Login

Register

Login

Register

Government didn’t report possible hack | #emailsecurity | #phishing | #ransomware | #cybersecurity | #infosecurity | #hacker


For three days in January, the Government thought it may have been the target of a malicious cyberattack, Marc Daalder reports.

When a wide range of government websites went down for 76 minutes on a Friday in mid-January, officials grew concerned it might have been the result of a massive hack.

For more than an hour on January 15, about 60 per cent of web addresses with a .govt.nz, .mil.nz, .parliament.nz or .health.nz domain name were affected by an outage of the Government’s Domain Name Service (DNS).

Some sites were unavailable for the duration of the outage, while others may have gone down partway through. Emails may also “have been delayed during all or part of the outage”, a spokesperson from the Department of Internal Affairs told Newsroom.

In June, Health Minister Andrew Little promised an inquiry into the Waikato DHB hack.

READ MORE:
* Why our centralised health body will need a greater focus on cybersecurity
* NZ stands with partners to censure China on cyberattacks
* Kaseya hack: Number of schools affected lower than expected, government says
* DHBs refuse to release information on cybersecurity systems

Among the websites which may have been affected were 79 private health organisations.

The following Monday, officials determined the outage was the result of a confluence of unfortunate events: a cyber-security test run by the Public Service Commission at the same time as business-as-usual maintenance and a new upgrade to a firewall meant to deter cyberattacks spiralled out of control, taking the entire DNS system down.

Iain McGregor/Stuff

Digital Economy and Communications Minister David Clark.

A “malicious attack was initially suspected”, according to a briefing to Digital Economy and Communications Minister David Clark, released under the Official Information Act. The Internal Affairs spokesperson was more circumspect, saying only that “during the outage and subsequent investigation, a malicious attack was one of a number of possible root causes considered”.

The outage and potential attack weren’t publicly notified in any way.

“In this case the outage was advised to government agencies in order that they advise their staff and customers as required in case of inconvenience,” the spokesperson said.

“There is no requirement to publicly notify this type of technical issue, and indeed until a cause is identified it can be prudent to limit detail in case of malicious intent.”

The DNS system is spread across five servers – two in Wellington, two in Auckland and one in Sydney – to protect against cyberattacks. All five servers were “overwhelmed” and taken offline by the outage. The Wellington and Sydney data centres restarted at 2.15pm on the same day, while the Auckland servers needed to be manually reset the next day.

Lynn Grieveson/Newsroom

An Internal Affairs spokesperson said government emails may also have been delayed during the 76-minute outage.

The briefing to Clark said officials “believe” the same test wouldn’t have the same effect again. However, they were looking into ways to communicate with other agencies and the public in the event of a future widespread email and web outage.

Officials also implied the event was well out of the norm. Hour-long outages for individual government websites were “rare but should be expected”. As a whole, the DNS system is expected to be up for 99.999 per cent of the time – allowing about five minutes of unavailability each year. There were no outages in the 11 months prior to January.

The January 15 event, therefore, saw an outage 15 times longer than the expected annual availability.



Original Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW