More about PDNS incident 2024 (The Indonesia National Data Center)

Budi Rahardjo on the road
23 Jul 202426:59

Summary

TLDRIn this video script, Bud Froman discusses the 2024 Indonesia National Data Center incident, where a ransomware attack by the 'brain chipper' group encrypted the data center's hypervisor, disrupting various government services. Froman, not involved in the incident, deduces the situation based on various sources, highlighting the lack of a timely switch to a disaster recovery center and the absence of proper backups. The script also mentions the unusual apology and offer of decryption keys from the attackers without ransom. Lessons learned and the importance of understanding the incident to prevent future attacks are emphasized.

Takeaways

  • 🗓️ The incident occurred on June 20th, 2024, at the Indonesian National Data Center, affecting multiple services including immigration and causing significant disruption.
  • 📊 A range of organizations were impacted, from the National Archive to university application systems, highlighting the widespread reliance on electronic services.
  • 🚨 The data center was hit by a ransomware attack from a group known as 'brain chipper', which was a variation of LockBit 3.0, indicating a targeted and sophisticated cyber threat.
  • 🛡️ The National Data Center's architecture included two data centers and one backup system, but the backup was not effectively utilized during the incident.
  • 💡 The hypervisor, possibly VMware-based, was the main target of the ransomware, encrypting it and preventing access to virtual machines, which was a critical vulnerability.
  • 🔒 The ransomware encrypted the hypervisor using Babuk encryption, which is a form of public key cryptography, complicating the decryption process.
  • 🤔 There were questions about the incident's response time and the lack of a swift switch to the disaster recovery center, suggesting potential issues with preparedness and response protocols.
  • 🛑 The incident raised concerns about the lack of effective backups, with some institutions not having their own backup systems, leading to a significant recovery challenge.
  • 🔑 In an unusual twist, the attackers offered to provide the decryption key for free, which was confirmed to work by some, but raised suspicions about potential hidden malware.
  • 🔍 The investigation into the incident is ongoing, with forensic reports not yet available to the public, leaving many questions about the breach's specifics unanswered.
  • 📝 The speaker emphasizes the importance of learning from this incident to prevent similar occurrences in the future, underlining the need for better security practices and backup strategies.

Q & A

  • What was the main issue faced by the Indonesia National Data Center on June 20th, 2024?

    -The main issue was that the Indonesia National Data Center, specifically PDN S2, was hit by a ransomware attack from a group called 'brain chipper,' which led to a denial of access to various government services and applications.

  • What is the significance of the term 'hypervisor' in the context of the data center's architecture?

    -A hypervisor is a piece of software that allows multiple operating systems (virtual machines) to run on a single physical server. It is significant because the ransomware attack encrypted the hypervisor, preventing access to the virtual machines hosted on it.

  • Why was the Windows Defender disabled prior to the ransomware attack?

    -The script does not provide a definitive reason for the disabling of Windows Defender, but it suggests that an attacker may have infiltrated the hypervisor and disabled it to pave the way for the ransomware injection.

  • How did the ransomware attack affect the immigration services in Indonesia?

    -The attack caused the immigration services to become inaccessible, as they rely on electronic systems that were impacted by the ransomware. This included the auto gates at airports which could no longer function properly.

  • What was the role of Telkom Sigma in the incident?

    -Telkom Sigma was the hosting provider for the National Data Center. The script suggests that the incident was specific to the PDN S2 and does not reflect on Telkom Sigma's overall credibility.

  • What was the outcome of the ransomware attack on the virtual machines (VMs)?

    -The VMs were encrypted, and some institutions did not have backup systems in place, which complicated the recovery process. The decryption key was later offered by the attackers, but the extent of the encryption and its impact on individual VMs was not fully detailed.

  • What was the unusual development regarding the ransomware group's behavior after the attack?

    -Unusually, the ransomware group issued a public apology and offered to provide the decryption keys for free, without demanding payment, which is not a common practice for such groups.

  • Why was there a delay in switching to the disaster recovery center (DRC) after the ransomware attack?

    -The script does not provide a clear reason for the delay, but it raises questions about whether the DRC was also compromised, had different technology that made synchronization difficult, or if there was simply no DRC in place.

  • What was the reported issue with the backup systems of the affected institutions?

    -The script indicates that many of the affected institutions did not have proper backup systems in place, which is a critical oversight for any organization, especially one providing essential government services.

  • What is the significance of the term 'Babuk encryption' mentioned in the script?

    -Babuk encryption refers to the specific type of encryption used by the ransomware group. It is significant because understanding the encryption method is crucial for decrypting the affected systems and recovering the data.

  • What were some of the speculations about how the ransomware attack was initiated?

    -The script suggests speculations about the attack being initiated through software vulnerabilities, remote desktop protocol connections, or by exploiting access to the hypervisor, but the exact method remains unclear.

