The company admitted in an August 13 letter that on May 6, the ransomware group “acquired certain records” stored in their systems.
“The affected records contained certain personal information, such as name, contact information, date of birth, government-issued ID (such as Social Security, military ID, tax ID and driver’s license numbers) and health-related information (including health insurance information). Not all of this information was affected for each impacted individual,” the letter said.
Bloomberg reported in May that before locking down the pipeline’s business systems, the group stole almost 100 GBs of data.
Colonial Pipeline said it was offering victims of the hack two free years of “identity restoration” and credit monitoring services from Experian. They urged those affected to check their credit reports for any unauthorized activity.
The attack on Colonial Pipeline, which left significant parts of the East Coast without gas for several days, kicked off a swift change in the government’s response to ransomware incidents. Since the attack, multiplenew regulations have been released for critical industries in general as well as the oil and gas industry specifically.
The Record spoke with the operators behind BlackMatter, who specifically cited the Colonial Pipeline attack as “a key factor for the closure of REvil and DarkSide,” adding that the group has now “forbidden that type of targeting and we see no sense in attacking them.”
- Kaseya ransomware attack: What you need to know
- Surfshark VPN review: It’s cheap, but is it good?
- The best browsers for privacy
- Cyber security 101: Protect your privacy
- The best antivirus software and apps
- The best VPNs for business and home use
- The best security keys for 2FA
- How victims who pay the ransom encourage more attacks (ZDNet YouTube)