creating vulnerabilities), and in the US, they are regulated by several different agencies with only voluntary guidelines on cybersecurity. The energy industry in general, including electric grids, has also been a target.


Date

Target

Actions

Motive

2010

Stuxnet attack on Iran

Destroy uranium enrichment centrifuges

Damage Iran’s nuclear program; US-Israeli operation

2012

US gas pipelines

Cyber-intrusions

Unknown

April 2012

National Iranian Oil Company

Data affected

Political?

August 2012

Shamoon attack on Saudi Aramco

Wiping data

Iran-backed, political?

August 2012

RasGas, Qatar

Systems offline

Unknown

December 2014

Korea Hydro and Nuclear Power

Data theft and disclosure

Political, North Korea?

December 2016

Industroyer attack on Ukraine power grid

1-hour blackout

Political, Russia-backed?

January 2017

Tasnee, Saudi petrochemical company

Systems offline

Political?

August 2017

Triton attack on Sadara, Saudi petrochemical company

Attempt to trigger an explosion

Political?

April 2018

4 US gas pipeline companies

Disrupting customer service

Probing vulnerabilities, profit?

June 2019

Russian power grid

Unknown

Political, US retaliation

November 2019

Pemex, Mexico

Computer systems affected

Profit ($5 million ransom demanded)

December 2020

Solarwinds intrusion on US Department of Energy, other government bodies

Espionage

Russian espionage?

May 2021

Colonial Pipeline, US

Ransomware

Profit

Table 2 Notable cyber-attacks on energy companies and infrastructure


As large and wealthy companies operating critical infrastructure, energy companies are an obvious target for both profit-seeking and political-motivated cyberattacks. Attacks on control systems have to be more targeted and specialized than those on generic computer systems, but they have the potential to cause major physical damage.

 

Work-from-home practices during the pandemic have created additional vulnerabilities. Increasing levels of cloud data storage, remote work, automation, “smart homes”, drones and internet-connected devices are attractive to the energy industry because of reduced costs, greater safety, and enhanced data and capabilities. But they demand much-improved cybersecurity practices, that are not prone to human error and do not overload users. These include biometric and multi-factor authentication, download restrictions, and need-only access. Key data should be saved in at least three locations, one of which is air-gapped.

 

But intrusions and cyber-attacks will always be possible, particularly against smaller or less well-resourced companies, and by sophisticated government-backed hacking operations with political motives. Current points of geopolitical tensions, such as US-Russia, Russia-Ukraine, US/Israel/GCC-Iran, North-South Korea, and US-China, are obvious points for state-directed hacks and cyberattacks. The level of deniability and difficulty of attribution makes cyber warfare attractive for “grey zone” conflicts. State-directed hackers can claim to be acting for profit or for other political causes or to be from entirely different countries, in order to misdirect possible retaliations.

 

In the case of a major escalation or an outright military confrontation, it’s likely that cyber would be an immediate weapon. Highly networked societies, like the US and much of East Asia and Europe, are likely to be more vulnerable. Such cyber-attacks could aim to cause major disruption, even serious damage and casualties, by attacking critical power grids, fuel lines, or facilities (such as natural gas processing plants, refineries, petrochemical plants, and nuclear reactors), with explosive and toxic materials.


Conclusions


The long-term direct consequences of the Colonial Pipeline attack will not be very serious. Beyond some mild travel disruption, normal fuel supplies should be resumed within 1-2 weeks at most.
 
However, following various less-publicized cyberattacks, this incident should raise the urgency of improving the cyber-security of key energy infrastructure.
 
Vulnerabilities to cyberattacks will likely remain and should be expected to continue to rise, as energy systems become increasingly networked. A move to renewable energy may diminish some energy security risks, but it will greatly intensify reliance on the electric grid, for electric vehicles, industrial power, building heating and cooling, and water desalination, as well as the current major uses for appliances and lighting. 
 
This will require greater attention to all facets of energy security. The recent winter storms causing a major blackout in Texas, a non-cyber-related disaster, show that greater resilience is required across the whole energy system.
 
For instance, in the case of the US, the outdated Jones Act makes it much harder to move fuel by sea. Most of the US’s Strategic Petroleum Reserve (SPR) is held at the Gulf Coast, while much fuel demand is in the northeast which has only a very small reserve. The SPR is also mostly crude, not refined products, which makes it of little use if refineries are shut down by a hurricane or a cyberattack. The fuel shortages in the Colonial incident have been exacerbated (even caused, in states such as Florida) by panic buying, which could have been limited by rationing or other measures.
 
