Critical Infrastructure Security, Compliance Management, Ransomware
US proposes $1 million fine for Colonial Pipeline ransomware attack

Fuel holding tanks are seen at Colonial Pipeline's Dorsey Junction Station on May 13, 2021 in Woodbine, Md. A proposed $1 million fine blames Colonial Pipeline executives for failing to correct a number of known safety violations. (Photo by Drew Angerer/Getty Images)
The Department of Transportation is seeking to levy nearly $1 million in fines against Colonial Pipeline for a series of safety violations related to its operations at seven different locations dating back to 2017. Among the violations: an internal planning and communications plan that led to the company’s decision to temporarily shut down gas operations in the wake of the May 2021 DarkSide ransomware attack.The action, taken by the Pipeline and Hazardous Materials Safety Administration (PHMSA) and contained in a Notice of Probable Violation and Proposed Compliance order issued May 5, lays out a number of violations of U.S. safety regulations the agency discovered through inspections and site visits between January and November 2020.“The 2021 Colonial Pipeline incident reminds us all that meeting regulatory standards designed to mitigate risk to the public is an imperative,” said PHMSA Deputy Administrator Tristan Brown. “PHMSA holds companies accountable for violations and aims to prevent any instances of non-compliance.”It specifically blames the company for failing to correct a number of known safety violations, including one that it says left executives unprepared to keep pipeline operations running in the wake of a cyberattack. “Respondent’s failure to test and verify its internal communication plan contributed to consequences that occurred when, on May 7, 2021, Colonial Pipeline was the victim of a cyberattack which required the immediate shutdown of the entire pipeline system,” said the order, signed by Gregory A. Ochs, Central Region director for the Office of Pipeline Safety at PHMSA, in a May 5 letter to Colonial Pipeline CEO Joseph Blount.This failure, first highlighted by regulators more than year before the company’s IT network was shut down by ransomware criminals in May 2021, underscores some of the gaps in planning that executives faced in the fallout of a cyber attack that threatened their operations.The DarkSide ransomware attack on Colonial Pipeline never touched the company’s operational technology, Rather, the malware infected and shut down the company’s business IT network, and that in turn impacted the ability for employees to communicate and coordinate in the wake of the attack.The company had a plan in place for undergoing a controlled shut down of pipeline operations in the event of a loss of SCADA or voice communications control, but federal regulations regulations specifically require companies to have and test a plan for resuming operations manually in those conditions.Colonial didn’t do that. In fact, regulators say that “for all practical purposes,” shutting down operations in this contingency was Colonial’s plan for dealing with a loss of internal communications or SCADA control. Their last status update to regulators, provided on July 20, 2020, states that “due to the complexity of [Colonial’s] operations system and rarity of such events, [we] does not have a specific internal communication plan for manual operation and will not operate a line or system manually without prior implementation of an internal communication plan.”In a statement, a Colonial Pipeline spokesperson said the notice was "the first step in a multi-step regulatory process and we look forward to engaging with PHMSA to resolve these matters." They also defended the contingency planning in the wake of the ransomware attack, saying it was "necessary" and tailored to the the company's operating environment."As the 2021 cybersecurity incident demonstrated, Colonial’s approach to operating manually gives us the flexibility and structure necessary to ensure continued safe operations as we adapt to unplanned events," the statement reads. "Our incident command structure facilitates a deliberate approach when responding to events. Our coordination with government stakeholders was timely, efficient and effective as evidenced by our ability to quickly restart the pipeline in a safe manner five days after we were attacked – which followed localized manual operations conducted before the official restart."
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds