Scroll to the top

Hackers shut down US pipeline

Hackers shut down US pipeline
Hackers Shut Down US Pipeline | Quick Take | GZERO Media

Ian Bremmer's Quick Take:

Hi, everybody. Ian Bremmer here. Happy Monday to you. A Quick Take. I wanted to talk about this unprecedented hack that has shut down a major pipeline in the United States. The Colonial Pipeline carries well over 2 million barrels a day. It's about half of the East Coast supply of gas and jet fuel. In other words, really not something you want to have suspended. And when I think about the impact of cyberattacks in the world, I mean, we've been warning that this is going to be a bigger challenge going forward, we're now really starting to see the implications of it.


In this case, it's a dual attack. It was an attack both against data in the firm that has been stolen that the organization, the criminal syndicate that has perpetrated the attack has said that they will make it public and delete all of the data from the system of the pipeline company if the ransom is not paid by the deadline that they have provided. And then of course, they also physically shut down the pipeline as well. It's an enormous problem. It's probably unprecedented in the scale of impact in the United States, though, we're seeing more of this kind of thing around the world.

So, let's take a step back. What does it mean? How much should we be worried and what can we do when we think about cyber? Well, when I think about the world of cyber over the course of the past 10 years, there are some aspects of it, the great power competition that has worried me less, because even though it's all about offense, the United States, the Chinese, the Russians by far the most capable in terms of offensive cyber capabilities than in other countries, like Israel and Iran with less but significant capabilities. But those governments, large governments do understand that if they are to engage in the kind of escalatory attacks, that could cause real damage to the country that they're going after, then the gloves come off and suddenly this can turn into a real national security danger. It could create a kinetic war that spirals out of control. And so, they don't do it. And so there has been a level of cyber deterrence between major countries all around the world.

You've seen these unprecedented attacks in the last months, for example, the SolarWinds attack that we believe came from Russia and other massive attacks coming from China. But in each of these cases, no critical infrastructure was destroyed or even damaged to the best of our knowledge. No, instead it was espionage. It was surveillance. It was monitoring. By the way, the Americans do the same thing to all of those countries, whether they have offensive cyber capabilities themselves or not. So that's a bit like the nuclear balance. It's all offense. It's not defense, but there are constraints on what countries do, because if you set off one nuke, other nuclear countries are quite likely to retaliate in kind. So it does create a level of stability, even though it is a more dangerous destructive environment in the world. You'd rather not have them than have them. Okay, that's the good side.

The bad side is that you sometimes have governments that engage in acts on cyber that go bigger and larger than had initially been presumed. So for example, when the Russians engaged in the NotPetya attack against Ukraine, which was a piece of malware that was reverse engineered out of the US, out of the National Security Agency developed in the US a few years before, it did hit Ukraine, it absolutely caused major economic damage and political stability damage to the country, but it also escaped. And so in relatively short order, you had Western corporations with operations primarily all over the world, very little in Ukraine. In some cases, just a couple of computers in Ukraine causing billions of dollars of damage because the malware spread. And the Russian government, I find it highly unlikely that they intended for that attack to spread. And the question was, did they either not know or not care? I suspect it's more the former than the latter, because if it got really big, this could have caused an enormous blow back for Russia. But that means that intrinsically when you're engaging in cyberattacks with new forms of weapons that have the ability to spread autonomously, there's greater danger around the nature of attack. That's one point.

Secondly, it's a lot harder to contain cyber offensive capabilities to a small number of countries. Obvious example, I mentioned among countries that have strong cyber capabilities, Iran. Now, we're working in the United States, the Biden Administration is working very hard right now to try to get the United States back into the JCPOA, the Iranian nuclear deal the Trump Administration unilaterally withdrew from. And if that happens, we will continue to successfully prevent the Iranian government from developing nuclear weapons capability with verifiable inspections on the ground. That's important, it's significant, but there has been no ability to limit the nature and development of Iran's offensive cyber capabilities, which they use against Israel, against Saudi Arabia, against the United States. And there's very little capacity to deter a government that is much more unstable itself, that has willingness. And it's the reason we don't want Iran to have nukes is because we think that that potentially could lead to much more conflict in the region. That's unacceptably dangerous to let's say Israel or to the Saudis, other American allies on the ground, but they have those cyber capabilities. And that's clearly a danger. I mean the Operation Shamoon, which the Iranians did, which looks like it was a reverse engineer of the Stuxnet attack that the Americans, the Israelis engaged in against Iranian centrifuges, basically was within a couple of hours of taking all of Saudi Aramco's energy production offline, and that could have precipitated a war.

So you're much closer to trip wires to red lines, even among governments, because of that when you talk about cyber. And then you have what we just saw, what we're experiencing now with the shutdown of the colonial pipeline, and this is a criminal syndicate. Non-state actors, whether they be gangs or the aforementioned 300-pound guy on a bed in New Jersey, or whether it's a terrorist organization, the ability of institutions and people that are much less easily determinable either because of the ideology or because you don't know who they are engaging in strikes that are really dangerous, that is becoming unprecedented in today's environment. And that's what we just saw. The cybercriminal gang called DarkSide is ostensively behind the attack on the Colonial Pipeline.

And this is a cybercriminal gang, right? It is a group of individuals. It is not known who they are. They have anonymity, they're quite sophisticated. And they engage in these strikes against multinational corporations, some small, some big, to enrich themselves essentially. And this organization, DarkSide, has said that they won't attack hospitals, for example. That's their form of ethics. Other such organizations have no such compunction. You've seen a number of hospitals shut down. For example, one of the things I was worried about is what would have happened if there had been a massive cyberattack by a criminal gang against American hospitals at the time when they were getting overwhelmed by the pandemic. This is an absolute, real danger and something that the technology exists to do. And the people that could engage in those attacks have that technology in their hands, right now. And so the only thing stopping them is the sense of ethics that these criminals actually have. That's a serious problem.

Now in the case of DarkSide, and a lot of these criminals are operating in areas where Western rule of law cannot reach them, the presumption with DarkSide is they are in the former Soviet space. And the reason I presume that is because those that are studying DarkSide's attack so far have seen no attacks against Russian and former Soviet countries. Companies that obviously would be just as exposed, in many cases more so than those outside of the former Soviet union. No attacks against Russia, Ukraine, against Kazakhstan, countries like that. So you would expect that the people that are engaged in DarkSide are either from one or many of the former Soviet states. A lot harder to hit them directly when rule of law doesn't reach that far and when the governments themselves are showing absolutely no interest.

In fact, in the case of Russia, many of the cyberattacks the Russian government engages in are essentially outsourced to these criminal gangs that make money both in terms of the national security efforts that they make at behest of the Russian government, but also then sideline, moonlight, have their side gig engaging in criminal activities, outside the former Soviet space.

The likelihood that this significantly worsens US and Western relations with Russia leads to more sanctions. If so, because the Russian government and others are refusing to take action. That's also a real problem. And one that isn't likely to get resolved anytime soon. So serious challenges as a consequence of this. It showed up very high on our top risks for 2021. This is part of the reason for it. And I suspect we're going to spend a lot more time on it going forward.

So, not the cheeriest topic for a Monday kicking off your week, but hopefully something we get resolved at least in this attacks case, in relatively short order. Be safe, everybody. Avoid fewer people and I'll talk to you soon.

GZEROMEDIA

Subscribe to GZERO's daily newsletter