+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

A hacker group linked to the pipeline attack that knocked out much of the East Coat's fuel supply claims to have a code of conduct forbidding attacks on some targets

May 10, 2021, 17:08 IST
Business Insider
Trucks line up at a Colonial Pipeline facility.Jay Reeves/AP
  • DarkSide, the group linked to the US Colonial Pipeline cyberattack, has a code of conduct.
  • The attack knocked out a major route for gasoline, diesel, and jet fuel to the US East Coast.
  • DarkSide presents an almost-corporate persona, and says there are some targets it won't attack.
Advertisement

The group linked to the devastating cyberattack a pipeline that supplies much of the East Coat's fuel claims to have a an ethical code governing which targets it chooses.

The Colonial Pipeline, which transports 45% of the East Coast's supply of diesel, gasoline and jet fuel, shut down because of the attack, the company said on Saturday.

The BBC cited "multiple sources" pointing to DarkSide as the perpetrators of the attack. Reuters cited a former US official and two industry sources who said DarkSide was one of a list of possible suspects.

Cybersecurity news site Bleeping Computer reported in August 2020 on the arrival of the group, which presented itself in some ways more like a legitimate company than a criminal enterprise.

Citing a press release on the dark web, which Insider was unable to find independently, Bleeping Computer said the group described a kind of ethics code.

Advertisement

DarkSide said it wouldn't target schools, universities, hospitals, hospices, non-profit bodies and the government "based on its principles," Bleeping Computer reported.

Instead, it said it would target companies that could afford to pay its ransoms, which could be millions of dollars.

Reuters noted that the group appears professionalized, with press releases and a mailing list. Lior Div, the chief executive of Boston-based security firm Cybereason, told Reuters: "They're very new but they're very organized.

"It looks like someone who's been there, done that."

You are subscribed to notifications!
Looks like you've blocked notifications!
Next Article