Page:Ransomware Attack on the Servers of The Hong Kong Institute of Bankers.pdf/7

From Wikisource
Jump to navigation Jump to search
This page has been proofread, but needs to be validated.
      1. The regular penetration test conducted by HKIB did not cover network infrastructure and defence capabilities against specific cyberattack;
      2. The antivirus software installed in its system only had basic protection capabilities and could not effectively defend against ransomware attacks;
      3. Data loss prevention system was not installed in the system to detect and prevent sensitive data from being stored in external storage devices, or transmitted to external parties through email systems or the internet;
      4. Passwords strength of some accounts in the system was insufficient and the passwords were not changed regularly, which made the relevant accounts vulnerable to attacks or intrusions by hackers; and
      5. Other deficiencies[1] in information security.
      The Commissioner considered that all of the above showed that the personal data security management of HKIB was unsatisfactory, lacked stringent measures to regulate staff behaviour and review system settings timely, so that the security of information system which contained personal data was ineffective in addressing risks and threats.
    1. Prolonged Implementation of Multi-factor Authentication: Back in May 2019, the Firewall manufacturer noted that attackers could bypass security restrictions and directly obtain SSL VPN account names and passwords to execute any programme in the target system through exploiting the Vulnerability. The Firewall manufacturer therefore urged users to immediately disable SSL VPN until the operating system was updated and all account passwords were reset. It also recommended that multi-factor authentication be enabled.

  1. The details have been omitted to protect sensitive information on the security of the relevant information systems.

7