fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Conti Ransomware Also Targeted Ireland’s Department Of Health

Conti Ransomware Also Targeted Ireland’s Department Of Health

The Conti ransomware gang failed to encrypt the systems of Ireland’s Department of Health (DoH) despite breaching its network and dropping Cobalt Strike beacons to deploy their malware across the network.

On the same day, Conti operators breached the network of Ireland’s Health Service Executive (HSE), the country’s publicly funded healthcare system, and forced it to shut down all IT systems to contain the incident.

“The National Cyber Security Centre (NCSC) became aware on Thursday of an attempted cyber attack on the Department of Health,” the Irish  Department of the Environment, Climate and Communications said.

“This attempted attack remains under investigation, however there are indications that this was a ransomware attack similar to that which has affected the HSE.”

Ransomware execution blocked

In a separate security advisory [PDF], NCSC provided more technical details on the attack and confirmed the link between the two incidents saying that the two “attacks are believed to be part of the same campaign targeting the Irish health sector.”

The NCSC was alerted of potentially suspicious activity on the Department of Health’s network on Thursday afternoon. 

Investigators discovered Cobalt Strike beacons deployed on the network, a tool commonly used by ransomware gangs to deploy their malicious payloads and encrypt systems across the network.

The next day, at 07:00 AM, a human-operated Conti ransomware attack disabled some of HSE’s devices, forcing the health service to shut down its entire IT infrastructure to limit the impact.

Also Read: PDPA Compliance Singapore: 10 Areas To Work On

Around the same time, a second Conti attack attempting to execute ransomware payloads to encrypt the systems of Ireland’s Department of Health was blocked by anti-virus software and the tools deployed by investigators the day before.

‘The Department of Health has implemented its response plan including the suspension some functions of its IT system as a precautionary measure,” the Irish government added.

The NCSC also confirmed BleepingComputer’s report that the ransomware sample used during these attacks appends the .FEEDC extension to encrypted files.

Conti HSE ransom note
Conti HSE ransom note

HSE will not pay Conti’s $20 million ransom

After the HSE ransomware incident, the Conti gang claimed to have had access to HSE’s network for over two weeks and that they were able to steal 700 GB of unencrypted files, including employee and patient info, financial statements, payroll, contracts, and more.

They also said that HSE would need to pay a $19,999,000 ransom for Conti to delete all the stolen data from their servers and provide a decryptor.

Even though the incident has led to widespread disruption affecting Ireland’s healthcare services, Taoiseach Micheál Martin, the Prime Minister of Ireland, said that the HSE would not be paying any ransom.

Conti ransomware's demands
Conti ransomware’s demands

Conti ransomware is a private Ransomware-as-a-Service (RaaS) operation believed to be run by a Russian-based cybercrime group known as Wizard Spider.

Also Read: What Does A Data Protection Officer Do? 5 Main Things

Conti shares code with the notorious Ryuk Ransomware, whose TrickBot-powered distribution channels they took over after Ryuk activity dwindled around July 2020.

Previously, Conti ransomware also hit the Scottish Environment Protection Agency (SEPA), leaking roughly 1.2 GB of stolen data on their dark web leak site.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us