• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Colonial Pipeline Hit By Massive Ransomware Attack

You are here: Home / Security News / Colonial Pipeline Hit By Massive Ransomware Attack

Each day, the impact of ransomware attacks grows exponentially. Recently a major cyber-attack has occurred on the Colonial Pipeline in the United States. Colonial Pipeline operates the largest fuel conduit system in the United States, sending gasoline and jet fuel from the Gulf Coast of Texas to the east coast through a pipeline network serving 50 million consumers. The ransomware incident was associated with the hacker group DarkSide.

Who Are DarkSide?

DarkSide are a known cybercrime group that have been classified as sophisticated threat actors. Based on reports from the White House, there has been no evidence of Russia’s involvement with the group or the attack, even though the ransomware was traced back to Russia. The attack has ingrained the idea that the US has to work harder on its national defence, specifically in cyberspace, when it comes to national assets and critical infrastructure. The Biden administration has responded to this gap by initiating certain investments that will be used to accelerate the energy and power industries towards the best security upgrades, along with future investments in the infrastructure of these industries.

The BBC has noted that the objective behind DarkSide’s attack was not political, as they lean towards monetizing from using ransomware attacks. DarSiide themselves have stated, “We do not participate in geopolitics”.

Similarities to Telstra Hack

Interestingly enough the attack on the Colonial Pipeline follows the same formula that was recently used in the hack of Telstra in Australia, in which the threat actors stole tens of thousands of business SIM cards.

Ransomware can be very tricky to get rid of – if a system is compromised, the actors lock or encrypt the system, and will not decrypt it unless a ransom is paid. In some cases, the company will pay that ransom in order to avoid a data leak.

To understand more about how ransomware occurs, and how to protect against it, contact us at Agilient.

Author: Saeed Baayoun

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane