Article Details
Scrape Timestamp (UTC): 2024-03-08 12:37:52.171
Source: https://www.theregister.com/2024/03/08/swiss_government_files_ransomware/
Original Article Text
Click to Toggle View
Swiss cheese security? Play ransomware gang milks government of 65,000 files. Classified docs, readable passwords, and thousands of personal information nabbed in Xplain breach. The Swiss government had around 65,000 files related to it stolen by the Play ransomware gang during an attack on an IT supplier, its National Cyber Security Center (NCSC) says. A total of 1.3 million files were stolen during the incident at software biz Xplain in May 2023, meaning 5 percent of the entire trove related to the Swiss Federal Administration – a collection of seven federal agencies that alongside the Federal Council comprise the main government departments. Among them were classified files and sensitive, personally identifiable information (PII) – all of which are believed to be published on the dark web. The vast majority of the files (95 percent) were related to the administrative units of various government arms including those concerning justice, police, migration, and internal IT. A smaller proportion (3 percent) related to the Federal Department of Defense, Civil Protection, and Sport, while other departments are only described as being "marginally affected." Despite 65,000 files concerning the Swiss government, the NCSC said 47,413 of these belonged to Xplain itself and 9,040 belonged to the Federal Administration. More than half of these (5,182) included sensitive content such as PII, classified files, passwords, and technical documentation. Personal data formed the bulk of this, with names, email addresses, home addresses, and phone numbers accounting for 4,779 of the sensitive files. Technical documentation on IT systems and software – requirement documents and architecture information – accounted for 278 of these files. Classified files comprised the remaining sensitive files that were stolen, only four of which contained readable passwords, the NCSC said. "A considerable amount of analysis was required to determine how much data was leaked and the owners of the leaked data," it said in a statement accompanying the full report, available only in German and French. "Suitable tools were required to process unstructured data records and make their contents readable. The objects identified as relevant then had to be manually viewed and categorized. "The various federal offices and service providers involved worked closely under the lead of the NCSC to manage the security incident. This allowed all parties to utilize synergies, make effective use of resources, and save valuable time." An administrative investigation was launched in August 2023 to fully understand how the breach at Xplain took place and is set to conclude this month. The resulting report will then provide actionable recommendations for the Federal Council to apply with a view to preventing future breaches.
Daily Brief Summary
The Swiss government's IT supplier Xplain was breached by the Play ransomware gang, resulting in the theft of 65,000 files relating to the Swiss Federal Administration.
The National Cyber Security Center (NCSC) reported that a total of 1.3 million files were taken during the May 2023 incident, with 5 percent related to the government, including classified documents and personal information.
Personal data compromised included names, addresses, and phone numbers, while technical and classified files were also among the stolen data.
Only a small fraction of the leaked files contained readable passwords, but the breach still represented a significant security lapse.
An administrative investigation began in August 2023 to analyze the breach at Xplain, with the final report expected to provide recommendations to prevent similar incidents.
The Swiss federal offices and service providers coordinated closely under the NCSC to manage the incident and mitigate its impact.