FutureScot
Cyber

‘Human error’ caused by phishing email likely source of SEPA cyberattack

SEPA/Supplied.

The cyberattack that downed systems for the Scottish Environment Protection Agency was likely caused by ‘human error’ as a result of a member of staff opening a phishing email.

Stephen Boyle, the Auditor General, pinpointed the source of the “sophisticated” ransomware incident on December 24, 2020, at a public audit committee meeting at the Scottish Parliament.

He described how 1.2 gigabytes of SEPA’s data – including underlying financial records – was “encrypted, stolen or lost”, and that backups were also rendered inaccessible by the hackers.

The data loss is still impacting the organisation, he told MSPs, which is why an official external audit by Grant Thornton could only issue a ‘disclaimer of opinion’ on accounts for 2020/21.

Boyle said: “SEPA had to recreate accounting records from bank and Her Majesty’s Revenue and Customs records. That made it difficult for the auditor to gain sufficient evidence to substantiate about £42 million of income from contracts.

“As a result, the auditor, Grant Thornton, has issued a disclaimer of its audit opinion, which is an unusual choice for an auditor to make. SEPA was able to prioritise and deliver some of its critical services within 24 hours of the attack. However, more than 12 months on from the attack, it continues to rebuild and reinstate its systems. The full financial impact of the attack is not yet known. Therefore, SEPA will continue to face financial and operational challenges in the years to come.”

Discussing the forensics of the attack, which is suspected to have been carried out by the Russia-based ‘Conti’ serious and organised ransomware crime group, Boyle said: “As we set out in the report, the general consensus is that the route into SEPA’s systems was through a phishing incident or attack. Committee members will be aware that that involves an email—masquerading as a genuine email—that contains a link; typically, a member of staff clicks on the link, which sets off a chain of events through which virus ransomware gets into systems. Unfortunately, that means that it is likely that an element of human error allowed the attack to have a route into SEPA’s systems.”

Boyle however said that SEPA was regarded as “well-prepared” and had a high level of “cyber awareness”, providing training for staff and tested its systems. But he said that can only take organisations so far, as has been demonstrated by recent cyberattacks on the likes of the Irish health service and the Foreign Office. He added: “If there is determined criminal intent, any organisation can be vulnerable to a cyberattack.”

SEPA is in the process of rebuilding its systems and has accepted 44 recommendations made by external auditors last year. According to Joanne Brown of Grant Thornton, around half of those have now been implemented with the remainder on track to be completed by the end of March. However she said a couple of the recommendations requiring additional investment and priority “might slip” beyond March 31 and that SEPA was in discussions about those with the Scottish Government.

One of the primary concerns remains the audit trail for SEPA finances and Boyle pointed out that SEPA’s financial strategy had identified “up to £17.9 million of vulnerability and variability in the longer term, to 2024”.

Going forward, MSPs raised concerns about the implications of the cyberattack for other public bodies in Scotland. Morag Campsie, senior manager at Audit Scotland, pointed to increased “cyberawareness” and training for public sector staff, tried and tested cyber incident plans, network segmentation, authentication and user access and a “collaborative effort” between government agencies.

She added: “The Scottish Government intends to bring in a central collaborative function, to ensure that all resources and technical expertise are pooled. The public sector has a number of organisations with different skills and of different sizes, with different resources available to them. There is a role for the Scottish Government to ensure that organisations can go to a centralised function to get information, share intelligence and make use of resources so that they are as prepared as possible and can respond quickly. We will continue to monitor the implementation of those arrangements.”

Related posts

New IoT law will protect ‘millions of internet-connected household devices’ from cyber attack, says Minister

Kevin O'Sullivan
January 28, 2020

Cloud service provider adds cybersecurity layer to provide ‘proactive protection’ against threats

Kevin O'Sullivan
September 2, 2022

Cyber and Fraud Centre – Scotland leads call for new board members

Kevin O'Sullivan
March 8, 2023
Exit mobile version