The Colonial Pipeline Attack: A $4.4 Million Wake-Up Call for Every Business
On 7 May 2021, a single compromised VPN password shut down the pipeline supplying 45% of the US East Coast's fuel. The $4.4 million ransom, the absence of multi-factor authentication, and President Biden's Executive Order 14028 made this the defining cybersecurity event of the year.

Giovanni van Dam
IT & Business Development Consultant
45% of the East Coast's Fuel Supply — Offline
On 7 May 2021, Colonial Pipeline — the largest refined oil pipeline system in the United States, supplying 45% of the East Coast's fuel — shut down its operations after discovering ransomware in its IT systems. Within hours, panic buying emptied petrol stations across the southeastern US. Fuel prices spiked to their highest levels since 2014. Airlines rerouted flights to avoid refuelling at affected airports. A critical piece of American infrastructure was paralysed — not by a sophisticated nation-state attack, but by a compromised VPN password.
The attack was attributed to DarkSide, a ransomware-as-a-service group believed to operate from Eastern Europe. Colonial Pipeline paid $4.4 million in Bitcoin ransom within hours of the attack — a decision that CEO Joseph Blount later defended by saying the company "didn't know the extent of the intrusion" and needed to restore operations as quickly as possible. The FBI would later recover approximately $2.3 million of the ransom, but the reputational and operational damage was done.
The Shocking Simplicity of the Attack Vector
Perhaps the most alarming aspect of the Colonial Pipeline attack was how it was executed. Investigators determined that the attackers gained access through a legacy VPN account that did not have multi-factor authentication (MFA) enabled. The compromised password was likely obtained from a previous data breach and reused on Colonial's VPN. There was no sophisticated zero-day exploit, no advanced persistent threat campaign. A single password, without MFA, brought down infrastructure serving 50 million Americans.
This simplicity should terrify every business leader. If a company responsible for nearly half of the East Coast's fuel supply could be compromised by a reused password on an unprotected VPN, what does that say about the security posture of the average mid-market business? The answer, based on my experience working with organisations across multiple industries, is that many businesses remain dangerously exposed to identical attack vectors.
MFA is not expensive. It is not technically complex. It has been a recommended security control for over a decade. And yet, in May 2021, its absence on a single access point was sufficient to trigger a national infrastructure crisis. The gap between known best practices and actual implementation remains the most significant vulnerability in most organisations.
The Ransomware Economy: A Business Model Analysis
The Colonial Pipeline attack also illuminated the maturation of ransomware as a business model. DarkSide operated a ransomware-as-a-service (RaaS) platform, where the group developed the malware and affiliated hackers executed attacks in exchange for a percentage of the ransom. DarkSide even had a "code of conduct" — claiming to avoid targeting hospitals, schools, and non-profits — and operated a help desk for victims navigating the payment process.
This professionalisation of cybercrime demanded a correspondingly professional response from businesses. Ransomware was no longer the province of lone hackers or script kiddies. It was a multi-billion-dollar industry with specialised roles, customer service infrastructure, and revenue-sharing models. The FBI estimated that ransomware payments exceeded $350 million in 2020, and 2021 was tracking significantly higher.
For business leaders, understanding the economics of ransomware was now as important as understanding the technology. Attackers conducted cost-benefit analyses, selecting targets based on their ability to pay and the disruption cost of downtime. Colonial Pipeline, with its critical infrastructure role and limited redundancy, was an ideal target from an attacker's economic perspective.
Executive Order 14028: The Government Response
On 12 May 2021 — just five days after the Colonial Pipeline shutdown — President Biden signed Executive Order 14028, "Improving the Nation's Cybersecurity." The order mandated sweeping changes for federal agencies and their technology suppliers, including requirements for zero-trust architecture, software supply chain security, MFA implementation, and enhanced incident reporting.
While the executive order applied directly only to federal agencies and their contractors, its ripple effects extended far beyond government. Companies selling to the US government — and their subcontractors — now faced new compliance requirements. Industry frameworks like NIST and CISA guidelines were updated to reflect the order's priorities. Insurance companies began tightening cyber insurance underwriting criteria, increasingly requiring MFA and incident response plans as conditions of coverage.
For businesses operating internationally, as I frequently advise through my cross-border consulting practice, the executive order signalled a global trend toward more prescriptive cybersecurity regulation. The EU was already advancing its NIS2 Directive. Singapore had updated its Cybersecurity Act. The direction was clear: governments would no longer rely on voluntary compliance for critical infrastructure and supply chain security.
The Cybersecurity Checklist Every Business Needs Now
The Colonial Pipeline attack distilled cybersecurity into its most fundamental lesson: the gap between knowing what to do and actually doing it is where breaches happen. The technology to prevent this attack existed and was well understood. The failure was in implementation, governance, and accountability.
Every business — regardless of size or industry — should treat the Colonial Pipeline incident as an urgent prompt to verify the following: MFA is enabled on all remote access points, VPN accounts are regularly audited and legacy accounts are decommissioned, an incident response plan exists and has been tested in the last 12 months, backup systems are air-gapped and regularly verified, and cyber insurance coverage is current and conditions are being met. These are not advanced security measures. They are the baseline — and the Colonial Pipeline attack proved that failing at the baseline can have catastrophic consequences.
If your organisation needs to assess its cybersecurity posture or develop a practical incident response strategy, I can help you identify and close the gaps that matter most. Contact me to discuss a security assessment tailored to your business.
Frequently Asked Questions
Further Reading
Related Articles
Log4Shell: The 10/10 Vulnerability That Changed Cybersecurity Forever
On 9 December 2021, a critical vulnerability in Apache Log4j — a ubiquitous open-source logging library — was disclosed. With 93% of cloud environments vulnerable, 60+ exploit variants appearing within 24 hours, and CISA calling it 'the most serious vulnerability ever,' Log4Shell exposed the hidden risks of open-source software dependencies.
The Kaseya Attack: Why Supply Chain Security Is Every Founder's Problem
On 2 July 2021, the REvil ransomware group exploited a zero-day vulnerability in Kaseya's VSA platform, compromising up to 2,000 organisations through a single supply chain attack. The $70 million ransom demand and the cascading impact made it the largest ransomware event in history at that point.

Giovanni van Dam
MBA-qualified entrepreneur in IT & business development. I help founder-led businesses scale through technology via GVDworks and build AI-powered SaaS at Veldspark Labs.