Defence Forces deployed ‘ethical hackers’ to fight back against massive HSE cyber attack | #computerhacking | #hacking


THE DEFENCE FORCES deployed the skills of so-called ‘ethical hackers’ in their bid to fight back against the HSE cyber attack of May this year. 

Ethical hackers are trained to effectively think like a cyber criminal and highlight flaws in a system’s structure. They’re typically tasked with highlighting weaknesses that need to be addressed in IT systems. 

Captain Steve Keane, an Officer in the Computer Response Team (CRT) of the Defence Forces Communications and Information Services Corps (CIS), has revealed for the first time the detailed work of the unit during the HSE crisis, which is still not yet fully resolved. 

In a podcast by the Defence Forces, Keane revealed how his unit were contacted immediately by the HSE and how they set about trying to find the hackers and analyse the virus.

“We had personnel who were analysing the malware – what does it do?” he said.

“They were also hunting for the threat actor, the adversary, on the network. [We were asking] is the person there? Is there a level of persistence where the network is brought back up and is there something nasty hiding in the corner and undoes all the work?”

Keane said that there were also military experts involved in testing a decryptor – a programme designed to retrieve infected data on HSE computers. 

He said that his team were working on the project with the health service “up until extremely recently”.

According to the latest update from the HSE, 82% of systems are now decrypted. The attack continues to affect various aspects of the service, but according to the latest official update on the ransomware attack there is currently “no evidence that large amounts of patient or staff data has been published online or sold to criminals involved in fraud”.

As the health system buckled under the pressure of the initial attack, Keane said the Defence Forces sprung into action immediately. 

While Keane didn’t comment on any specific measures, sources have told The Journal that soldiers attached to CIS were sent to hospitals and HSE offices to decrypt computers on site.

The captain said: “The Defence Forces, due to its flexible nature, were able to deploy very quickly. We were able to deploy nationally to a lot of locations in every corner of the country due to the amount of barracks and their locations so we were very flexible. 

“It was great to see all the different companies, all the different entities there. They were at the briefings and everyone saying ‘what can we do?’. It was a very positive experience.”

As previously reported by The Journal, significant questions have been raised by TDs and military sources about the impact of funding cuts on the CIS Corps.

Keane did not speak about the funding shortfall in the Defence Forces affecting its ability to respond but defended his unit’s capability.  

“The quality of people we have, we don’t have a lot of personnel – as with every organisation you are crying out for more but the people we do have, the skills they have, are exceptional.”

#Open journalism

No news is bad news
Support The Journal

Your contributions will help us continue
to deliver the stories that are important to you

Support us now

Keane was asked during the interview what was the future for the CIS Corps and he said that the need for the unit was only going to grow. 

“It is only going to get bigger, it has to get bigger. It is recognised by the European Defence Agency, by NATO, by any credible force that the nature of conflict has changed.

Using a term often deployed by military experts to refer to traditional warfare he said: “You don’t just have kinetic conflict, from now on, it will be proceeded by a cyber effect.”

window.on_front = false; window.authenticator=""; window.login_expires = 1784535939; window.users_token = '';

window.fbAsyncInit = function() { FB.init({appId: "116141121768215", status: true, cookie: true, xfbml: true}); if(typeof sync_with_server != 'undefined') { sync_with_server(); } }; (function(d){ var js, id = 'facebook-jssdk'; if (d.getElementById(id)) {return;} js = d.createElement('script'); js.id = id; js.async = true; js.src = "https://connect.facebook.net/en_US/all.js"; d.getElementsByTagName('head')[0].appendChild(js); }(document)); window.email_permission = false; window.share_permission = false; var jrnl_social_window = null; function jrnl_social_login(service, submit_comment, callback) { var link = ''; if(service == 'twitter') { link = "https://www.thejournal.ie/utils/login/twitter/?"; if(submit_comment) { link = link + "&comment=1"; } else if(callback && callback.length > 0 ) { link = link + "?cb=" + callback; } } else if(service == 'facebook') { // Facebook link is a bit messier - need to bounce through popup link = "https://www.thejournal.ie/utils/login/facebook/?url=https%3A%2F%2Fwww.facebook.com%2Fdialog%2Foauth%3Fdisplay%3Dpopup%26client_id%3D116141121768215%26scope%3D" + get_fb_perm_string() + "%26redirect_uri%3Dhttps%3A%2F%2Fwww.thejournal.ie%2Futils%2Flogin%2Ffacebook%2F"; // Are we submitting after log-in? if(submit_comment) { link = link + "?comment=1"; } else if(callback && callback.length > 0 ) { link = link + "?cb=" + callback; } }

if ( jrnl_social_window != null && !jrnl_social_window.closed ) jrnl_social_window.close();

jrnl_social_window = window.open( link, 'jrnl_social_window', 'status,scrollbars,location,resizable,width=600,height=350' ) jrnl_social_window.focus();

return false; }



Original Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

fifty three + = 63