Scottish environmental agency still struggling after Christmas Eve ransomware attack
- Cybercriminals struck in early hours of Christmas Eve
- Organisation says that no public funds will be used to pay ransom
The Scottish Environment Protection Agency (SEPA) has confirmed that it is continuing to respond to an ongoing ransomware attack that has encrypted files, disrupted systems and seen 1.2 GB of data stolen by cybercriminals.
SEPA says it was hit by ransomware at 00:01 on Christmas Eve, December 24 2020 – timing presumably chosen deliberately by the attackers in an attempt to take advantage of what would – within many organisations – be a time when there are fewer staff working.
The organisation’s contact centre, internal systems, processes and internal communications have been impacted by the attack, and it is anticipated that systems will continue to be affected for some time as they are rebuilt from scratch. In the immediate aftermath of the attack, SEPA advised those who needed to report urgent pollution issues to use Twitter or Facebook.
Scottish police and the UK’s National Cyber Security Centre (NCSC) have been informed of the security breach, and are providing assistance.
In an interview with BBC Radio Scotland, SEPA’s chief executive Terry A’Hearn said that the organisation will “not be using public funds to pay a ransom to criminals.”
My impression from the interview is that Terry A’Hearn has a cool head on his shoulders, and I wish him well dealing with what no head of an organisation ever wants to face.
Although it’s obviously not ideal that any data has been stolen from SEPA’s systems by the cybercriminals, it’s worth noting that 1.2GB is not a huge amount.
SEPA describes it as “equivalent to a small fraction of the contents of an average laptop hard drive.”
Determining precisely what information has been stolen, its sensitivity, and who might be impacted by the data breach will be an important part of the response.
In addition it will be important to ascertain how the ransomware attackers might have breached SEPA’s systems and what lessons can be learnt to harden the organisation’s security in future.
SEPA is reassuring the public that priority regulatory, monitoring, flood forecasting and warning services are adapting to the incident, and are continuing to operate.
Abode IoT Security Camera Vulnerabilities Would Let Attackers Insert Images, Bitdefender Finds
December 21, 2021
Online Shoppers Beware, Mobile Scams Are on the Rise
December 17, 2021
The Holiday Guide to Tech Support: Fixing the Family Computer
November 24, 2021
Bitdefender Celebrates 20 Years of Cybersecurity Leadership
November 04, 2021
Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords
October 26, 2021
What are drive-by download attacks and how do you prevent them?
October 25, 2021