
How did the HSE get hacked?
The ransomware event currently affecting the HSE has been extremely disruptive. But how did it happen?
How did the ransomware get into the HSE systems?
At this early stage, no one knows exactly how ransomware got into the IT systems of the HSE. However, it is possible that the malware got into their systems via a phishing email. If we look at similar cases which have been hit with the same family of ransomware, patterns begins to emerge. For example, in October 2020, several American hospitals were hit with ransomware. These attacks started with a phishing email sent to employees in the form of a Google Drive link. In some of these cases, clicking on the document link would deliver Ryuk directly to their computers. In other cases, C2-enabled (command-and-control) malware (such as Trickbot, Emotet or Cobaltstrike) would be downloaded onto their systems which subsequently downloaded Ryuk. According to security research agency Coveware, 34% of Conti ransomware attacks start with a phishing email. Another security research oganisation, Advintel, estimates that 91% of ransomware attacks begin with a phishing email.
Has this strain of ransomware been in circulation long?
The strain of Conti ransomware developed by Wizard Spider has only been in circulation since August 2020. However, its precursor Ryuk (also developed by Wizard Spider) has been in circulation since mid-2018.
Has anything like this happened before?
Yes, the precursor to Conti ransomware, Ryuk has infected hospitals, schools, companies, councils and government agencies across the world. In fact, in October 2020, the FBI issued an urgent warning about Ryuk it was wreaking such havoc. Victims of Ryuk have included Baltimore Public Schools, hospitals in France (Dax and Villefrance-sur-Saone) and hospitals in Oregon, New York, Michigan and Wisconsin. In terms of government agencies, in January 2021, the Scottish Environmental Protection Agency got hit with Conti ransomware knocking out most of their systems. They refused to pay the ransom.
Would anti-virus software not have detected this?
No, the suite of malware which Ryuk and Conti use, has the ability to disable endpoint security software. (Normally a Windows PowerShell command is executed which disables the AV protection instantly)
