2 min read

Is UK NHS jinxed or does it just have a weak information protection policy?

Răzvan LIVINTZ

June 21, 2011

Promo Protect all your devices, without slowing them down.
Free 30-day trial
Is UK NHS jinxed or does it just have a weak information protection policy?

 

p { margin-bottom: 0.21cm; }a.western:link { }a.ctl:link { }

It seems that the National Health Service has turned (again) into some sort of “black sheep” of data safeguarding. Following the 2009 Conficker infection spike, last year's Qakbot offensive, and the recent attack of the Lulz Security hacker group, another security breach – this time several stolen laptops, of which one is supposed to hold details of a bit over 8 million patients – rounds up the series of incidents endangering the medical records this public organization stores.

Without entering into a debate about how these things actually happened and who is to be held responsible – most likely these are the details that an official investigation should reveal – I think it is important to see why this incident may have happened and what consequences it has.

At a closer look, the main issue here is, probably, a weak computer use and data protection policy. Conficker spread through a few major vulnerabilities: unpatched OSs, unprotected systems with the Autoplay feature enabled (for more details, see this whitepaper). In its turn, the Quakbot family of worms disseminated through network shares, removable drives and poisoned Web pages, being able to steal the user names and passwords to different services, as well as to capture any information a user types in a Web browser (see a detailed description here). The attack carried out by hackers a few weeks ago proved that administrator passwords are also easy to get, while the current incident shows that the physical tier of defense is quite loose (not to mention the lack of encryption on a system with such a “delicate payload”).

To put it differently, I see here a list of facts and events that tells me the following: chances are that the OSs running on several machines were unpatched and, probably, they weren’t running up-to-date security solutions; the target organization’s staff presumably could browse freely whatever Internet page they wanted and they could connect almost any device to any terminal in the network; last but not least, it is also very much likely that laptops weren’t closely monitored or secured with at least some cheap cables.

What are the consequences of this state of facts? According to this blog post – the Parliamentary Network, the Royal Navy, and NHS weren’t the only public organizations in the UK or in the world to be hit by Conficker two years ago. Nor were they the only victims of Qakbot, which also invaded the Massachusetts Executive Office of Labor and Workforce Development in the US, for instance (see details here). As for hacking attempts, the recent attacks on the US Senate, FBI, CIA and other organizations speak for themselves. Bottom line, in all likelihood, the compromised networks/servers/systems or the leaked data grants access – one way or another – to highly classified information or to people in key-positions who – again, one way or another – could have access to such data. Luckily, so far no one thought of selling or of exploiting these details, respectively of blackmailing these people. But, to quote Alice, “what if”?

 

Safe surfing everybody!

 

All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.

tags


Author


Răzvan LIVINTZ

I rediscovered "all that technical jazz" with the E-Threat Analysis Team at Bitdefender, the creator of one of the industry's most effective lines of internationally certified security software.

View all posts

You might also like

Bookmarks


loader