Ongoing ransomware attack leaves systems badly affected, says Scottish Environmental Regulator

About a month after the first attack, the Scottish Environmental Protection Agency (SEPA) systems remained offline – and stolen information from the organization was leaked by hackers.

The Scottish Environment Protection Agency (SEPA) has warned that it may take “significant time” before programs and services can be fully restored after being hit by ransomware the night before Christmas.

The SEPA communications center, internal systems, processes, and internal communications were all affected by the attack, which struck the day before Christmas.

The organization, which is the Scottish government’s director of environmental protection, also confirmed that 1.2GB of data had been stolen as part of the attack – including information about SEPA staff.

In a lengthy renovation late last week, the agency said the “bulk” of its IT systems would remain “badly affected for some time,” and in some cases would have to be completely replaced.

“The agency has confirmed that email, staff schedules, multiple reporting tools, systems, and information remain unavailable and access to a series of programs and tools that have not been available for a long time,” it continued.

In addition to the ransomware attack, SEPA’s ability to provide flood forecasting and warning services, as well as control and monitoring services, continues.

One of these programs is an online reporting service with questions about pollution. Although it has now been restored, any information added to the service during the first days of attack is not available.

But while the infected programs have been sorted out, the latest review of SEPA on the Hareoware attack states that the recovery will take “significant time” and that many programs “will remain badly affected for some time” with completely new programs needed.

SEPA has blamed ransomware attacks on “critical and organized criminals” cybercriminals.

However, the attackers also seized 1.2GB of data from the company including purchase details, commercial projects, and SEPA staff, as well as its business plans, essentials, and exchange plans. Some, but not all, are thought to be publicly available.

“While we have quickly divided our plans, security experts, working with SEPA, the Scottish Government, the Scottish police, and the National Cyber ​​Security Center, have now confirmed the significance of this incident,” said Terry A’Hearn, Chief Executive of SEPA.

While the organization itself has not confirmed what type of ransomware it has been its victim, the cybercriminal group behind Contonhlengware has published what it calls stolen information to a Scottish government ambassador.

Leave a Reply

Your email address will not be published.