Ransomware cyber attacks - last week US this week Ireland
Ransomware cyber attacks - last week US this week Ireland
Author
Discussion

Earthdweller

Original Poster:

17,963 posts

150 months

Friday 14th May 2021
quotequote all
Following on from the cyber attack on the US pipeline, overnight there was a significant and serious attack on the HSE in Ireland ( Ireland’s NHS ) which has caused a shutdown of most non urgent healthcare in the country today

It’s being described as a ransom attack

We hear that a ransom was paid in the US attack, is this going to be the new “thing”

Is it state sponsored or criminal ?

Surely an attack on a country’s infrastructure should be classed as an act of terrorism or at the least a hostile act ?

Should ransom’s be paid ?

https://www.rte.ie/news/health/2021/0514/1221519-h...

https://www.rte.ie/news/health/2021/0514/1221537-h...

Prizam

2,447 posts

165 months

Friday 14th May 2021
quotequote all
It has been a "thing" for a long time. Often because of poor IT security or investment in IT. Sometimes it is targeted, but more often than not, opportunistic.

We should not pay them... It's like someone stealing your car and then you paying to get it back. But they keep a copy of the key they used to steel it with. You get it back, it's not quite right. And gets stolen again next week. Do you pay up again?

What we should be doing is keeping the keys locked up, and then finding and kicking the crap out of people who steal stuff.

Unfortunately, the powers that be are 1, not interested and 2, don't really understand what a computer is.

TonyRPH

13,472 posts

192 months

Friday 14th May 2021
quotequote all
Prizam said:
<snip>

Unfortunately, the powers that be are 1, not interested and 2, don't really understand what a computer is.
The reality of it is that these hackers are based out of Russia and other 'untouchable' countries.

The powers that be are interested, but this ^^^ prevents them from taking any action.


Hedobot

755 posts

173 months

Friday 14th May 2021
quotequote all
Looks like the pipeline company have coughed up 5 million dollars..

https://www.bbc.co.uk/news/business-57112371

randlemarcus

13,646 posts

255 months

Friday 14th May 2021
quotequote all
Hedobot said:
Looks like the pipeline company have coughed up 5 million dollars..

https://www.bbc.co.uk/news/business-57112371
Sounds like a cheap punishment for not patching antique Exchange systems biggrin

Ronstein

1,637 posts

61 months

Friday 14th May 2021
quotequote all
Ransomware isn't especially difficult to protect against. Stay on top of patching and scan for vulnerabilities. Have an effective back-up structure. Typically, large organisations are more vulnerable, either due to lack of investment, poor on boarding of acquisitions or just failures of process.

Previous

1,617 posts

178 months

Friday 14th May 2021
quotequote all
Earthdweller said:
Following on from the cyber attack on the US pipeline, overnight there was a significant and serious attack on the HSE in Ireland ( Ireland’s NHS ) which has caused a shutdown of most non urgent healthcare in the country today

It’s being described as a ransom attack

We hear that a ransom was paid in the US attack, is this going to be the new “thing”

Is it state sponsored or criminal ?

Surely an attack on a country’s infrastructure should be classed as an act of terrorism or at the least a hostile act ?

Should ransom’s be paid ?

https://www.rte.ie/news/health/2021/0514/1221519-h...

https://www.rte.ie/news/health/2021/0514/1221537-h...
Criminal and state sponsored are oft interchangeable in some areas.



Edited by Previous on Monday 17th May 07:53

Taita

7,955 posts

227 months

Friday 14th May 2021
quotequote all
Ronstein said:
Ransomware isn't especially difficult to protect against. Stay on top of patching and scan for vulnerabilities. Have an effective back-up structure. Typically, large organisations are more vulnerable, either due to lack of investment, poor on boarding of acquisitions or just failures of process.
This is quite a simplistic answer to a complex issue.

tangerine_sedge

6,222 posts

242 months

Friday 14th May 2021
quotequote all
Ronstein said:
Ransomware isn't especially difficult to protect against. Stay on top of patching and scan for vulnerabilities. Have an effective back-up structure. Typically, large organisations are more vulnerable, either due to lack of investment, poor on boarding of acquisitions or just failures of process.
Easier said than done for all but the simplest organisations and IT estates. That approach might protect you from script kiddies and opportunist attacks, but if an organised team want to access your networks they likely will.

Few businesses want to invest in properly architecting and securing their IT estate because it's really, really expensive, reduces agility and is difficult to do properly.

Hedobot

755 posts

173 months

Friday 14th May 2021
quotequote all
tangerine_sedge said:
Easier said than done for all but the simplest organisations and IT estates. That approach might protect you from script kiddies and opportunist attacks, but if an organised team want to access your networks they likely will.

Few businesses want to invest in properly architecting and securing their IT estate because it's really, really expensive, reduces agility and is difficult to do properly.
That $5 million would have purchased a review of their current systems and vulnerabilities. Maybe the hackers would have selected a differennt easier victim, perhaps..

