Outsourcing giant Serco hit by ransomware attack
Cyber criminals deployed the Babuk ransomware to encrypt more than 1TB of data belonging to the firm behind NHS Test and Trace
The outsourcing firm behind NHS Test and Trace has confirmed that it was targeted by cyber criminals operating the newly-discovered Babuk ransomware.
Hampshire-based Serco manages over 500 contracts worldwide, operating in sectors such as health, transport, justice, immigration, defence, and citizens services.
If it had, it would add to a growing number of incidents that have affected the system since its launch in May of last year. Between late October and early November 2020, it suffered two software glitches in one week, with more than 7,000 people given the wrong dates for self-isolation. Prior to that, an Excel technical issue led to a delay in reporting 15,841 positive COVID-19 cases.
Speaking to Sky News, Serco spokesperson Marcus Deville said there had been "no impact on UK business" and that the attack had only impacted the company's mainland European operations, which were "completely isolated" from those in the UK.
The publication also found that the cyber criminals had used the Babuk ransomware in the attack, which had only gained notoriety in the last few weeks, with little information available.
Ransomware resiliency: The risks associated with an attack and the reward of recovery planning
An overview of the history of ransomware, its potential impact, and best practices to protect IT systemsDownload now
According to an advisory published last month by NHS Digital, as the Babuk Loader is deployed, it attempts to “terminate various security and recovery services as well as database, browser and email programs”.
“It then encrypts all non-system files on local and network drives using a ChaCha8 implementation, the keys for which are then encrypted using a custom elliptic-curve Diffie-Hellman implementation thought to be based on several components published by the US' National Institute of Standards and Technology.”
Kaspersky principal security researcher David Emm told IT Pro that Babuk is a "fairly new ransomware".
"Whilst reports have suggested that the coding of the malware isn’t very sophisticated, the way the encryption is implemented means that victims can’t decrypt files for themselves," he added.
"It’s also unclear what the attack vector is in this case, although such attacks typically employ social engineering – i.e. tricking staff into doing something that compromises security, such as clicking on an attachment or link in a message.
"This is why developing an in-house security awareness programme is so vital, to ensure that staff understand the tricks cybercriminals use and know what they can do to avoid falling victim to them," said Emm.
According to the ransom note addressed to Serco, the cyber criminals had been "surfing inside [Serco’s] network for about three weeks and copied more than 1TB of your data”. According to Sky News, the hackers also threatened the company with "consequences" if it wouldn’t cooperate "to resolve this situation", warning of risks including falling stock value.
"Your partners such as NATO, or Belgian Army or anyone else won't be happy that their secret documents are in free access in the internet,” it added.
However, it’s currently unknown what exact documents were stolen by the criminals.
IT Pro has contacted Serco for comment and will update this story when more information is available.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download