Sunday Star-Times

Your money or your life

Ministry of Health decided it couldn’t afford the cybersecur­ity that might have prevented the attack on the Waikato DHB. Dileepa Fonseka reports.

- Dileepa Fonseka reports,

Ministry of Health decided it couldn’t afford the cybersecur­ity that might have prevented the ransomware attack on the Waikato DHB.

Revelation­s another DHB “was having their external firewall probed millions of times a week by Russia”.

The Ministry of Health abandoned an effort to secure all district health board computer systems, citing budget constraint­s. The Government also has not followed through on its Cyber Security Strategy 2019 which promised annual reports around cybersecur­ity breaches.

National Party health spokesman Shane Reti says the Government is not giving cybersecur­ity issues the urgent attention they deserve.

The Sunday Star-Times has seen messages between IT industry vendors showing high-ranked Ministry of Health technology personnel discussing a more advanced cybersecur­ity system with the industry in 2019. Conversati­ons ended because the department said it had no approved budget to pay for the proposed system.

The plan would have seen a single system solution purchased by the ministry and then licensed out to different district health boards (DHBs). The push seems to have been prompted by a 2017 cyberattac­k on the Britain’s National Health service.

In response to queries about these communicat­ions, ministry deputy director-general of data and digital, Shayne Hunter, replied with a written statement saying no security software can provide 100 per cent protection against cyberattac­k, and both the ministry and health boards are constantly ‘‘undertakin­g steps to protect against new and emerging threats’’.

He notes ‘‘enterprise security protection software’’, of the type being talked about are in place at a number of different health organisati­ons, but the ministry does not publicly disclose security tools and technologi­es.

In a presentati­on to a Health Informatic­s NZ conference in Hamilton in 2019, Hunter allegedly pledged to the health IT industry that the ministry would put money into a sector-wide cybersecur­ity system.

Meanwhile, key parts of the Government’s cybersecur­ity strategy have barely been implemente­d even though it was published two years ago. Promised measures included an action plan and an annual report.

The minister responsibl­e for the cybersecur­ity strategy, Kris Faafoi, left the role in November last year.

His successor, David Clark, admits no annual cybersecur­ity report from the 2019 strategy document was ever produced. However, he promises a report will be produced for the 2022 financial year.

‘‘Implementa­tion of some initiative­s under the cybersecur­ity strategy were slowed or deferred as a result of the Covid-19 pandemic.’’

Health Minister Andrew Little says he does not know what cybersecur­ity discussion­s ministry officials had back in November 2019.

However, he believes the ministry does have an ‘‘IT leadership role’’. A future review into the Waikato District Health Board hack will explore what support it offered Waikato in terms of cybersecur­ity, and whether the board took it.

‘‘I’m not familiar with what happened 18 months ago, what I do know is that last week’s Budget contains specific funding for new IT platforms for the health sector and my expectatio­n is that security will be chief amongst the features of new systems that are installed across our health system.’’

Sophos principal research scientist Chester Wisniewski says one IT product discussed by the ministry in 2019, Crowdstrik­e, was expensive compared to other premium products but could have helped authoritie­s detect the infiltrati­on before hackers got full control of Waikato DHB’s systems.

‘‘It’s got a very good reputation, and in the hands of a capable person, is a really effective way of detecting and responding to an incident.’’

Wisniewski’s company produces a similar cybersecur­ity product to the one discussed between officials and the industry.

He says products like these, which go beyond typical anti-virus and firewall measures, are needed to repel attacks against institutio­ns like hospitals because the nature of cyberattac­ks has changed over the past five years and many are now ‘‘human operated’’.

‘‘Historical­ly the only time you really consistent­ly faced human adversarie­s were if you were in finance, all the big banks, you were in government, or you were in defence,’’ Wisniewski says.

‘‘Those groups were wellpositi­oned to be ready for human attackers because they had been doing it for years. Hospitals had never seen a human attacker.’’

The danger to smaller institutio­ns, like hospitals, once mainly consisted of largely automated computer programmes which are easier for antivirus programmes and firewalls to detect. And it was difficult to avoid detection by authoritie­s when collecting the money.

But now, ransom payments can be made under the radar using cryptocurr­ency, making humanopera­ted infiltrati­on more profitable.

All of which means you now need more than just an antivirus or a firewall.

‘‘You need a modern enough tool that understand­s how to analyse the behaviour because there is no code involved,’’ Wisniewski says.

‘‘It’s a human, right there, there at the keyboard, doing things the same way your legitimate IT administra­tor would be doing those things in the network.’’

Waikato DHB chief executive Kevin Snee has been quoted as saying their working hypothesis is that a network breach came via an individual slipping up and opening up a piece of malware in their email inbox.

Theta head of cybersecur­ity Jeremy Jones says it is not common for these kinds of breaches to happen this way because an email has to go through a number of stages and checks before a user even touches it.

Modern ‘‘adversarie­s’’ usually take advantage of some vulnerabil­ity in a connection which allows remote access from the outside world, like those needed to allow employees to work from home.

Wisniewski says while user precaution­s and good cyber hygiene around email are important, someone is always likely to slip up. And even if they don’t, attackers can discover other flaws which leave your system open to ‘‘full domain compromise’’.

So you need to have software and personnel that are up to the task of detecting these attackers. In cyber-parlance they are often referred to as ‘‘adversarie­s’’, once they are actually inside your system.

And it is easiest to detect them in those first few days after they have broken in.

Imagine a burglar who breaks into a house in the dead of night. Until they figure out where everything is they are potentiall­y making a lot of noise as they bump into the furniture.

Wisniewski says Waikato District Health Board IT personnel would have seen these attackers if they were looking, or had the tools to look.

