'Significant' Ransomware Attack Forces Ireland's Health Service To Shut Down IT Systems (therecord.media) 53
Catalin Cimpanu, reporting for Record: Ireland's national health service, the Health Service Executive (HSE), temporarily shut down its IT systems today after suffering a ransomware attack overnight. The organization, which is in the mid of its COVID-19 vaccination program, said the attack did not impact its ability to provide urgent medical care but that some routine checks and services might be delayed or canceled. The HSE described the ransomware incident as "significant" and "human-operated," a term used to describe high-end sophisticated ransomware groups which orchestrate targeted attacks against carefully big organizations. In a morning radio show with public broadcaster RTE, HSE Chief Executive Paul Reid said the agency's IT teams are currently investigating the incident to find out its breadth. In a different radio show, Reid identified the ransomware gang behind the attack as Conti, a ransomware gang that started operating in the summer of 2020.
DarkSide? (Score:2)
Another victim [slashdot.org] of DarkSide?
Re: (Score:2)
Conti, not that it really matters. They're all motivated by the same thing.
Re: (Score:2)
Re: (Score:2)
Yep, payouts only made possible through the legalized exchange of cryptocurrencies.
Re: (Score:2)
Re: (Score:2)
Some of them are getting out, like Tesla. A rapid squeeze rather than an instant crackdown would let the ownership class get out quickly so they won't suffer any losses.
Are these Windows monocultures? (Score:2)
Re: Are these Windows monocultures? (Score:2)
Re: (Score:2)
You are wrong. There really is nothing more to say here.
Re: (Score:2)
Re: (Score:2)
tanstaaf1 inquired:
Why don't large governments - who have enough money to build their own operating systems, or at least tweak existing open source - know this and take commonsense measures?
A major reason why governments (other than the PRC) don't roll their own OSes is because they can't afford to hire the top talent necessary to do so, due to caps on civil servants' salaries. And outsourcing the task to what we in the USA refer to as "Beltway bandits" is absolutely not a valid alternative to doing it in-house, both because those are money-extraction machines, not software development organizations, and because there's zero evidence that they could produce a hack-proof OS.
I
Re: (Score:2)
Re: Are these Windows monocultures? (Score:1)
Every government that tried to roll its own OS, even if based on Linux, quickly became outdated and horribly insecure. That is the case in China, North Korea, Russia and even Germany.
The problem is not monocultures, the problem is lack of funding for security initiatives across the board, the pipeline company was looking to hire Cybersecurity personnel until extra taxes and regulation set in, they quickly cut the first cost center they could find. Then they beat their chest for a while, get the government t
Re: (Score:2)
Why don't large governments - who have enough money to build their own operating systems, or at least tweak existing open source - know this and take commonsense measures?
If you're positing that government should "protect" themselves by writing different operating systems or customizing existing ones - this is thinly disguised security through obscurity. The best use of resources (besides maintaining good opsec, which many governments and corporations do not) is to concentrate efforts on hardening existing OSes.
This sounds like ... (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Another reason to get drunk.
Wait, I must have missed the memo.
Since when do we need a reason to get drunk?
Unintended Side Effects (Score:2)
I suspect we could see an unintended side effect from some of these attacks. We may well see the Nationalization of key pieces of infrastructure in the name of National Security. It could come piecemeal, Hospitals here, Electricity there, Gas pipelines, etc.. Or it could come under one umbrella: IT Security.
USC only IT jobs will be nice in the USA! (Score:2)
USC only IT jobs will be nice in the USA! With the big GOV paycheck + very hard to fire.
Re: (Score:2)
ROTFL!
Yeah, right. I was working for a federal contractor (US), and was getting about the same pay and benefits as a fed did - I looked it up.
Oh, and let's not forget that the "BIG GOV" paychecks are unlikely to be more than a Congresscritter gets, unlike private industry. No stock options, etc.
