Saturday, October 16, 2021

Ongoing ransomware attack leaves systems badly affected, says Scottish Environmental Regulator

Must Read

Kaseya releases patches for flaws exploited in the REvil ransomware attack

Kaseya Florida-based software vendor On Sunday rolled out a security update for the VSA zero-day vulnerabilities exploited by the...

iOS, Windows 10, Chrome, and Lots of others fall at China’s top hacking Competition

Many of the top software programs are hacked with new and never-before-seen exploits at this season's version of this...

BlackFriday: 84% of Consumers Taking Risk To Personal Data in Search of Cheap Things

More than eight Out of ten (84 percent ) customers are eager to share private information with retailers to...

About a month after the first attack, the Scottish Environmental Protection Agency (SEPA) systems remained offline – and stolen information from the organization was leaked by hackers.

The Scottish Environment Protection Agency (SEPA) has warned that it may take “significant time” before programs and services can be fully restored after being hit by ransomware the night before Christmas.

The SEPA communications center, internal systems, processes, and internal communications were all affected by the attack, which struck the day before Christmas.

The organization, which is the Scottish government’s director of environmental protection, also confirmed that 1.2GB of data had been stolen as part of the attack – including information about SEPA staff.

In a lengthy renovation late last week, the agency said the “bulk” of its IT systems would remain “badly affected for some time,” and in some cases would have to be completely replaced.

“The agency has confirmed that email, staff schedules, multiple reporting tools, systems, and information remain unavailable and access to a series of programs and tools that have not been available for a long time,” it continued.

In addition to the ransomware attack, SEPA’s ability to provide flood forecasting and warning services, as well as control and monitoring services, continues.

One of these programs is an online reporting service with questions about pollution. Although it has now been restored, any information added to the service during the first days of attack is not available.

But while the infected programs have been sorted out, the latest review of SEPA on the Hareoware attack states that the recovery will take “significant time” and that many programs “will remain badly affected for some time” with completely new programs needed.

SEPA has blamed ransomware attacks on “critical and organized criminals” cybercriminals.

However, the attackers also seized 1.2GB of data from the company including purchase details, commercial projects, and SEPA staff, as well as its business plans, essentials, and exchange plans. Some, but not all, are thought to be publicly available.

“While we have quickly divided our plans, security experts, working with SEPA, the Scottish Government, the Scottish police, and the National Cyber ​​Security Center, have now confirmed the significance of this incident,” said Terry A’Hearn, Chief Executive of SEPA.

While the organization itself has not confirmed what type of ransomware it has been its victim, the cybercriminal group behind Contonhlengware has published what it calls stolen information to a Scottish government ambassador.

a2434345d63481a40f0d145881b41013?s=96&d=mm&r=g
Priyanshu Vijayvargiya
Founder and Editor-in-Chief of 'Virtualattacks Inc' Priyanshu Vijayvargiya is a cybersecurity analyst, Information Security professional, developer, and a white hat hacker.

Leave a reply

Please enter your comment!
Please enter your name here

Latest News

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

More Articles Like This