Outlines

00:00

🗓️ Chronology of the 2024 Indonesia's National Data Center Incident

The speaker, Bud Froman, discusses the 2024 incident at Indonesia's National Data Center, highlighting the chronology of events starting from June 20th. On this date, at 4 a.m., immigration services in Indonesia faced an outage, rendering electronic systems in airports inoperative. This affected not only immigration but also other services reliant on the National Data Center. The incident was traced back to a ransomware attack by a group known as 'brain chipper,' which utilized a variation of the LockBit 3.0 ransomware. Froman clarifies that he was not involved in the design or operation of the data center and that his information is deduced from various sources.

05:01

🛡️ Exploring the Data Center's Architecture and Security Event

This paragraph delves into the architecture of the data center, explaining the shift from physical servers to virtual machines (VMs) based on VMware. The speaker hypothesizes about the possible points of failure, suggesting that the ransomware might have targeted the hypervisor rather than the VMs themselves. A security event three days prior to the ransomware attack, where Windows Defender was disabled, is also mentioned, raising questions about how the attacker gained access to the hypervisor and the overall security measures in place.

10:01

🔒 Impact of Ransomware and Hypervisor Encryption

The impact of the ransomware attack is discussed, with a focus on how it encrypted the hypervisor, preventing access to the virtual machines. The speaker mentions the use of Babuk encryption, which is a form of public key cryptography, and the implications of this on the decryption process. The incident's financial impact is not detailed, but the speaker emphasizes the importance of understanding the attack's root cause to prevent future occurrences.

15:02

🤔 Hypothesizing Attack Vectors and the Role of Network Security

In this section, the speaker speculates on how the ransomware might have infiltrated the system, considering potential attack vectors such as malicious emails, software vulnerabilities, and remote desktop protocol connections. The speaker suggests that the hypervisor could have been compromised through network access, indicating potential flaws in network security design. The possibility of the attack originating from within a virtual machine is also discussed.

20:03

🔄 Issues with Disaster Recovery and Backup Systems

The speaker addresses the response to the ransomware attack, questioning why the National Data Center did not switch to a disaster recovery center (DRC) and why backups were not restored. It is revealed that many virtual machines lacked proper backup systems, which is a significant oversight for a cloud service provider. The lack of a clear disaster recovery plan and the differences in technology between the primary data center and the DRC are highlighted as potential issues.

25:05

📜 Unusual Developments: Attacker's Apology and Key Provision

An unusual turn of events is described, where the ransomware attackers publicly apologized and offered to provide the decryption keys for free, without demanding payment. The speaker discusses the verification of the keys' legitimacy and the absence of any embedded malware within the key decryption application. The implications of this development for the recovery process and the integrity of the data center's operations are considered.

🏢 Lessons Learned and the Importance of Forensic Analysis

The final paragraph focuses on the lessons that should be learned from the incident, emphasizing the need for a thorough forensic analysis to understand the attack's origin and to prevent similar occurrences. The speaker also discusses the broader implications for service providers and the importance of having robust backup and disaster recovery plans in place. The incident serves as a cautionary tale about the potential consequences of inadequate security measures and the value of learning from past mistakes.

Mindmap

Keywords

💡National Data Center

The National Data Center refers to a centralized repository managed by a country's government to store and manage critical data. In the video's context, it is the target of a ransomware attack, highlighting the importance of robust cybersecurity measures for such facilities. The script mentions the incident at Indonesia's National Data Center as the main subject of discussion.

💡Ransomware

Ransomware is a type of malicious software that encrypts a victim's data and demands payment to restore access. In the video, the National Data Center in Indonesia was hit by a ransomware variant known as 'brain ciper' or 'log bit 3.0', demonstrating the real-world implications of such attacks on government services.

💡VMware

VMware is a virtualization software that allows multiple virtual machines to run on a single physical server. The script discusses VMware ESXi, a hypervisor, which was the platform used by the affected National Data Center. The ransomware attack encrypted the hypervisor, preventing access to the virtual machines hosted on it.

💡Hypervisor

A hypervisor is a piece of software that creates and manages virtual machines. In the script, the hypervisor is mentioned as the primary target of the ransomware attack, which encrypted it and caused a denial of service to the virtual machines running on top of it.

💡Disaster Recovery (DR)

Disaster Recovery refers to the process and procedures related to preparing for potential disasters or data loss, allowing systems to be restored to a known state. The script raises questions about the effectiveness of the DR plan in place for the National Data Center, as there were issues with switching to backup systems after the ransomware attack.

💡Babuk Encryption

Babuk Encryption is mentioned in the script as the encryption method used by the ransomware. It is significant because it indicates a specific type of ransomware that was known to target VMware environments, and its use in the attack suggests a targeted approach by the attackers.

