Intersys Logo
Menu

Managed IT Support

A Reasonable, Fixed Monthly Fee for All Your IT Needs
Managed IT Support Provider

Consulting Services

The High Level IT Consulting Services You Need to Transform Your Business
Get IT Consulting Services

Cyber Security

A Comprehensive Range of Cyber Security Services for Robust, Industry-Leading Protection
Get Cyber Security Services

IT Solutions

Whatever your IT needs, we'll create a tailormade solution for you
Get IT Solutions

Cyber Security Monitor: May 2024


Cyber security and IT professionals of a sensitive disposition โ€“ look away now. 

This month brings us a story where a healthcare giant overlooked basic security protocols with devastating consequences for patients. Thereโ€™s also the all-too-familiar tale of highly concerning hacks swept under the carpet by organisations presumably fearing reputational damage.

Another day, another cyber security blunderโ€ฆHackers have been going for the big guns recently with โ€“ the MOD, the BBC and online ticketing giant Ticketmaster all being hit. 

But you CAN protect your organisation no matter how big or small by following best practice tips. Youโ€™ll see some of those in our third story, which looks at avoiding business email compromise. 

Stay safe out there. 

Who hacked the MOD? Fingers point at China

There was a flurry of alarming headlines earlier this month about China hacking the MOD. Defence Secretary Grant Shapps confirmed that payroll details of 270,000 current and veteran military personnel from the Royal Army, Navy and Air Force had been hacked. He also added that โ€œstate involvementโ€ from a hostile country could not be ruled out, but stopped short of officially naming China. The Chinese embassy denied any involvement in the hack.

Conservative MP Tobias Ellwood told Sky News that he believed China โ€œwas probably looking at the financially vulnerable with a view that they may be coerced in exchange for cash.โ€

Barely two months ago, the UK government openly accused Chinese โ€˜state-affiliated actorsโ€™ of orchestrating two โ€˜maliciousโ€™ cyber attack campaigns in the UK.

Thereโ€™s also growing concern that the MODโ€™s IT contractor Shared Services Connected Ltd (SSCL) had been aware of the hack for months before reporting it. An official inquiry is now looking into why the supplier took so long to report it.

SSCL and its parent company French tech giant Sopra Steria are believed to have other cyber security contracts with the government. Whitehall insiders fear that there could have been a wider compromise of systems, so watch this space.

Americaโ€™s worst-ever healthcare hack

The UnitedHealth Group hack has all the makings of a โ€˜how not toโ€™ case study.

Hereโ€™s the scenario. Americaโ€™s largest health insurance provider fails to protect its IT systems with basic multi-factor authentication (MFA), which leaves the doors open for hackers. Then it pays a $22 million ransom that does nothing to retrieve any data and, even worse, leads to double extortion from other ransom gangs. And, if reports are to be believed, it then attempts to rebuild infrastructure after the hack by โ€“ we can feel you wincing โ€“ reconnecting with compromised servers.

The fallout has been massive. UnitedHealth Group profits took a $872 million hit, with total losses estimated by some parties to climb to $1.6 billion if you factor in continued ransom demands. No doubt, they will survive. Their first-quarter revenue, despite the hit, was $99.8 billion.

The real story here is a human one. Patients were denied life-saving surgeries, which were cancelled at the last minute due to insurance payment freezes. Meanwhile, CEO Andrew Witty told Congress in his testimony that roughly a third of Americans have had their personal health information stolen.

It just goes to show that basic cyber security canโ€™t be taken for granted. Not even by billion-dollar organisations. The fundamentals of data security such as implementing MFA, segmenting networks to minimise the blast radius of a breach, and refusing to pay ransom for data retrieval remain as important as ever.

Intersysโ€™ Head of Security Jake Ives sums up our stance on paying ransoms to cyber gangs. โ€œPay these guys once and you demonstrate youโ€™re desperate, so itโ€™s no wonder the threat actors continue to cause headaches!โ€

Save the whale! How to protect senior execs from business email compromise (BEC)

Phishing emails are sadly all too common visitors in most work inboxes. An eye-watering 84% of UK businesses were hit by phishing scams last year. A growing trend is business email compromise, or BEC, where cyber criminals specifically target senior executives or those in finance roles. (This is sometimes known as whale phishing.)  Itโ€™s why itโ€™s even more important in todayโ€™s climate to ensure that senior staff in your organisation know not just how to spot BEC, but also that they know what to do if a link in a phishing email is accidentally clicked.

A typical BEC occurs when a criminal hacks a work email account and tricks staff into either moving money or parting with valuable or sensitive data.

Unlike phishing emails, which are indiscriminately sent in their millions, BEC emails are targeted to specific individuals within organisations. It could be an invoice from a third-party supplier you used last year, or an email that references a conversation from an already existing email chain.

Some may come from a legitimate employee account that has been hacked, and so would sail right through a standard email spam filter.

The NCSCโ€™s guidance on protecting against BEC is comprehensive. Hereโ€™s a quick snapshot:

  • If you think youโ€™ve been scammed into making a fraud payment, ring your bank directly using the phone number on their official website. You should also contact your IT department and report it as soon as possible, and report the incident to Action Fraud on 0300 1234 2040.
  • Always scrutinise any email that asks for payment to a specific account. Do you recognise the senderโ€™s email address? If in doubt, always ring them to double-check.
  • Never use the links, phone numbers or addresses in an email which asks you to make a payment or share sensitive data. Always check contact details on their official website.
  • Itโ€™s really important that organisations encourage staff to report phishing emails and provide up-to-date cyber security training.

Weโ€™ve written several useful posts on phishing and similar attacks:

What is Vishing?

10 Phishing Email Examples And Why We Know Theyโ€™re Fake

How to Spot a Phishing Email

Other vulnerabilities

AOVPN patches from Microsoft

Securing against vulnerable Windows boot managers

New emergency security update for Chrome

GitLab patch for high-severity-flaw



Stay up to date with IT Industry news

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

In other news

December 4, 2023

A Haven of Hope

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram