The Guardian (Charlottetown)

Saskatchew­an’s privacy czar blasts province’s handling of 2019 cyberattac­k

Kruzeniski fears residents’ data could be on sale ‘to the highest bidder’

- ZAK VESCERA

REGINA — On Dec. 20 2019, a Saskatchew­an Health Authority employee opened an email attachment that appeared to be from a job search company — inadverten­tly triggering one of the largest privacy breaches in the province’s history.

The attached Microsoft Word document was infested with malware that coursed through the employee’s tablet, up the attached USB cable and into their work station, where it proceeded to infect Saskatchew­an’s entire health system.

More than a year later, a report from Saskatchew­an’s privacy czar shows that eHealth, the government agency that stewards electronic records, failed to take steps to contain the breach when it began and that the health system was woefully unprepared for such an attack.

Informatio­n and Privacy Commission­er Ron Kruzeniski wrote that at least 547,145 files containing personal health informatio­n of Saskatchew­an residents were compromise­d, but that the true extent of the damage may never be known.

“This investigat­ion has troubled me in several ways,” Kruzeniski wrote in his 51-page report.

“I am troubled that any citizen of this province that reads this Report could unknowingl­y have their personal informatio­n or personal health informatio­n floating around the dark web right now for sale to the highest bidder. I am also troubled that at this moment citizen’s data could have been sold to fund criminal activity or purchased by the worst of humankind for nefarious purposes.”

Malware attacks are when hackers use infected files to gain access to data. In recent years, the digital saboteurs have been targeting health care systems, usually threatenin­g to sell residents’ personal informatio­n on the internet if government­s don’t pay what is demanded.

Such a demand was received by eHealth on January 5, 2020, asking for payment in Bitcoin — a type of digital cryptocurr­ency. That’s when the attackers used ransomware to block access to files across the health system. It was the first time officials learned of the attack.

“The final price depends on how fast you write to us,” reads part of the demand, as noted in Kruzeniski’s report.

When eHealth did not pay, hackers used ransomware to restrict access to more than 50 million health system files, essentiall­y holding them hostage. An original scan determined 5.5 million of those files contained personal health informatio­n, although a tool developed by eHealth identified just 547,145 that may have been infected. According to Kruzeniski, the real number was inconclusi­ve.

What is known is that between Dec. 20, 2019 and Jan. 5, 2020, approximat­ely 40 gigabytes of data was whisked away to three IP addresses: two in Germany and one in the Netherland­s. It is not known what is in them.

At the time, eHealth responded by gradually backing up its system, restoring copies of the informatio­n that was otherwise under lock and key. But Kruzeniski found critical opportunit­ies to contain the breach were missed.

One was on Dec. 23, when a threat analysis tool detected suspicious activity. The employee was alerted and told to change their password, but no closer followup was done.

“Asking an employee to change their password when there is a background threat is like changing the locks to your door while the burglar is still inside — it’s pointless,” Kruzeniski wrote.

More could have been done, eHealth acknowledg­ed, but the agency argued that the campaign was “very sophistica­ted” and that the type of malware had not been identified by global antivirus systems.

Kruzeniski’s investigat­ion also found more systemic issues, including a lack of sufficient security training for employees and long-held concerns about the state of eHealth’s security system. His investigat­ion was delayed, he wrote, by slow responses from affected agencies who did not provide him with timely data. He determined that the Saskatchew­an Health Authority, Ministry of Health and eHealth had failed to adequately notify Saskatchew­an people of the risk to their data and that eHealth’s had failed to protect the data of Saskatchew­an people.

He concluded his report with advice, including recommenda­tions that the government monitor the internet for at least five years in case compromise­d data surfaces. He also recommende­d that the SHA and the ministry provide identify theft protection to any individual whose data appears.

 ?? TROY FLEECE • POSTMEDIA NEWS ?? Saskatchew­an Informatio­n and Privacy Commission­er Ron Kruzeniski at his office in Regina. Kruzeniski is blind and is the chair of the CNIB’s national board of directors.
TROY FLEECE • POSTMEDIA NEWS Saskatchew­an Informatio­n and Privacy Commission­er Ron Kruzeniski at his office in Regina. Kruzeniski is blind and is the chair of the CNIB’s national board of directors.

Newspapers in English

Newspapers from Canada