Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Conti Ransomware Gives HSE Ireland Free Decryptor, Still Selling Data

Conti Ransomware Gives HSE Ireland Free Decryptor, Still Selling Data

The Conti ransomware gang has released a free decryptor for Ireland’s health service, the HSE, but warns that they will still sell or release the stolen data.

Ireland’s HSE, the country’s publicly funded healthcare system, and the Department of Health were attacked by the Conti ransomware gang last Friday.

While the Department of Health was able to block the attack, the HSE was not as lucky and was forced to shut down their IT systems to prevent further devices from being encrypted.

This IT outage has led to widespread disruption in the country’s healthcare system as the HSE recovers from backups and the concerns that the ransomware gang would soon release patient’s data.

Free decryptor released

Today, the ransomware gang posted a link to a free decryptor in their negotiation chat page for the HSE that can be used use to recover encrypted files for free.

However, the threat actors warn that they will still be selling or publishing the stolen private data if a ransom of $19,999,000 is not paid.

“We are providing the decryption tool for your network for free. But you should understand that we will sell or publish a lot of private data if you will not connect us and try to resolve the situation,” says the Conti ransomware gang on their Tor payment site.

Also Read: Data Protection Officer | 10 FAQs

Free decryptor released for HSE

As the ransomware sample used in the attacks on HSE is publicly available, security researcher MalwareHunterTeam and BleepingComputer have confirmed that the decryptor can decrypt files that were encrypted during this attack.

Decrypting files encrypted by HSE ransomware sample
Decrypting files encrypted by HSE ransomware sample

Since the initial attack, there has not been any further conversation between HSE, or someone else who had access to the chat, and the Conti ransomware gang.

The safest approach continues to be to reimage all of their servers and recover from backups, but the decryptor can be used as needed to recover data missing from backups.

The government of Ireland is aware of the free decryptor but will be performing a technical review of the tool for malicious properties before using it.

“The HSE is aware that an encryption key have been provided,” the Ireland Department of Health told BleepingComputer in a statement. “However further investigations have to be conducted to assess if it will work safely, prior to attempting to use it on HSE systems.”

As threat actor’s decryptors are known to be buggy and not optimized to decrypt files quickly, cybersecurity firm Emsisoft has created a ‘Universal Decryptor’ two times faster when decrypting files.

Ireland’s HSE can use Emisoft’s decryptor free of charge as part of their ongoing free assistance program to healthcare providers.

Also Read: Practitioner Certificate in Personal Data Protection: Everything You Need to Know

While the HSE can now recover encrypted files for free from prior activities of the ransomware gang, the release of the alleged 700 GB of stolen data is likely imminent.

Update 5/20/21 2:10 PM EST: Added statement and information about Emsisoft’s Universal Decryptor.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us