Industry News

Scottish environmental agency still struggling after Christmas Eve ransomware attack

Scottish environmental agency still struggling after Christmas Eve ransomware attack
  • Cybercriminals struck in early hours of Christmas Eve
  • Organisation says that no public funds will be used to pay ransom

The Scottish Environment Protection Agency (SEPA) has confirmed that it is continuing to respond to an ongoing ransomware attack that has encrypted files, disrupted systems and seen 1.2 GB of data stolen by cybercriminals.

SEPA says it was hit by ransomware at 00:01 on Christmas Eve, December 24 2020 – timing presumably chosen deliberately by the attackers in an attempt to take advantage of what would – within many organisations – be a time when there are fewer staff working.

The organisation’s contact centre, internal systems, processes and internal communications have been impacted by the attack, and it is anticipated that systems will continue to be affected for some time as they are rebuilt from scratch. In the immediate aftermath of the attack, SEPA advised those who needed to report urgent pollution issues to use Twitter or Facebook.

Scottish police and the UK’s National Cyber Security Centre (NCSC) have been informed of the security breach, and are providing assistance.

In an interview with BBC Radio Scotland, SEPA’s chief executive Terry A’Hearn said that the organisation will “not be using public funds to pay a ransom to criminals.”

My impression from the interview is that Terry A’Hearn has a cool head on his shoulders, and I wish him well dealing with what no head of an organisation ever wants to face.

Although it’s obviously not ideal that any data has been stolen from SEPA’s systems by the cybercriminals, it’s worth noting that 1.2GB is not a huge amount.

SEPA describes it as “equivalent to a small fraction of the contents of an average laptop hard drive.”

Determining precisely what information has been stolen, its sensitivity, and who might be impacted by the data breach will be an important part of the response.

In addition it will be important to ascertain how the ransomware attackers might have breached SEPA’s systems and what lessons can be learnt to harden the organisation’s security in future.

SEPA is reassuring the public that priority regulatory, monitoring, flood forecasting and warning services are adapting to the incident, and are continuing to operate.

About the author

Graham CLULEY

Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats.

Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the "10 Greatest Britons in IT History" for his contribution as a leading authority in internet security.