💡Windows Defender

Windows Defender is an antivirus and antimalware component of Microsoft Windows. The script mentions that Windows Defender was disabled three days before the ransomware attack, which could have left the system more vulnerable to the intrusion.

💡Electronic Immigration System

The term refers to the digital systems used for managing immigration processes, such as at airports. In the video, the failure of the electronic immigration system due to the ransomware attack exemplifies how critical infrastructure can be affected by cyber threats, leading to real-world operational disruptions.

💡Public Key Cryptography

Public Key Cryptography is a cryptographic system that uses two keys: a public key for encryption and a private key for decryption. The script discusses the use of ECC (Elliptic Curve Cryptography), a form of public key cryptography, in the encryption of the hypervisor, which is crucial for understanding the technical aspects of the ransomware attack.

💡Lessons Learned

The term 'Lessons Learned' in the script refers to the insights and improvements that should be derived from the incident to prevent similar occurrences in the future. It underscores the importance of post-incident analysis and the need for continuous learning and adaptation in cybersecurity practices.

💡Weak Password

A weak password is a simple or easily guessable password that provides inadequate security. The script mentions an instance where a weak password was used for one of the virtual machines, suggesting that poor security practices can contribute to the success of cyber attacks.

Highlights

Bud Froman discusses the 2024 Indonesia National Data Center incident, providing insights despite not being directly involved in the design or investigation.

On June 20th, 2024, Indonesia's temporary Data Center suffered a ransomware attack, impacting immigration services and other government applications.

The ransomware, a variation of LockBit 3.0, was attributed to the Brain Ciper group, causing widespread disruption to electronic services.

Indonesia's National Data Center architecture includes two data centers and a cold backup system, with the affected PDN S2 managed by Telkom Sigma.

The incident raised questions about the data center's security measures and the effectiveness of its disaster recovery plan.

Froman speculates that the ransomware may have targeted the hypervisor, encrypting it and preventing access to virtual machines.

A security event three days prior saw Windows Defender disabled, possibly allowing the ransomware to infiltrate the system.

The lack of clear information on how the attacker gained access highlights the need for better security practices and protocols.

Babuk ransomware is known to spread through phishing emails, software vulnerabilities, and remote desktop protocol connections.

The use of ECC curve 25519 encryption for the hypervisor raises questions about the ransomware's sophistication and methods.

The attacker's unexpected apology and offer to provide decryption keys for free adds an unusual twist to the typical ransomware scenario.

The incident exposed the importance of having robust backup systems in place for both the data center provider and individual institutions.

Froman emphasizes the need for lessons to be learned from the incident to prevent similar attacks in the future.

The incident's impact on Telkom Sigma's credibility is questioned, as the attack was specific to the PDN and not reflective of the entire cloud system.

The lack of a clear timeline and ongoing resolution efforts leave many questions unanswered about the current state of the data center.

Froman concludes by stressing the importance of understanding the incident's root causes to improve security measures and prevent future attacks.

