Date | 14 May 2021 |
---|---|
Location | Ireland |
Type | Cyberattack, data breach, ransomware using Conti |
Target | |
Outcome |
|
Suspects | Wizard Spider, ContiLocker Team |
On 14 May 2021, the Health Service Executive (HSE) of Ireland suffered a major ransomware cyberattack which caused all of its IT systems nationwide to be shut down. [1] [2] [3] [4]
It was the most significant cybercrime attack on an Irish state agency and the largest known attack against a health service computer system. [5] [6] Bloomberg News reported that the attackers used the Conti ransomware. [7] The group responsible was identified as a criminal gang known as Wizard Spider, believed to be operating from Russia. [8] [9] [10] The same group is believed to have attacked the Department of Health with a similar cyberattack.
On 19 May, the Financial Times reviewed private data for twelve individuals which had appeared online as a result of the breach. [11] On 28 May, the HSE confirmed confidential medical information for 520 patients, as well as corporate documents were published online. [12]
The attackers began by sending a malicious email to a workstation on 16 March 2021. [13] The email was opened on 18 March. [13] A malicious Microsoft Excel file was downloaded, which allowed the attackers access to HSE systems. [13] The attackers gained more access over the following weeks. [13] The HSE antivirus software detected activity on 31 March, but could not block it as it was set to monitor mode. [13]
On 13 May the cybersecurity provider for the HSE emailed the Security Operations team that there had been unhandled threats on at least 16 systems since 7 May. [13] The Security Operations team had the server team restart servers. [13]
The HSE was alerted to the attack at 4am on 14 May 2021. [14] The attack affected both national and local systems, involved in all core services, with the HSE taking down their IT system in order to protect it from the attack and to give the HSE time to consider options. [15]
The attack occurred during the COVID-19 pandemic. Ireland's COVID-19 vaccination programme was not affected by the attack and proceeded as planned; [7] however, the COVID-19 general practitioner and close contact referral system was down, requiring these individuals to attend walk-in sites rather than attend an appointment. [16] [1]
The independent TD (Member of Parliament) Cathal Berry stated that the National Cyber Security Centre which is responsible for the state's cyber security, had only 25 members of staff, a budget of €5 million a year, no dedicated premises, and that its position of Director had been vacant for a year due to its salary of €89,000 a year. [17] [18] The National Cyber Security Centre is under the remit of the Department of the Environment, Climate and Communications. [19]
The National Cyber Security Centre identified the penetration testing tool Cobalt Strike, sold by American IT company HelpSystems, as being used to move through and infect HSE and Department of Health systems, to run executable files, and to deploy a variant of the Conti ransomware. [14] [20] Cobalt Strike Beacon was detected on infected systems, which allowed them to be controlled and for software to be deployed remotely. [20]
The group responsible was identified as a criminal gang known as Wizard Spider, believed to be operating from Saint Petersburg, Russia. [8] [9] [10]
The ransomware cyber attack had a significant impact on hospital appointments across the country, with many appointments cancelled including all outpatient and radiology services. [21]
Several hospitals described situations where they could not access electronic systems and records and had to rely on paper records. [22] Some have warned of significant disruption with routine appointments being cancelled, including maternity checkups and scans. [23]
The COVID-19 testing referral system was made offline, requiring individuals with suspected cases to attend walk-in COVID-19 testing centres, rather than attend an appointment. [16] The COVID-19 vaccination registration portal was also made offline, but was later back online in the evening. [24]
The Chief Operations Officer of the HSE – Anne O'Connor – said on 14 May that some cancer and stroke services had been affected and that "the situation will be very serious if it continues into Monday [17 May]". She said that the most serious concerns were with diagnostics, with radiology systems having gone down, affecting CT and other scans from going ahead. [25] A large amount of out-patient appointments were also cancelled; most community health services are unaffected. [26] O'Connor also reported that "we don't know what data has been taken", but "we know some data has been compromised", with the Data Protection Commissioner being alerted to the potential breach. [27]
The HSE published a list of affected services on its website at lunchtime on 14 May 2021. [28] [29]
