{"id":312,"date":"2021-05-12T00:20:00","date_gmt":"2021-05-12T00:20:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=312"},"modified":"2024-08-02T15:17:40","modified_gmt":"2024-08-02T22:17:40","slug":"all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/","title":{"rendered":"Colonial Pipeline Highlights Weaknesses in Global Supply Chain"},"content":{"rendered":"\n<p>The&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/business\/2021\/05\/08\/cyber-attack-colonial-pipeline\/\">shutdown of Colonial Pipeline, a major fuel pipeline<\/a>&nbsp;in the United States, by ransomware is yet another cyberattack that highlights an important weakness in our global supply chain. Look at&nbsp;<a href=\"\/blog\/creating-cyber-reconnaissance\/\">Solarwinds<\/a>,&nbsp;<a href=\"\/blog\/what-the-microsoft-exchange-zero-days-tell-us-about-the-attack-surface\/\">Microsoft Exchange<\/a>, and&nbsp;<a href=\"\/blog\/accellion-supply-chain-attack\/\">Accellion<\/a>&nbsp;as other recent examples.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DarkSide Responsible for the Colonial Pipeline Cyberattack<\/h2>\n\n\n\n<p>On May 8, 2021, the initial investigation indicated that the ransomware gang, DarkSide, was responsible for the Colonial Pipeline cyberattack. The group has been operating their ransomware \u2013 called \u201cDarkSide ransomware\u201d and delivered as-a-service \u2013 against\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2021\/05\/a-closer-look-at-the-darkside-ransomware-gang\/\">US and European companies<\/a>\u00a0for at least half a year. Attackers using DarkSide\u2019s ransomware variant generally gain initial access by exploiting remote services like Citrix, Remote Desktop Web (RDWeb), or remote desktop protocol (RDP) from an external attack surface. Once they gain a foothold, they dig in deeper via lateral movement, exfiltrating data, and then encrypt everything with ransomware to extort money from their victims.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CyCognito Research Findings<\/h2>\n\n\n\n<p>Our research at CyCognito finds that about 1 in 65,000 assets in a typical Fortune 500 company will contain an unprotected remote desktop service. That may seem like good odds, but at-scale this means most major corporations are hosting between two to twenty or more easily exploited systems, right now!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"510\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-1280x510.png\" alt=\"\" class=\"wp-image-315\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-1280x510.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-512x204.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-768x306.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-1536x612.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1.png 1600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Figure 1: In this example, a Learning Management System with weak credentials was exposed to attackers. Further inspection revealed evidence of ransomware activity, specifically files used to prepare for the attack, including a ransom note. The organization was able to quickly address the issue because the CyCognito platform found and tested the asset and prioritized the issue as critical.\u00a0<br>For context, this company has ~110,000 assets.<\/p>\n\n\n\n<p>While any one of those easily exploitable servers may not on its own be business-critical, if it becomes a \u201cbackdoor\u201d for a ransomware attack, the consequences can be dire. Of course, the context for the availability of this issue is the need for&nbsp;<a href=\"\/blog\/attackers-are-paying-attention-as-remote-working-becomes-the-new-norm\/\">remote access during this global pandemic<\/a>. IT is managing assets remotely and of course they are doing it well, but what if a VP of Marketing in Morocco operating at a subsidiary of a French company decides that they need an RDP service to access systems inside the firewall? You might end up in a situation where&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/more-than-245000-windows-systems-still-remain-vulnerable-to-bluekeep-rdp-bug\/\">Bluekeep<\/a>&nbsp;can be used to hack an unpatched or misconfigured system \u201cmanaged\u201d by Shadow IT.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1154\" height=\"1230\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure2a.png\" alt=\"\" class=\"wp-image-314\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure2a.png 1154w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure2a-480x512.png 480w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure2a-768x819.png 768w\" sizes=\"auto, (max-width: 1154px) 100vw, 1154px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"552\" height=\"666\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure2b.png\" alt=\"\" class=\"wp-image-313\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure2b.png 552w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure2b-424x512.png 424w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/figure>\n\n\n\n<p>Figures 2 and 3: These are screenshots from the CyCognito platform for an asset with an exposed RDP service susceptible to BlueKeep. The platform automatically discovers assets like this and tests them for security, discoverability, issues, and attractiveness to attackers.<\/p>\n\n\n\n<p>And there is an entire attacker economy that makes locating paths of least resistance such as those just a matter of time. To find these systems, attackers use reconnaissance to find attractive targets into a network. Then they can simply purchase access credentials from the dark web or rent botnets to interrogate systems with brute force attacks. And after extracting data, they can then purchase ransomware-as-a-service from the likes of DarkSide to get money directly from their victims. The whole business of ransomware is a lucrative one, and it&#8217;s easy to see that an&nbsp;<a href=\"https:\/\/www.businessinsider.com\/hackers-see-1425-return-on-investment-for-two-types-of-malware-2015-6\">ROI in excess of 1,400%<\/a>&nbsp;will draw in other criminals looking for targets who supply critical infrastructure and services. The ONLY protection is a&nbsp;<a href=\"\/platform\/\">proactive defense<\/a>&nbsp;with continuous, complete&nbsp;<a href=\"\/learn\/attack-surface-management.php\">attack surface protection<\/a>, and it must be made clear that ANY asset that is exposed is a potential target and entry point for a much wider, more devastating, and expensive breach.<\/p>\n\n\n\n<div class=\"card\"><p>\u201cMonday, May 10, 12:25 p.m.<\/p>\n\n\n\n<p>Colonial Pipeline continues to dedicate vast resources to restoring pipeline operations quickly and safely. Segments of our pipeline are being brought back online in a stepwise fashion, in compliance with relevant federal regulations and in close consultation with the Department of Energy, which is leading and coordinating the Federal Government\u2019s response.<\/p>\n\n\n\n<p>Restoring our network to normal operations is a process that requires the diligent remediation of our systems, and this takes time. In response to the cybersecurity attack on our system, we proactively took certain systems offline to contain the threat, which temporarily halted all pipeline operations, and affected some of our IT systems. To restore service, we must work to ensure that each of these systems can be brought back online safely.