MadCaptainJack

1,702 posts

64 months

Friday 14th May 2021
quotequote all
Hedobot said:
That $5 million would have purchased a review of their current systems and vulnerabilities. Maybe the hackers would have selected a differennt easier victim, perhaps..
I reckon the way this sort of attack works is the culprits scan the whole Internet looking for vulnerable servers - i.e. they don't think "Ooh, let's attack this company."

So, in effect, the victims self-select by failing to keep their software updated.

TonyRPH

13,472 posts

192 months

Friday 14th May 2021
quotequote all
MadCaptainJack said:
reckon the way this sort of attack works is the culprits scan the whole Internet looking for vulnerable servers - i.e. they don't think "Ooh, let's attack this company."

So, in effect, the victims self-select by failing to keep their software updated.
It's not always out of date software that's the issue. More often than not it's badly configured firewalls, web servers, VPNs etc.

I've worked with people that think they know how to maintain a secure network, until we've had a penetration test and suddenly they discover they weren't such the hotshot after all.

It can also be 'social engineering' in some cases.


Harpoon

2,433 posts

238 months

Friday 14th May 2021
quotequote all
Brian Krebs has an interesting article if you want to know more about the attackers and some of the negotiations that take place post-attack:

https://krebsonsecurity.com/2021/05/a-closer-look-...


wombleh

2,305 posts

146 months

Friday 14th May 2021
quotequote all
Hedobot said:
Looks like the pipeline company have coughed up 5 million dollars..

https://www.bbc.co.uk/news/business-57112371
According to this: https://www.bloomberg.com/news/articles/2021-05-13...

The unlock tool was so slow that they ended up recovering from their own backups anyway!

Although it is a tech story on Bloomberg so big pinch of salt needed.

Earthdweller

Original Poster:

17,963 posts

150 months

Sunday 16th May 2021
quotequote all
The Irish Health service has been hit by another attack with reports of the attackers demanding $20m dollars to cease

Messages and links to the dark web have apparently been left on the computer systems

700GB of “unencrypted” files, including patient and employee information, are also alleged to have been stolen.

The HSE have confirmed a ransom demand but are saying the matter is now in the hands of the cyber crime unit and Interpol

eldar

24,902 posts

220 months

Sunday 16th May 2021
quotequote all
TonyRPH said:
It's not always out of date software that's the issue. More often than not it's badly configured firewalls, web servers, VPNs etc.

I've worked with people that think they know how to maintain a secure network, until we've had a penetration test and suddenly they discover they weren't such the hotshot after all.

It can also be 'social engineering' in some cases.
Management too often see proper security as hard, expensive, complex and a potential waste of money. Thus try and do it as cheaply as possible. Even after they've been bitten once.

Some governments employ some incredibly talented hackers.

Puggit

49,450 posts

272 months

Sunday 16th May 2021
quotequote all
Taita said:
Ronstein said:
Ransomware isn't especially difficult to protect against. Stay on top of patching and scan for vulnerabilities. Have an effective back-up structure. Typically, large organisations are more vulnerable, either due to lack of investment, poor on boarding of acquisitions or just failures of process.
This is quite a simplistic answer to a complex issue.
The first part certainly is - however, the effective backup structure is bang on. I've worked for enterprise backup vendors for over 20 years and it is terrifying how laissez-faire organisations are about backup.

I have seen large insurance and legal companies solely using storage snapshots for protection and recovery. I have spoken to public sector organisations who have suffered devastating attacks, talked to vendors about how to prevent future attacks and carried on regardless.

There has been a long held policy in the majority of IT departments to starve backup of resources. Chickens are coming home to roost.



On the flip side, the company I work for has a customer who suffered a bad attack - recovered their backups successfully over a weekend. When they suffered a second attack, they refused to pay the ransom. So the ransomware gang informed them they were going after the backups. They were so assured by their first experience they told the ransomware gang to go for it. I believe their frontline security is now stronger, but they're still confident of recovery if they go down again.

dvs_dave

9,040 posts

249 months

Sunday 16th May 2021
quotequote all
This recently happened to a large client of mine (a Phoenix attack). Took their systems down for a month.

They were able to restore things from backups, but seemingly not 100%

Real pain in the arse it’s been!

Jim the Sunderer

3,261 posts

206 months

Sunday 16th May 2021
quotequote all
We've a twenty year old device doing some stuff, it's abhorrent.

I bet the CEO wouldn't be seen dead in anything that old except a hooker.

Liokault

2,837 posts

238 months

Sunday 16th May 2021
quotequote all
Friend of mine lost his job to this a while back.

Hackers shut down and locked out his company’s systems. They (a manufacturing company) carried on with paper instead of using a computer for a while. His company paid the hackers, but they locked them out again.

After that it became clear the company was no longer viable and shut its doors.