On 19 May, the Financial Times reviewed "samples" of private data of twelve individuals that was published online, including admission records and laboratory results for a man admitted to hospital for palliative care. In response, the National Cyber Security Centre stated criminal gangs "habitually release stolen information as a means of pressurising organisations into paying a ransom". The ContiLocker Team claimed to also have staff employment contracts, payroll data and financial statements, patient addresses, and patient phone numbers. [11]
On 28 May, the HSE confirmed that data relating to 520 patients, including sensitive information, was published online. [12] [30] [31] [32]
In December 2021 the HSE said that it may take up to four months to contact all those whose data was stolen. [33] The Garda National Cyber Crime Bureau received the data from the United States Department of Justice through a mutual legal assistance treaty. [33] The Bureau provided the data to the HSE on 17 December 2021. [33] The HSE confirmed that said data was taken from its computers. [33] The HSE also contacted the Data Protection Commissioner about the data. [33] The data is expected to be a mix of personal data, medical information, HSE corporate information as well as commercial and general personal administrative information. [33]
The HSE worked with the National Cyber Security Centre, the Garda Síochána, Irish Defence Forces, as well as various partners domestically and internationally, including Europol and Interpol. [14] [34]
The Minister of State for Public Procurement and eGovernment – Ossian Smyth – said that the attack was international, not espionage, and that "this is a very significant attack, possibly the most significant cyber attack on the Irish State." [35]
The HSE claimed that it was a zero-day-threat and that there was no experience in how to respond to the attack. [36] The Minister for Health – Stephen Donnelly – said that the attack had "a severe impact" on health and social care services. [36] The Director-General of the HSE – Paul Reid – said that the attack will cost "tens of millions" to fix. [27]
A number of news outlets, including Bleeping Computer , reported that a ransom demand of €16.5 million (about $20 million) was made, offering to decrypt data and to not publish "private data". [37] [38] [39] Initially, the Business Post reported that a ransom demand of three bitcoin or €124,000 (about $150,000) was made. [40] Taoiseach Micheál Martin stated the ransom would not be paid, with the attack instead being dealt with in a "methodical way". [41] [42]
American cybersecurity firms McAfee and FireEye were contracted by the HSE after the attack to mitigate the damage, and to monitor dark web sites for leaked data. [43]
On 16 May, it was reported that the Department of Social Protection came under "sustained and fierce attack" but the highly organised criminal group were unable to breach the security. The department subsequently suspended its electronic communication channels with the HSE. [44] [39]
On 20 May, Minister for Communications Eamon Ryan said a helpline was to be set up to assist individuals who have had health information published as a result of the hack, and that social media companies were asked to not share information that has been released, [45] with a High Court injunction obtained by the HSE to prohibit the sharing of this information. [46] [47] On the same day, it was reported that the organised cyber crime group provided a decryption key that could enable the HSE to recover their IT systems and the files that hackers locked and encrypted. [48] [49] Meanwhile, the public was advised by Gardaí to be aware of a number of call and text scams in the wake of the cyber attack amid warnings the delivery of care in the health service would be a high risk for weeks; [50] [51] as of 24 May, the Garda Síochána have described any calls threatening the release of information as "opportunistic", stating they do not have access to private data. [52]
On 27 May, the Chief Executive of the HSE – Paul Reid – said that the cost of the cyber attack on its IT systems could exceed €100 million. [53]
The Defence Forces' CIS Corps deployed 'ethical hackers' to fight back against the ransomware attack and sent CIS personnel to hospitals and HSE offices in order to decrypt devices affected onsite. Army Reservists were particularly useful to this effort due to their cybersecurity skills and experienced gleaned from the private sector during their day jobs. [54] [55]
On 5 September, during a major operation carried out by Gardaí targeting the gang behind the ransomware attack, the Garda National Cyber Crime Bureau seized several domains used in the cyberattack and other ransomware attacks. [56]
On 10 December a report by PricewaterhouseCoopers was released which revealed that the attackers were in the HSE computer systems eight weeks before the attack was initiated. [13] The report said that the HSE legacy IT system was not resilient against cyberattacks. [13] It had evolved over time but had not been designed to resist attacks. [13]