\u201d<\/p><\/div>\n\n\n\n<p>Figure 4: Part of Colonial Pipeline\u2019s\u00a0<a href=\"https:\/\/www.colpipe.com\/news\/press-releases\/media-statement-colonial-pipeline-system-disruption\">Press Release<\/a>\u00a0About the Disruption<\/p>\n\n\n\n<p>All major organizations such as Colonial Pipeline are increasingly under threat of ransomware. As a result, the&nbsp;<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/04\/20\/statement-by-nsc-spokesperson-emily-horne-on-the-biden-administrations-efforts-to-protect-u-s-critical-infrastructure\/\">US Federal government is taking steps to shore up defenses<\/a>&nbsp;for critical infrastructure. As organizations focus on digital transformation they find themselves open to these attacks because of pathways in their IT ecosystem of which they are typically unaware. This includes not only their own IT assets, such as servers, applications and infrastructure, but IT assets that belong to, or are managed by their third party vendors, partners or subsidiaries, which are highly interconnected with the company. These shadow assets and attack vectors create shadow risk, which arises when organizations have not fully mapped their attack surface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The only real defense is to think like an attacker<\/h2>\n\n\n\n<p>When attackers find these exposed and unsecured assets, they leverage them to execute ransomware attacks. Ransomware provides an easy income for cybercriminals targeting successful corporations, who typically are completely taken by surprise when they learn just how many\u00a0unsecured IT assets their ecosystem partners and subsidiaries\u00a0have, and what an easy target for exfiltration and ransomware those assets present.<\/p>\n\n\n\n<p>The only real defense is to think like an attacker. To get ahead of groups like DarkSide it is essential to find the weakest links and fix them before the cybercriminals can take advantage. This is why the&nbsp;<a href=\"\/platform\/\">CyCognito platform<\/a>&nbsp;uses an attacker\u2019s methods like reconnaissance and botnets to discover your entire attack surface and security-test all of the assets in it so that you know where attackers are most likely to breach your organization. With that, you can shore up defenses and eliminate the paths of least resistance that attackers target first.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>All organizations such as Colonial Pipeline are under threat of ransomware. These attack vectors arise because they lack attack surface visibility.<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[104,96],"class_list":["post-312","post","type-post","status-publish","format-standard","hentry","category-research","tag-colonial-pipeline","tag-digital-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Colonial Pipeline Highlights Weaknesses in Global Supply Chain | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Colonial Pipeline Highlights Weaknesses in Global Supply Chain | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"All organizations such as Colonial Pipeline are under threat of ransomware. These attack vectors arise because they lack attack surface visibility.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-12T00:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T22:17:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-1280x510.png\" \/>\n<meta name=\"author\" content=\"Jim Wachhaus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Wachhaus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/\"},\"author\":{\"name\":\"Jim Wachhaus\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\"},\"headline\":\"Colonial Pipeline Highlights Weaknesses in Global Supply Chain\",\"datePublished\":\"2021-05-12T00:20:00+00:00\",\"dateModified\":\"2024-08-02T22:17:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/\"},\"wordCount\":1008,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-1280x510.png\",\"keywords\":[\"Colonial Pipeline\",\"Digital Risk Management\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/\",\"name\":\"Colonial Pipeline Highlights Weaknesses in Global Supply Chain | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-1280x510.png\",\"datePublished\":\"2021-05-12T00:20:00+00:00\",\"dateModified\":\"2024-08-02T22:17:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1.png\",\"width\":1600,\"height\":638},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Colonial Pipeline Highlights Weaknesses in Global Supply Chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\",\"name\":\"Jim Wachhaus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"caption\":\"Jim Wachhaus\"},\"description\":\"Was Director of Technical Product Marketing at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Colonial Pipeline Highlights Weaknesses in Global Supply Chain | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Colonial Pipeline Highlights Weaknesses in Global Supply Chain | CyCognito Blog","og_description":"All organizations such as Colonial Pipeline are under threat of ransomware. These attack vectors arise because they lack attack surface visibility.","og_url":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/","og_site_name":"CyCognito Blog","article_published_time":"2021-05-12T00:20:00+00:00","article_modified_time":"2024-08-02T22:17:40+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-1280x510.png","type":"","width":"","height":""}],"author":"Jim Wachhaus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Wachhaus","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/"},"author":{"name":"Jim Wachhaus","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0"},"headline":"Colonial Pipeline Highlights Weaknesses in Global Supply Chain","datePublished":"2021-05-12T00:20:00+00:00","dateModified":"2024-08-02T22:17:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/"},"wordCount":1008,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-1280x510.png","keywords":["Colonial Pipeline","Digital Risk Management"],"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/","url":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/","name":"Colonial Pipeline Highlights Weaknesses in Global Supply Chain | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1-1280x510.png","datePublished":"2021-05-12T00:20:00+00:00","dateModified":"2024-08-02T22:17:40+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/coloncial-pipeline-hack-figure1.png","width":1600,"height":638},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/all-organizations-such-as-colonial-pipeline-are-under-threat-of-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Colonial Pipeline Highlights Weaknesses in Global Supply Chain"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0","name":"Jim Wachhaus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","caption":"Jim Wachhaus"},"description":"Was Director of Technical Product Marketing at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=312"}],"version-history":[{"count":9,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/312\/revisions"}],"predecessor-version":[{"id":1060,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/312\/revisions\/1060"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}