Call us now Email a specialist
+353 1 6420100 | info@ward.ie
  • Resources
  • Blogs
  • Insights

    The next step on the road to GDPR compliance!

    [powr-countdown-timer id=5137ae2d_1491490870751]

    There are organisations that despite all of the coverage that GDPR is getting still do not understand that GDPR applies to them. Unless you are a one-man band at the very least your organisation will be processing the personal data of your employees.  The personal data of your employees is afforded the same protection under GDPR as the personal data of any other data subject. In processing the personal data of your employees you need to ensure that you are processing it in accordance with the principles of data protection (Article 5). I could fill pages on the application of the principles relating to the processing of personal data as it relates to employees but my brief is to  be brief so we need to consider the issue that crops up the most in this area – the legal basis for processing personal data of employees.
    For some reason, typically historically,  a lot of organisations use consent as the legal grounds for processing personal data. The employment contract includes a clause permitting the processing of the personal data of an employee in any way the organisation sees fit – sorted! Not so quick – one of the ingredients of consent is that consent must be freely given. Due to the imbalance of power in the relationship between an employee and an employer this test is very difficult to satisfy. Therefore, an organisation really needs to be looking at alternative grounds (see Article 6) for lawfully processing the personal data of its employees. Realistically processing on the grounds that it is necessary for the performance of the contract between the employer and the employee and/or for the purposes of the legitimate interests of the employer are probably the most relevant.
    If your organisation looks to rely on the legitimate interests ground then remember that you have to balance the legitimate interest of your organisation against the fundamental rights and freedoms of the data subject. It is all about proportionality. All employees have a right to privacy and you need to be balancing that right against the requirements of the organisation. The Article 29 Working Party (this is where the supervisory authorities of the EU come together and issue an opinion on an area of data protection legislation) has just issued an opinion on data processing in the workplace. I would suggest it is a must read for HR managers– you might be surprised by how the Article 29 Working Party views something that is accepted as the norm in your organisation! The document is very readable. So my advice –  go get a coffee and get reading!
    If you require assistance in relation to getting your organisation GDPR ready contact gdpr@ward.ie.

    Insights

    Security Advisory Notice – Petya Ransomware

    A number of high-profile ransomware attacks have been reported globally starting June 27th. With the recent global Ransomware outbreak of May 12th still fresh in minds, it is ever more clear that decisive and responsive action is needed to protect organisations.
    Similar to the recent Wannacry outbreak, this variant of ransomware ‘Petya’ is causing widespread disruption; reports indicate that the outbreak originated in Ukraine, with the state’s government, and electricity grid among the first confirmed targets. While initial victims centred around Ukraine, the Dutch shipping company Maersk has confirmed it was targeted, with its Irish operations reportedly hit; more organisations are expected to be identified as victims in the coming days.

    The media have dubbed this outbreak ‘GoldenEye.’

    How Does ‘Petya’ Work?

    Similar to Wannacry, Petya is designed to exploit the known Microsoft Samba vulnerability (MS-17-010) using EternalBlue, the NSA developed attack code which was published as part of the Shadow Brokers’ leak. This vulnerability, which has been rated as Critical by Microsoft, was remediated as part of updates released on March 14th of this year.

    However, Petya is demonstrably more sophisticated than Wannacry. In addition to using the EternalBlue exploit, Petya can spread laterally using Windows Management Instrumentation Command-Line (WMIC) and PsExec, a remote command tool from Microsoft, to systems which have been patched but are on connected networks. 3 This multi-threaded approach, using lateral attack vectors highlights that patching alone is not sufficient to protect organisations.

    The Petya variant of ransomware is designed to encrypt a filesystem’s Master File Table (MFT), rather than encrypting files or shared drives within an organisation. This means the operating system cannot then locate files. Petya installs itself to the disk’s master boot record (MBR) similar to a bootkit, before displaying a ransom page directing victims to send bitcoins for the release of their files. 2

    With previous versions of malware, the only potential loss is that of data. With Petya, the loss is greater – the entire system. 4

    How Do I Protect My Organisation?

    Ward Solutions recommend the following short term actions be taken to protect your organisation;

    • As per previous advisories, systems administrators are advised, if they haven’t already, to patch against the Microsoft Samba vulnerability which is known to affect the below Microsoft software;

    – Microsoft Windows Vista SP2
    – Windows Server 2008 R2 SP1 and SP2
    – Windows 7
    – Windows 8.1
    – Windows RT 8.1
    – Windows Server 2012 R2 and
    – Windows 10
    – Windows Server 2016

    Ward Solutions recommends that systems administrators immediately take action to patch against this Microsoft vulnerability if they haven’t already done so.