HSE CEO Paul Reid said that the system had not been strategically designed, but was the result of amalgamation of health boards, hospital groups and Community Healthcare Organisations. [13] The system is very fragmented and siloed. [13] In contrast, the HSE staff were described as resilient, working quickly to ensure continuity of services. [13] Reid also said that the HSE has initiated a number of actions to mitigate future attacks. [13] These include a 24-hour monitoring system for IT systems in the HSE and more multi-factor authentication for users. [13]
HSE chairman Ciarán Devine said that the heath service still feels the impact of the attack. [13]
The HSE has accepted a number of recommendations from the report, including the development of a significant new investment plan and transforming legacy IT to include security. [13]
New roles of Chief Technology and Transformation Officer and Chief Information Security Officer are to be created. [13]
The report also recommends security crisis management plans to ensure that responses to futures attacks are properly managed. [13]
The use of ethical hackers to test system security will be increased. [13]
On 13 May, the National Cyber Security Centre (NCSC) was alerted of "suspicious activity" on Department of Health systems, and in the morning of 14 May an attempt to run ransomware was prevented, with Department of Health IT systems shut down as a precaution. [39] [57] [58] A preliminary investigation by the NCSC showed the use of remote access tool Cobalt Strike, sold by American technology company HelpSystems, [59] to infect systems and execute the ransomware payload. [20]
According to RTÉ News, a digital note from the cyber crime group believed to be responsible was left on the Department's IT systems, similar to the one discovered at the HSE. [60]
On 23 June 2021, it was confirmed that at least three quarters of the HSE's IT servers had been decrypted and 70% of computer devices were back in use. [61] [62] [63] By 15 July, this had risen to 82% of servers and 83% of devices. [64] By September, over 95% of all servers and devices had been restored. [65]
On 25 June 2021, High Court judge Tony O'Connor was told that approximately 27 files stolen from the HSE were placed on a malware analysis service VirusTotal in late May. [66] [67] VirusTotal is owned and run by Chronicle Security Ireland Ltd, its US parent Chronicle LLC and ultimately Google. [68] The stolen files included confidential patient information and was downloaded 23 times before the files were removed on 25 May. [69]
The defendants – Chronicle Security Ireland and Chronicle LLC – said they wanted to help the HSE as much as possible, but for data protection reasons cannot hand material over unless a court orders them. Therefore, the HSE sought Norwich Pharmacal orders against the defendants to require them to provide information on those who uploaded or downloaded the stolen information. The orders would require the defendants to supply the HSE with the unknown users' email addresses, phone numbers, IP addresses or physical addresses. [67]
The HSE's national director for operation performance and integration – Joe Ryan – said the HSE became aware that the Financial Times had published an article referring to stolen data and mentioning a link to stolen data. The HSE sought the return of the stolen data and an explanation to the link location but the Financial Times indicated it had received the information from a confidential source which they refused to reveal. [67]
On 20 May 2021, the HSE had obtained a court order restraining any processing, publishing, sharing or selling of stolen data. When the Financial Times received a copy of the order, they handed over the information they got from the source to the HSE computer security advisers. Analysis of this material revealed that the stolen data had been uploaded to VirusTotal. [67]
Ryan said that after they were contacted, the defendants deleted the stolen data from their servers. [67]
Counsel for the HSE told the judge that the matter was urgent but hoped that the matter could be finalised when the matter next comes before the court. The defendant's lawyers said they were unlikely to oppose any order in an agreed form from the HSE to disclose information. The judge, on an ex parte basis, granted counsel permission to serve short notice of the proceedings on the defendants and resumed the matter the following week. [67]
On 9 February 2023, it was revealed that over 32,000 notification letters were issued to people who had their data stolen in the cyber attack. More than 100,000 letters are to be sent to people affected by the attack by April 2023. Dáil Éireann's Public Accounts Committee examined the financial impact and heard that the immediate response cost the Department of Health €1 million and cost the HSE €53 million. [70]
