Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Lawmakers Reintroduce ‘Pipeline Security Act’ Following Colonial Hack

More than a dozen U.S. lawmakers led by Rep. Emanuel Cleaver (D-MO) have reintroduced the Pipeline Security Act, whose goal is to aid the DHS’s efforts to protect pipeline infrastructure against cyberattacks, terrorist attacks and other threats.

More than a dozen U.S. lawmakers led by Rep. Emanuel Cleaver (D-MO) have reintroduced the Pipeline Security Act, whose goal is to aid the DHS’s efforts to protect pipeline infrastructure against cyberattacks, terrorist attacks and other threats.

The Pipeline Security Act was first introduced in 2019, but it did not receive a vote. Now, following the recent ransomware attack on Colonial Pipeline, which had a significant impact, the bill was reintroduced.

The bipartisan pipeline security legislation would ensure that the roles of the Transportation Security Administration (TSA), which has been the primary agency responsible for securing pipelines, and the Cybersecurity and Infrastructure Security Agency (CISA) are clarified and they are fully empowered for securing pipelines and pipeline facilities.

The bill also directs the TSA to update security guidance, conduct risk assessments and inspect pipelines, and requires the agency to create a pipeline security personnel strategy. It also enhances pipeline security oversight by requiring the TSA to submit annual reports to Congress and consult with pipeline stakeholders on security-related matters.

A markup session on the Pipeline Security Act was held by the House Committee on Homeland Security on Tuesday.

“The recent ransomware attack against Colonial Pipeline Company further highlights the threats facing our nation’s critical infrastructure and the potential cascading impacts cyber attacks can have on our economy. With the attacks of this nature on the rise, it’s more important than ever to strengthen our cyber resilience,” said John Katko (R-NY), ranking member in the Committee on Homeland Security and one of the co-sponsors of the bill.

“Right now, we need to focus on building existing capabilities and resources while ensuring federal roles and responsibilities are clear. DHS and DOT are co-Sector Risk Management Agencies (SRMAs) for transportation systems, including pipelines, and should continue to run point, with TSA, CISA, and the U.S. Coast Guard continuing to play important roles. I’ll continue working in a bipartisan manner to make sure our country is better prepared to mitigate future attacks on our critical infrastructure,” Katko added.

Colonial Pipeline, the largest refined products pipeline in the United States, was forced to shut down operations as a result of the ransomware attack. The incident had significant implications, including temporary gas shortages, gas prices rising, and states declaring a state of emergency.

Advertisement. Scroll to continue reading.

The attack leveraged a piece of ransomware named DarkSide, which has been linked to Russian cybercriminals. The attackers encrypted files on compromised systems and also stole data that they threatened to leak unless a ransom was paid.

According to some reports, Colonial paid a $5 million ransom to the hackers. The company is said to have recovered encrypted files from backups — the decryption tool provided by the cybercriminals was too slow — but paid the ransom to retrieve the stolen information.

Related: Tech Audit of Colonial Pipeline Found ‘Glaring’ Problems

Related: Industry Reactions to Ransomware Attack on Colonial Pipeline

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.