    Further details on this patch can be found on the Microsoft support site here: https://support.microsoft.com/en-sg/help/4013389/title

    • Keep your antivirus active and up to date and always update your AV software from valid sources. McAfee has released and extra.dat to include coverage for Petya. McAfee has also provided a range of known extensions which have been identified as affected. Further information can be found at the below McAfee advisory; https://kc.mcafee.com/corporate/index?page=content&id=KB89540
    • Ensure you have a reliable and well configured backup solution, keeping at least one of those backups offline
    • Ensure the minimum appropriate level of administrative privilege is allocated. This can assist in prohibiting propagation should your organisation be attacked
    • Block the following inbound TCP Ports 135, 445, 1024-1035
    • To stop the spread from the WMIC, administrators should block the file C:\Windows\perfc.dat from running.6 Additionally, there have been reports of a possible kill-switch, though successful use of the method has yet to be reported. PTSecurity researchers have reported that the ransomware checks if the C:\Windows\perfc file is present, and if it determines that the file is already present, the malware execution stops. PTSecurity is proposing that if the correctly named file is created in the given folder path, it may halt encryption, though this method has yet to be verified. 5
    • McAfee also recommends blocking the following file/folders; **\PSEXESVC.EXE and   C:\Windows\System32\Tasks\**. Blocking these will prevent the ransomware from creating the Windows Scheduler task it requires to force a restart of the system and can assist in preventing the replication of PsExec.6

    In the medium term, there are also a number of actions that organisations can take to protect themselves including;

    • Update email and SPAM filtering solutions to scan all emails and blocks malicious software from reaching end users.
    • Perform regular user awareness training and make sure the content is kept relevant. Include social engineering phishing exercises to get real-world measure of the effectiveness of the training and awareness on staff
    • Logical separate internal network segments such that users and servers are on different segments with appropriate policies to help stop the spread of malware through the network.
    • Implement a vulnerability management solution in tandem with a patch management solution, enabling you to pinpoint vulnerabilities and prioritise your patching.

    My Organisation is Infected, What Now?

    The first piece of advice is to not attempt to pay the ransom as Posteo, the email provider hosting the address where Petya victims are being directed, has shut down the account.7

    Secondly, as Petya only encrypts the Master File Table (MFT) after reboot, if you are aware that you have been infected (or are prompted with a ‘Check Disk’ message) and shut down the infected machine before reboot, you can potentially prevent the encryption. And, as Petya encrypts the MFT and not the files themselves, data recovery may be possible – though no successful recoveries have yet been reported.

    How Can Ward Help?

    For SOC Managed Service customers, we have been receiving IBM Threat Intel feeds, including Petya Indicators of Compromise, since June 27th, and will take any appropriate action accordingly.

    For Managed Service customers, the Ward Support team will be reviewing individual environments to ensure all recommendations are implemented.

    For all other customers, if you would like additional information or would like support in implementing preventative measures in your environment, please contact support@ward.ie or your account manager, as appropriate.

    Further reading:

    1http://www.bbc.com/news/technology-40416611
    2 https://labsblog.f-secure.com/2016/04/01/petya-disk-encrypting-ransomware/
    3 https://securityintelligence.com/petya-werent-expecting-this-ransomware-takes-systems-hostage-across-the-globe/
    4 https://blog.fortinet.com/2017/06/27/new-ransomware-follows-wannacry-exploits
    5 https://www.bleepingcomputer.com/news/security/email-provider-shuts-down-petya-inbox-preventing-victims-from-recovering-files/
    5 https://kc.mcafee.com/corporate/index?page=content&id=KB89540
    6 https://www.ptsecurity.com/ww-en/about/news/283096/
    7 https://www.wired.com/story/petya-ransomware-wannacry-mistakes/

    Insights

    Key steps to preventing a ransomware attack.

    How prepared are you for the next ransomware attack?

    Ward Solutions presents: Key steps to preventing a ransomware attack.

    When and where?

    Start: 3:00 PM, 04/07/2017
    End: 3:30 PM, 04/07/2017
    Place: http://bit.ly/Ransomwarewebinarward

    One-fifth of Irish businesses were held to ransom by cybercriminals in the past 12 months, according to the results of a recent survey that we conducted.
    Click here to view our latest Mapping Cyber Security Whitepaper.
    The survey was carried out among 170 senior IT professionals and decision makers in Ireland just prior to the recent WannaCry attacks, and highlights the scale of the ransomware issue in Ireland.

    We have more insights from the survey that we will detail out at our webinar on July 4th. So don’t forget to register here.

    Overview of the webinar:

    • How could ransomware attack be prevented?
    • What to do if you still haven’t experienced an attack?”
    • How Ward can help you?

    This webinar is going to help you understand ransomware from a larger perspective. Both our experts, Paul Hogan and Liz O’Neill come with an army background and now Paul, the Chief Technology Officer and Liz, Head of operations and response at Ward Solutions will help you have better clarity over the immensity of these kind of attacks and what exact precautions need to be undertaken.

    This will be an interactive discussion where we will take in questions during and after the webinar. So keep your questions ready and fill in your details below to register and we will send you the link to the webinar in the next few days.






      By providing the contact information above, I agree that Ward Solutions Limited may collect, use, disclose and retain my personal data, which I have provided in this form and share it with third party organisations through which Ward carries out it’s marketing further details of which can be accessed at our website www.ward.ie, for providing marketing material, in accordance with the Data Protection Acts 1998 – 2003 and our privacy/data protection policy (available at our website www.ward.ie).

      If you do not wish to receive this information please e-mail us at privacy@ward.ie.

      For more information on how to prevent ransomware, e-mail: preventingransomware@ward.ie