Re: (Score:2)
One of these days... (Score:2)
Re: (Score:2)
Maybe they will wake up one day to find a decapitated top-of-rack switch in their bed. Didn't that work in The Godfather?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Careful with that axe, Eugene.
Re: (Score:2)
...these people are going to pick on the wrong people
They did that a few times already. History shows that they have little to worry.
It happens because it works (Score:2)
So long as the perception of benefits outweighs the perception of costs, this kind of thing will happen. Amateur, professional, or state-backed.
Nations are going to have to start investing in changing the equation by legislating and funding the investigation of such attacks, and doling out serious punishments.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
If you have a single machine that has been infected that could work. But if you have one infected machine, what makes you think everything else on your network is good? So you pretty much have to isolate every device on your network and individually restore them before they can rejoin the network. And that can take a very long time.
Re: (Score:3)
The massive wait times and storage requirements, I'd guess. These people can't be assed to put decent security and backup plans in place in the first place, so I really don't think they'd like to multiply the storage requirement on each PC and wait for a full-system backup on every boot-up/shutdown (which would just incentivize users to reboot as little as possible).
Re: (Score:2)
I have a really dumb question, but why aren't we keeping "last boot" snapshots of filesystems as a matter of course? Get encrypted? Just reboot to the most recent boot snapshot. Sure you might have lost anything you worked on that morning, but that has to be better than paying ransom.
Possibly for a couple of reasons. First, not every system supports "snapshots". In the case of Windows servers, filesystem snapshots are really more of an aid to creating consistent backups than a means of backup themselves. You can't boot from a snapshot of an NTFS filesystem, for example.
In the case of virtual machines, such as VMware servers, you can create snaphots of an entire VM, including memory, but they have a terrible impact on disk performance, which may not be acceptable on database servers and
Re: (Score:2)
Re: (Score:2)
They'll just delay the start of the encryption process so going back to a supposedly good boot will still have the payload waiting in the background. Or they'll find a way to alter the snapshots or outright wreck them so you can't go back. Plus, it's not like you're going to keep too many snapshots around. With a long enough fuse they could be in weeks worth.
Carefully big organizations (Score:2)
I'm not sure what a "carefully big organization" is, but all you other carefully big organizations better tighten up your security!
Technical details? (Score:3)
Re: (Score:3)
Re: (Score:2)
oilchangesarecheap Matt Novak 5/14/21 8:55am Thanks Microsoft for making such shitty software that everyone is getting hacked. This doesn’t happen with Linux. Every windows PC was removed from the network and re-installed. I don’t get paid overtime. Its a large hospital chain unrelated to the one in this article. Fuck Microsoft and their shitty forced update system full of holes. Windows 7 boxes, running the information screens? Fine. Every linux box was unaffected. 1
Question (Score:2)
Re: (Score:2)
Re: (Score:2)
why cant email be opened in a VM away from the main files?
- in a what?
a manager
Re: (Score:2)
why cant email be opened in a VM away from the main files?
- in a what? a manager
Or worse,
the CTO
Re: (Score:2)
Since most attacks are done with email why cant email be opened in a VM away from the main files?
https://www.youtube.com/watch?... [youtube.com]
okay, lemme explain to you how the world works.
First off, for a whole lot of people, their mailbox is their file system. Seriously, I've got guys with inbox trees six folders deep.
Many of those e-mails have attachments, and those attachments need to get modified and sent back to the sender. Sure, it should be saved on a network folder, but I've got one client who has version hell issues because of terrible permissions settings they also insisted on implementing years ago.an
Negotiations for Ransom (Score:3)
The HSE have apparently already initiated ransom negotiations. The Hackers have been informed that there is only a 3 year waiting list before a specialist consulting negotiatologist can see them.
They can, of course, try get the ransom immediately if they go private.
---
In non-humerous posts, I've heard the system was a bit like the Battlestar Galactica and might've been saved from worse damage because of it.