‘‘They [the adversarie­s] don’t necessaril­y know what kind of security software you have. They don’t know if it’s Crowdstrik­e or if it’s Sophos or if it’s McAfee. They don’t really know what they’re

‘‘Any offer to the ministry is only as good as the ministry’s ability to centrally fund it.’’ Jeremy Jones IT consultanc­y Theta

up against, and so they’re kind of clumsy at the start, and they’re usually setting off some alarms.’’

While all of this is going on, your more traditiona­l ‘‘old school’’ IT expert might see a bunch of alerts and dismiss them as evidence a firewall or anti-virus is working.

‘‘Modern security people go ‘that’s the alarm being set off by somebody who just broke in, I need to go investigat­e’.

‘‘The ones that fail, in the end, are the ones that didn’t know or didn’t understand the severity of the alerts they were getting.’’

On average these kinds of attackers are in these systems for 11 days before they send through a ransom note, but Wisniewski says he knows of cases where attackers have been in the system for up to 400 days.

There has been rising concern in recent months about the growing frequency of cybersecur­ity lapses at major institutio­ns in New Zealand. Cyberattac­ks caused major issues at both NZX and the Reserve Bank. Those attacks appear less sophistica­ted than what Waikato DHB experience­d recently.

Controvers­ially though, the full details of the NZX attack were never released to the public.

Jones believes authoritie­s and companies need to release more details about hacks like these so others can protect themselves.

He spent 17 years in the Royal Air Force in a variety of defensive and offensive cybersecur­ity roles. These included a stint as head of data security at Nato’s largest data centre, in Norway, roles protecting military networks in places like Afghanista­n, and cyber warfare-related initiative­s for the British government.

Jones says he has sympathy for the situation that eventually led to the ministry not following through on commitment­s to pay for a cybersecur­ity system across all health boards.

The ministry could only work with the budget it had, he says. Even if it went ahead and bought a cybersecur­ity product with the intention of licensing it to all health boards it could not have forced them to take it on.

‘‘Any offer to the ministry is only as good as the ministry’s ability to centrally fund it.

‘‘Unfortunat­ely for the ministry, at the time we had this conversati­on there were no centralise­d funds available for this.

‘‘Even if there were, there’s a reasonable chance some of the DHBs wouldn’t have taken it up anyway.’’

Reti says cybersecur­ity should be led by central government rather than health boards, who are just not equipped to take on these kinds of responsibi­lities.

Over the past few years he has been asking regular cybersecur­ity questions of the country’s health boards. The answers he has received don’t seem to have boosted his confidence in their cybersecur­ity capabiliti­es.

‘‘About three years ago I pointed out that Hawke’s Bay DHB was having their external firewall probed millions of times a week by Russia.

‘‘There were some DHBs, who, their firewall was being probed so much the log was filling up over days.

‘‘Rather than figure out what they should do about it, they just turned the log off.’’

He believes the cost of cybersecur­ity software which helps repel an attack is ultimately worth it, because the cost of prevention is much lower than the disruption caused by a successful cyberattac­k in an area like healthcare. Cybersecur­ity expert Paula Gair, who runs deriskme.com, says cyber spending is always an issue because there is never enough money available for it.

She also believes a lack of centralise­d government resourcing and action are an issue when it comes to cybersecur­ity here.

On Thursday more details came to light about the attack, including allegation­s a piece of ransomware called ‘‘Zeppelin’’ had been found on Waikato DHB computers. The software encrypts all data on a system, then whichever group uses it demands ransom and offers up a decryption key for the data.

Despite this method being used it is also likely that the data was stolen before it was encrypted by Zeppelin. This way the data can be sold on if Waikato DHB does not pay.

If the informatio­n is sold on, it could lead to identity theft or individual patients and staff being extorted.

Gair says this form of ‘‘double extortion’’ is common with these kinds of attacks.

Zeppelin ransomware first surfaced in 2019 and was used to target hospitals, but has received a new lease of life thanks to an update which makes it much harder to detect.

Wisniewski says quite a few ransomware groups have sworn off targeting hospitals while the Covid19 epidemic rages.

Some, like a group who launched an attack on Ireland’s national health service, have not.

However, even if Zeppelin ransomware is officially confirmed as having been found on health board servers we still won’t know who was behind the Waikato cyberattac­k, or how they actually got into the system, because of the complicate­d shadow marketplac­e adversarie­s operate in.

Almost every aspect of a cyberattac­k can be sold, contracted out, or monetised in some way. The group which discovers the flaw, or breaks into the system, can sell access to another group who specialise in threatenin­g ransom or stealing data. With ransom off the table this leaves Waikato DHB with the task of rebuilding its systems from backups. This process could take anywhere up to a year, especially if those backups aren’t up to scratch.

Reti says one of the questions he asked of Waikato DHB at select committee was how often it tested those backups.

‘‘They said they hadn’t backed up in the past year, across the whole domain.’’

 ??  ??
 ??  ??
 ??  ??
 ??  ??
 ??  ??
 ?? ROBERT KITCHIN/ STUFF (above) ?? Waikato Hospital has endured a crippling ransomware attack. Health Minister Andrew Little says last week’s Budget included specific funding for IT in the health sector.
ROBERT KITCHIN/ STUFF (above) Waikato Hospital has endured a crippling ransomware attack. Health Minister Andrew Little says last week’s Budget included specific funding for IT in the health sector.
 ?? TOM LEE/STUFF ?? Waikato DHB chief executive Kevin Snee believes the breach occurred through malware in an email.
TOM LEE/STUFF Waikato DHB chief executive Kevin Snee believes the breach occurred through malware in an email.

Newspapers in English

Newspapers from New Zealand