Last Updated: May 2021

Let’s not mince words: the Colonial Pipeline ransomware attack in May 2021 was a disaster of biblical proportions. A single compromised VPN password—yep, just one lousy credential with no multi-factor authentication (MFA) in place—let the DarkSide ransomware crew waltz into the largest fuel pipeline in the US. They stole over 100 GB of data, locked up the systems with ransomware, and forced a shutdown that triggered fuel shortages, panic buying, and a state of emergency across the East Coast. Colonial coughed up $4.4 million in Bitcoin (most of it later clawed back by the FBI), but the damage was done. And the root cause? Legacy MFA—or the complete lack of it—failed spectacularly when it mattered most.

This wasn’t just a corporate oopsie. This was critical infrastructure, the backbone of energy supply for millions, brought to its knees because of outdated security practices. Let’s break down exactly where legacy MFA fell flat and why it keeps letting us down.

A Compromised Credential: The Oldest Trick in the Book

Here’s the kicker: the attackers didn’t even need to work hard. They used a VPN password that had been leaked in a previous data breach. No MFA, no secondary barrier, nothing. Just a straight shot into the network. Once inside, they had all the time in the world to snoop around, steal data, and deploy ransomware. According to IBM’s 2025 Cost of a Data Breach Report, the average time to identify and contain a breach is a staggering 241 days. That’s more than enough time to turn a minor foothold into a national crisis.

Legacy MFA, when it’s even implemented, often relies on flimsy second factors like SMS codes or push notifications. Guess what? Those can be phished, intercepted, or just plain ignored if they’re not enforced across every access point. In Colonial’s case, they didn’t even have that much. A single password was all it took to compromise an entire pipeline. Pathetic.

Critical Infrastructure, Critical Failure

This isn’t some random startup getting hacked. Colonial Pipeline is critical infrastructure—when it goes down, people can’t fuel their cars, businesses grind to a halt, and entire regions feel the pain. The attackers knew this and exploited it for maximum leverage. They didn’t just steal data; they shut down operations for days, creating a ripple effect that cost millions beyond the ransom itself. IBM’s 2025 Cost of a Data Breach Report pegs the average cost of a breach in the US at $10.22 million, and that’s without factoring in the societal chaos of a fuel crisis.

Legacy MFA—or the absence of any meaningful authentication—left the door wide open. Passwords alone are a relic of the past, and even traditional MFA often fails to stop determined attackers who can phish or reuse stolen credentials. Critical infrastructure demands better, and yet here we are, watching the same old mistakes play out with devastating consequences.

Remote Access: A Gaping Hole

The attack vector was a VPN credential, a common entry point for remote access in industries like energy where employees and contractors often log in from outside the network. Without robust authentication, VPNs are basically an engraved invitation for attackers. Legacy MFA, even when it’s in place, struggles to secure these endpoints because it’s still built on the shaky foundation of passwords and phishable second factors. Colonial didn’t even bother with that baseline, and the result was a catastrophe.

We’ve said it before, and we’ll say it again: credential theft is the number one way attackers get in. When your security hinges on something as fragile as a password—or a half-baked MFA setup that can be bypassed with a phishing email—you’re rolling the dice on disaster. Check out Prevention — Not Detection to understand why stopping the attack before it starts is the only way forward.

The Human Cost of Legacy MFA’s Failure

Let’s not forget the real-world impact. This wasn’t just a balance sheet hit for Colonial Pipeline. Families couldn’t get gas to drive to work or school. Businesses reliant on fuel deliveries were screwed. States declared emergencies while people hoarded gas in plastic bags—yes, really. All because a single credential wasn’t protected by even the most basic authentication controls. Legacy MFA, or the lack thereof, didn’t just fail a company; it failed a nation.

The fix isn’t complicated, but it requires ditching legacy MFA entirely. The full technical breakdown of what actually works is at mfa2point0.com.

FAQ: What Frustrated IT Managers Are Asking

Q: How does a major company like Colonial Pipeline not have MFA on VPN access?
A: You’d be shocked how often critical systems are left unprotected due to cost, complexity, or just plain negligence. Legacy MFA can be a pain to roll out across every endpoint, especially with remote access, so companies skip it. And then they pay the price—literally.

Q: Isn’t traditional MFA enough to stop something like this?
A: Nope. SMS codes and push notifications can be phished or bypassed. Even when legacy MFA is in place, it’s often not enforced everywhere, leaving gaps like the VPN in this case. It’s a Band-Aid, not a barricade.

Q: How do we convince execs to ditch legacy MFA after a disaster like this?
A: Show them the numbers—$10.22 million average breach cost in the US, per IBM’s 2025 report—and the PR nightmare of a national crisis. Then point them to real prevention-focused solutions that don’t just react after the damage is done. Check out Coverage for how to secure every access point without the hassle.