The growing prevalence of both criminal and state-backed cyberattacks will lead to greater attention, and spending, on energy companies’ cybersecurity. But it should also merit an overall review of critical infrastructure and greater resilience and back-up to avoid single points of failure and cascading collapses. These vulnerabilities should also encourage general attention to reducing conflicts where possible. In those senses, the Colonial Pipeline episode may turn out to have been a valuable warning - In other words, the episode could be some blessing in disguise by prompting the long-overdue wake-up call.


IndraStra Global is now available on
Apple NewsGoogle News, Flipboard, Feedburner, and Telegram

References

1. Energy Insights by McKinsey, Colonial Pipeline https://www.mckinseyenergyinsights.com/resources/refinery-reference-desk/colonial-pipeline/

 

2. Colonial Hacker Group Seeks to Shift Blame for Ransomware, https://www.colpipe.com/news/in-the-news/colonial-pipeline-101-know-colonial 


3.Colonial Pipeline System Restart – Update #8: Full System Restart  https://cpcyberresponse.com/colonial-pipeline-system-restart-update-8-full-system-restart/


DISCLAIMER: The views expressed in this insight piece are those of the author and do not necessarily reflect the official policy or position of IndraStra Global.
Name

-51,1,3D Technology,2,5G,9,Abkhazia,2,Abortion Laws,1,Academics,10,Accidents,21,Activism,1,Adani Group,5,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,112,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,2,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,81,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,70,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,7,Australia,57,Austria,1,Automation,13,Automotive,130,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,3,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,104,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1206,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,55,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,580,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,24,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,44,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,1,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,16,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,115,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,2,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,1,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,1,Digital Economy,10,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,3,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,3,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,109,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,53,Education,65,EFTA,1,Egypt,27,Election Disinformation,1,Elections,44,Electric Vehicle,15,Electricity,7,Electronics,8,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,14,European Union,234,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1374,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,59,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,1,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,33,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,7,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,9,Georgia,11,Georgian,1,geospatial,9,Geothermal,2,Germany,70,Ghana,3,Gibratar,1,Gig economy,1,Global Perception,1,Global Trade,96,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,GPS,1,Greater Asia,174,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,1,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,4,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,662,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,27,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,6,Indonesia,19,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,34,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,205,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,91,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,82,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,7,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,10,Military Service,2,Military-Industrial Complex,3,Mining,15,Missile Launching Facilities,6,Missile Systems,56,Mobile Apps,3,Mobile Communications,11,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,2,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,15,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1268,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,53,North Korea,58,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,4,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,382,Oil Gas,7,Oil Price,73,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,129,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,693,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,12,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,7,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,3,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,6,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,49,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,317,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,5,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,394,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,19,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,47,South Asia,472,South China Sea,36,South East Asia,76,South Korea,62,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,32,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,653,Think Tank,317,Tibet,3,TikTok,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,19,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,139,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,25,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,83,United Nations,28,United States,761,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,21,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,32,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: The Cyberattack: Colonial Pipeline
The Cyberattack: Colonial Pipeline
Al-Attiyah Foundation Research Series
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0U88DzJ7zMwJdQGAb_Ay0x1pnBd1U7yqBSEQpqLxzn-2qtzhw7BySJHQsLT_f_VVHKv-4mMP6uHfWDz8JJUzsVEpE-KVmNnxk6MR27TWNUABG6kKZojHRz1anhSJJqfEJ30aInc0zFzc/w640-h320/AIDN007012021+-+2021-05-15T203801.200.gif
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0U88DzJ7zMwJdQGAb_Ay0x1pnBd1U7yqBSEQpqLxzn-2qtzhw7BySJHQsLT_f_VVHKv-4mMP6uHfWDz8JJUzsVEpE-KVmNnxk6MR27TWNUABG6kKZojHRz1anhSJJqfEJ30aInc0zFzc/s72-w640-c-h320/AIDN007012021+-+2021-05-15T203801.200.gif
IndraStra Global
https://www.indrastra.com/2021/05/the-cyberattack-colonial-pipeline.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2021/05/the-cyberattack-colonial-pipeline.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content