A research team led by Prof Seamus O'Reilly of Cork University Hospital found that in ten cancer trials units (three private, seven public) only two privately-run units had a preparedness plan in place before the attack. [71] Three of the remaining sites have implemented a plan or are doing so, while file do not have a plan. [71]
The report also found that patient referrals to cancer clinical trials fell by 85 percent and trial recruitment fell by 55 percent. [71]
513 patients around Ireland had their radiation therapy interrupted. [71]
The attack came at the end of the third wave of COVID-19 and 'severely challenged the resilience of the already exhausted staff'. [71]
Professor O'Reilly said "Covid-19 as an oncologist made me do things professionally that I don’t want to do again. But the cyber-attack was worse than Covid" to the Policy Forum for Ireland keynote seminar ‘Next steps for cancer services in Ireland’. [71] He also said "It was a very difficult time. Results were frozen on the computer. Our ways of communicating with people were compromised, and we had no access to old information. We had patients who had scans done and the scans were trapped on the machine. It was very challenging for patients because they would turn up at clinics and there would be no records of them coming there or needing to be there. We would have had to send patients home to their GP to get their medical record details, get them printed out at their GP’s office and bring them back to us so we could look after them at the hospital." [71]
He said that the HSE had improved cybersecurity but warned against complacency. [71] He said "I think cyber-attacks are becoming more common and more sophisticated, so we’re still vulnerable to them, we’re probably more vulnerable now than we were in May of 2021. A cyber-attack now takes less than 24 hours to activate. the one we had in May 2021; it was embedding for two months. I think we we’re always going to be vulnerable to a cyber-attack. Systems have become more sophisticated to get around whatever we do." [71]
In May 2024 473 legal actions were reported to have been taken against the HSE in relation to the attack. [72] The State Claims Agency is managing 12 personal injury cases against the HSE in relation to the attack, where legal proceedings were being served in 11 cases. [72] The personal injury cases are related to the psychological impact of the attack. [72] There are a number of cases before the Court of Justice of the European Union related to the attack. [72]
Ransomware is a type of cryptovirological malware that permanently blocks access to the victim's personal data unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem, and difficult-to-trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.
A blended threat is a software exploit that involves a combination of attacks against different vulnerabilities. Blended threats can be any software that exploits techniques to attack and propagate threats, for example worms, trojan horses, and computer viruses.
The Health Service Executive (HSE) is the publicly funded healthcare system in the Republic of Ireland, responsible for the provision of health and personal social services. It came into operation on 1 January 2005.
The Internet has a long history of turbulent relations, major maliciously designed disruptions, and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.
The Communications and Information Services Corps (CIS) – formerly the Army Corps of Signals – is one of the combat support corps of the Irish Defence Forces, the military of Ireland. It is responsible for the installation, maintenance and operation of communications and information systems for the command, control and administration of the Defence Forces, and the facilitation of accurate, real-time sharing of intelligence between the Army, Naval Service and Air Corps branches at home and overseas.
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices, or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack.
The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated by using EternalBlue, an exploit developed by the United States National Security Agency (NSA) for Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack. While Microsoft had released patches previously to close the exploit, much of WannaCry's spread was from organizations that had not applied these, or were using older Windows systems that were past their end-of-life. These patches were imperative to cyber security, but many organizations did not apply them, citing a need for 24/7 operation, the risk of formerly working applications breaking because of the changes, lack of personnel or time to install them, or other reasons.
During the Baltimore ransomware attack of May 2019, the American city of Baltimore, Maryland had its servers largely compromised by a variant of ransomware called RobbinHood. Baltimore became the second U.S. city to fall victim to this new variant of ransomware after Greenville, North Carolina and was the second major US city with a population of over 500,000 people to be hacked by ransomware in two years, after Atlanta was attacked the previous year.
