• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Scottish Agency Still Recovering from 2020 Ransomware Attack

You are here: Home / General Cyber Security News / Scottish Agency Still Recovering from 2020 Ransomware Attack
February 2, 2022

A ransomware attack on a Scottish regulator in 2020 continues to appreciably influence functions, with the genuine price tag of the incident however unknown, an audit has observed.

The double extortion attack hit the Scottish Setting Security Company (SEPA) on Xmas Eve 2020, forcing IT companies offline.

In accordance to a new report from Audit Scotland, the first attack vector seems to have been a phishing email, though it is nevertheless not 100% clear.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In spite of next finest observe backup rules, with one particular copy saved offline, the “sophisticated mother nature of the attack” intended on-line copies ended up immediately focused, and there was no way of accessing historic data immediately, the shelling out watchdog claimed.

As a result, the “majority” of SEPA’s information was encrypted, stolen or lost.

Regardless of claiming the agency had a “high” degree of cyber-maturity, impartial testimonials considering the fact that the attack have also produced 44 suggestions for maximizing the agency’s cyber-readiness and resilience.

According to Audit Scotland, it will be specifically alarming to Scottish taxpayers that more than a yr on from the attack, the company is nevertheless reinstating some of its techniques.

The auditor took the unusual action of issuing a “disclaimer of opinion” on SEPA’s yearly accounts for 2020/21, declaring it couldn’t entry sufficient evidence to substantiate £42m of earnings from contracts.

The agency continue to does not know the total money impact of the cyber-attack, though it has previously been compelled to compose off over £2m in negative money owed simply because of documents missing to the incident.

“Based on management forecasts during the year, the Scottish Federal government gave SEPA authority to overspend by £2.5m to protect the influence of Covid19 and the cyber-attack if necessary,” the report claimed.

“SEPA recognizes that the cyber-attack has increased the medium to for a longer time-term fiscal pressures on the group. Its economic strategy 2020-24 experienced presently recognized probable variability in future revenue and expenditure streams of up to £17.9m as a worst-situation situation.”


Some pieces of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «dozens of security flaws discovered in uefi firmware used by Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors
Next Post: Ninety Percent of Security Leaders Warn of Skills Shortage Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Ugandan Writers Charged with Cyber Stalking President
  • Russian Hackers Allegedly Compromise Ukrainian News Sites, Displaying ‘Z’ Symbol
  • A Third of Malicious Logins Originate in Nigeria
  • Open source dev attacked for spreading data-wiping ‘protestware’
  • Sandworm APT Hunts for ASUS Routers with Cyclops Blink Botnet
  • Arkansas Sues Health System for Abandoning Patient Files
  • Netflix to Charge Password Sharers
  • Hackers Target Bank Networks with new Rootkit to Steal Money from ATM Machines
  • Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops
  • Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware

Copyright © TheCyberSecurity.News, All Rights Reserved.