On 19/6/2024 08:04, Stephen Loosley wrote:
Court docs reveal shocking cause of Medibank breach
Health insurer was warned multiple times.
By Denham Sadler on Jun 18 2024 12:36 PM
https://ia.acs.org.au/article/2024/court-docs-reveal-shocking-cause-of-medibank-breach.html

My post on the privacy list is below.

[ Some clear information has emerged from the OAIC's action against Medibank, well-explained below.

[ Regrettably, even my esteemed UNSW colleague, Richard Buckland, hasn't gone the extra step and argued that OAIC must define baseline security requirements.

[ As it stands, each case will, like this one, have to be litigated at length, and survive barristers' endeavours to use the massively-loopholed Privacy Act to protect the guilty. Defining 2FA as a requirement of all organisations (subject to a couple of provisos, because the world's a complex place) should obviate that need.

[ The first test-case - to establish that the Federal Court accepts OAIC is operating within its powers - would result in consent judgments thereafter, because contesting a fine would just be pouring good money down the sink.

[ OAIC is negligent in not having long ago defined that baseline (and sorry about the repetition of citations):
https://privacy.org.au/Papers/OAIC-InfoSecy-1301.pdf   (2013)
http://www.rogerclarke.com/DV/OAIC-ISGuide-130104.pdf  (2013)
https://www.rogerclarke.com/EC/SSACS.html#App2         (2015)
https://privacy.org.au/wp-content/uploads/2021/04/OAIC-SecGuide-210311.pdf (2021)


Embedded comment:

> According to the OAIC report, in August 2022 an employee of a Medibank contractor saved his Medibank username and password to his personal internet browser profile on a work computer.
>
> When this worker then signed into his internet browser profile on his personal computer, these credentials were synced across.
>
> These credentials provided access to most, if not all, of Medibank’s systems.
>
> Threat actors then stole these credentials from the worker’s personal computer using a malware variant and used them to log into Medibank’s Microsoft Exchange server as a test, according to OAIC.

[ So a contractor sufficiently specialised in IT security to be provided with the keys to the castle failed to protect the data on their own devices against "a malware variant". A co-respondent may need to be drawn into the matter. That's at least contributory negligence. ]

___________________


The shocking cause of the Medibank breach has been revealed.

A lack of an “absolute bare minimum” cyber security requirement contributed to 
the devastating Medibank data breach, according to new court documents that 
also reveal the health insurer was aware of this “critical defect” for more 
than two years before the incident.

The Office of the Australian Information Commissioner (OAIC) has launched civil 
proceedings in the Federal Court against Medibank over the October 2022 data 
breach which saw the personal and highly sensitive information of 9.7 million 
current and former customers stolen and eventually posted on the dark web.

A document filed to court by the OAIC provides a brief overview of the case 
against Medibank, with the privacy watchdog alleging the company “seriously, 
further or alternatively repeatedly, interfered with the privacy of 
approximately 9.7 million individuals whose personal information it held” by 
failing to take reasonable steps to protect it, in breach of Australian law.

According to the OAIC, Medibank was “aware of serious deficiencies in its cyber 
security and information security framework” for at least 18 months before the 
breach.

First and foremost in these issues was the lack of multi-factor authentication, 
commonly regarded as one of the simplest and most basic measures to protect 
systems against cyber attacks and data breaches.

UNSW School of Computer Science and Engineering Professor in cybercrime Richard 
Buckland said the revelations in the report are “shocking” and that 
multi-factor authentication is a basic cyber mitigation measure.

“If all these assertions are true, it’s very sobering,” Buckland told 
Information Age.

“It’s the minimum thing people should be doing.

“The temptation is to find a worker and blame them – to say it’s human error.

“But really this was a company failure and a poor culture allowed these 
individual human errors to lead to catastrophic results.”

According to the OAIC report, in August 2022 an employee of a Medibank 
contractor saved his Medibank username and password to his personal internet 
browser profile on a work computer.

When this worker then signed into his internet browser profile on his personal 
computer, these credentials were synced across.

These credentials provided access to most, if not all, of Medibank’s systems.

Threat actors then stole these credentials from the worker’s personal computer 
using a malware variant and used them to log into Medibank’s Microsoft Exchange 
server as a test, according to OAIC.

Two weeks later, these credentials were used to log into Medibank’s Global 
Protect VPN solution, which it used to control remote access to its corporate 
network.

The malicious actor was able to do this using just the credentials as “access 
to Medibank’s Global Protect VPN did not require two or more proofs of identity 
of multi-factor authentication”.

“Rather, Medibank’s Global Protect VPN was configured so that only a device 
certificate, or a username and password, was required,” the OAIC document said.

The hackers were then able to steal about 520GB of data, including the personal 
information of 9.7 million Medibank customers.

‘Absolute minimum’ of cyber security

Multi-factor authentication is commonly regarded as a key cyber security 
mitigation measure and is one of the Australian Signals Directorate’s Essential 
Eight strategies.

Cyber security expert and Have I Been Pwned founder Troy Hunt said multi-factor 
authentication “should be viewed as an absolute minimum requirement”.

“There’s a very long tail of organisations that haven’t yet adopted 2FA across 
the board, so I’m not surprised to hear this finding about Medibank,” Hunt told 
Information Age.

“Whilst there appears to have been other security failures that contributed to 
this attack, the whole point of a second factor is to ensure incidents like 
this can’t occur when a single factor is compromised.”

OAIC said there were “deficiencies in the form and implementation of Medibank’s 
cyber security and information security framework”, including with its “failure 
to implement or properly configure information security controls of a basic or 
baseline nature or standard for an organisation of Medibank’s size”.

“Medibank’s failure to take reasonable steps commensurate with protecting the 
personal and sensitive information it held, exposed that information to the 
risk of misuse, unauthorised access and / or disclosure,” OAIC told the court.

Forewarnings

OAIC also revealed that Medibank was repeatedly warned of the risks associated 
with its lack of multi-factor authentication in a number of reports prior to 
the devastating cyber incident.

A report by Datacom into Medibank’s cyber security in mid-2020 identified the 
lack of multi-factor authentication as a “critical defect”, finding it was not 
activated for privileged and non-privileged users.

A report by KPMG in August 2021 also found that it was not in place for 
privileged users when accessing particular systems.

Buckland said that the Medibank incident should be a wake-up call to Australian 
businesses to prioritise cyber security.

“I hope this isn’t indicative of the level of focus businesses across Australia 
are putting on IT,” he said.

“[But] my sneaking suspicion is this is just the tip of the iceberg and we’re 
really seeing that companies have not yet fully switched to thinking about 
cyber risk as the risk it is.

“There’s just too much complacency.”



DENHAM SADLER
Denham Sadler is a freelance journalist based in Melbourne. He was previously 
Editor of StartupSmart, and writes on tech and politics. His work has been 
published in The Saturday Paper and The Guardian.


_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link

--
Roger Clarke                            mailto:[email protected]
T: +61 2 6288 6916   http://www.xamax.com.au  http://www.rogerclarke.com

Xamax Consultancy Pty Ltd 78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Visiting Professorial Fellow                          UNSW Law & Justice
Visiting Professor in Computer Science    Australian National University

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to