The 2018 SingHealth data breach was a data breach incident initiated by unidentified state actors, which happened between 27 June and 4 July 2018. During that period, personal particulars of 1.5 million SingHealth patients and records of outpatient dispensed medicines belonging to 160,000 patients were stolen. Names, National Registration Identity Card (NRIC) numbers, addresses, dates of birth, race, and gender of patients who visited specialist outpatient clinics and polyclinics between 1 May 2015 and 4 July 2018 were maliciously accessed and copied. Information relating to patient diagnosis, test results and doctors' notes were unaffected. Information on Prime Minister Lee Hsien Loong was specifically targeted.
REvil was a Russia-based or Russian-speaking private ransomware-as-a-service (RaaS) operation. After an attack, REvil would threaten to publish the information on their page Happy Blog unless the ransom was received. In a high profile case, REvil attacked a supplier of the tech giant Apple and stole confidential schematics of their upcoming products. In January 2022, the Russian Federal Security Service said they had dismantled REvil and charged several of its members.
Ryuk is a type of ransomware known for targeting large, public-entity Microsoft Windows cybersystems. It typically encrypts data on an infected system, rendering the data inaccessible until a ransom is paid in untraceable bitcoin. Ryuk is believed to be used by two or more criminal groups, most likely Russian, who target organizations rather than individual consumers.
On May 7, 2021, Colonial Pipeline, an American oil pipeline system that originates in Houston, Texas, and carries gasoline and jet fuel mainly to the Southeastern United States, suffered a ransomware cyberattack that impacted computerized equipment managing the pipeline. The Colonial Pipeline Company halted all pipeline operations to contain the attack. Overseen by the FBI, the company paid the amount that was asked by the hacker group within several hours; upon receipt of the ransom, an IT tool was provided to the Colonial Pipeline Company by DarkSide to restore the system. However, the tool required a very long processing time to restore the system to a working state.
DarkSide is a cybercriminal hacking group, believed to be based in Russia, that targets victims using ransomware and extortion; it is believed to be behind the Colonial Pipeline cyberattack. It is thought that they have been able to hack and extort money from around 90 companies in the USA alone. The group provides ransomware as a service.
Conti is a ransomware hacker group that has been observed since 2020, believed to be distributed by a Russia-based group. It operates as a ransomware-as-a-service (RaaS), enabling other cybercriminals to deploy this malware for their own purposes. Conti is particularly known for its utilization of double extortion techniques, where it not only encrypts victim's files but also steals and threatens to publish sensitive data if the ransom is not paid.
Wizard Spider, also known as Trickbot, DEV-0193, UNC2053, or Periwinkle Tempest, is a cybercrime group based in and around Saint Petersburg in Russia. Some members may be based in Ukraine. They are estimated to number about 80, some of them may not know they are employed by a criminal organisation.
In mid-May 2021 hospital computer systems and phone lines run by the Waikato District Health Board (DHB) in New Zealand were affected by a ransomware attack. On 25 May, an unidentified group claimed responsibility for the hack and issued an ultimatum to the Waikato DHB, having obtained sensitive data about patients, staff and finances. The Waikato DHB and New Zealand Government ruled out paying the ransom.
Beginning on the night (UTC-6:00) of April 17, 2022, a ransomware attack began against nearly 30 institutions of the government of Costa Rica, including its Ministry of Finance, the Ministry of Science, Innovation, Technology and Telecommunications (MICITT), the National Meteorological Institute, state internet service provider RACSA, the Costa Rican Social Security Fund, the Ministry of Labor and Social Security, the Fund for Social Development and Family Allowances, and the Administrative Board of the Municipal Electricity Service of Cartago.
In early February 2023, Munster Technological University suffered a ransomware cyberattack which caused the cancellation of all full and part-time classes affecting the Bishopstown campus, as well as Crawford College of Art and Design, Cork School of Music and National Maritime College of Ireland in Ringaskiddy.