Transcripts

play00:00

good morning this is Bud Froman

play00:04

bu uh as I promised before I'm going to

play00:08

talk about the recent

play00:12

2024 Indonesia's uh National Data Center

play00:17

incident or

play00:19

inesia data

play00:21

National Samara temporary don't know why

play00:25

temporary uh my presentation material is

play00:27

going to be in basa Indonesia the text

play00:29

is in BAS Indonesia but I'm going to

play00:31

talk in English let me switch to my

play00:35

presentation okay so so

play00:39

uh uh disclaimer plus disclaimer I am

play00:42

not involved uh as part of the design

play00:45

implementation of operational of uh and

play00:48

our investigation of this so I got all

play00:51

the uh information from many sources any

play00:56

sources and I'm trying to uh deduce

play00:58

based on those sources but those

play01:00

information uh okay let me get my face

play01:03

here on the screen

play01:06

wait okay so let's

play01:09

continue okay uh let's start with the uh

play01:13

uh chronology uh of the the incident on

play01:18

June 20th

play01:20

um the pdns 2 this is apparently there

play01:25

is more than one so this is the uh data

play01:28

center temporary Data Center c number

play01:30

two I'll get back on that but anyway

play01:35

um uh at 400 a.m. in the morning on the

play01:38

20th uh June

play01:40

2024 immigrations they could not access

play01:44

their uh services in Indonesia now these

play01:47

days everything is um electronic so if

play01:51

you go to airports I mean airports

play01:53

basically in Jakarta sarata for example

play01:57

there's an auto gate you can go through

play01:59

this auto gate using you know electronic

play02:01

system we put the passport scan it and

play02:03

then it goes through it didn't work at

play02:05

the same time the

play02:07

applications um where you have to go

play02:10

through this immigration it didn't work

play02:12

so they

play02:13

contacted uh Pat data National contacted

play02:17

uh the National Data Center why they

play02:20

could not access their services or their

play02:22

servers and

play02:25

apparently there was a problem and after

play02:28

that other applications or other

play02:30

institution or organizations that that

play02:33

are using these Services they also uh

play02:36

noticed that they could not uh access

play02:38

their services here is example of u a

play02:42

list partial list of uh applications or

play02:45

organizations that um could not access

play02:48

the arip uh National the archive

play02:51

National Archive the electronic uh what

play02:54

do you call it uh procurement system and

play02:57

so on and so on and even I heard that

play02:59

there is is uh an application for uh new

play03:02

students uh University's requirement

play03:04

that did not work so anyway what

play03:07

happened was that the uh the uh data

play03:12

center uh owned by com info the ministry

play03:15

of communication and information and

play03:17

hosted by uh Telcom

play03:19

Sigma was hit by uh ransomware from a

play03:23

brain chipper or brain ciper um depends

play03:27

on your pronunciation um brain chipper

play03:31

uh group and the ransomware is

play03:33

apparently A variation of log bit 3.0

play03:37

now uh let's talk about the National

play03:39

Data Center first I have no idea how it

play03:43

works because again I was not part of

play03:45

the design and so on and so forth so

play03:47

apparently there are uh three uh not

play03:50

three uh two data centers and one backup

play03:53

cold backup system uh the one that got

play03:55

hit is in the one that uh in Sara this

play03:58

is actually PDN

play04:00

S2 um and then there there is also PDN

play04:03

S1 question mark there is uh it is in

play04:07

sarpong another another uh City and is

play04:11

managed by it is managed by lintas Arta

play04:14

another company and they're supposed to

play04:15

be a cold backup in batam we'll talk

play04:18

about this uh backup sites later on okay

play04:22

so

play04:23

anyway

play04:25

uh they found out that they were hit by

play04:30

ransomware okay now the service the pdns

play04:34

service uh the the original idea long

play04:37

long time ago that the uh government

play04:40

services so this is government service

play04:42

this is a service for government

play04:45

organizations uh they they used to have

play04:47

a collocation meaning all these

play04:50

organizations government institutions

play04:52

they can have their own machines and

play04:54

they uh bring their machines to uh data

play04:57

centers um organized by uh Ministry of

play05:00

communication and information but these

play05:02

days you don't need a physical servers

play05:04

so you get virtual machines so

play05:07

everything is actually visual machines

play05:10

VM now the VM itself uh from what I

play05:13

heard is uh based on VMware the one at

play05:16

least the one in pdns 2 uh was or is by

play05:21

VMware now uh which I'm I'm not really

play05:24

sure which part of the VMware uh that

play05:27

got hit so here here's there's kind of a

play05:30

a topology uh or kind of an architector

play05:34

of virtual machines so we have a

play05:37

hardware instead of one instead of one

play05:40

system uh sorry instead of many many

play05:43

servers see hundreds or 200 servers um

play05:48

which is very very very cumbersome to

play05:50

minutes uh today we have a cloud system

play05:53

we have whereby you have like a big

play05:56

Hardware not big in terms of not not

play05:58

even the size right in in terms of the

play06:01

capacity and capability so you have a

play06:03

big hardware and on top of that you put

play06:05

an a host OS be that you know Linux or

play06:09

Windows it doesn't really matter and

play06:11

then on top of that you have this

play06:12

hypervisor now this hypervisor is the

play06:15

one that you know VMR has you can have

play06:18

other Technologies uh other than VMR you

play06:21

can have open stack spr smoks what else

play06:25

um but basically there are many uh

play06:27

hypervisors uh supervisor

play06:30

implementations now on top of this you

play06:32

have gas os's uh you have virtual

play06:35

machines basically you can install you

play06:37

know um Linux Debian Santos red hat or

play06:40

whatever you you can also install

play06:42

Windows so you can have many virtual

play06:46

machines it depend uh it's it is uh

play06:50

basically uh sorry hang on a second yeah

play06:53

yeah I need coffee basically on top of

play06:56

this hypervisor you can have many

play06:59

virtual machines you can have you can

play07:01

install as many as you uh like it

play07:05

depends on the capability of the

play07:08

hardware so you can have two 5 10 11

play07:11

200s or whatever um um even thousands

play07:15

but I if if thousands perhaps you can

play07:18

have more than one uh Hardware like

play07:21

physical machines so anyway you can have

play07:23

virtual machines on top of the this so

play07:26

this is one architecture but since the

play07:29

this host o OS is not doing anything um

play07:32

basically the hardware is just running

play07:34

hypervisor right so there's no need to

play07:36

have this host OS so you can take this

play07:39

host OS out you can have an architecture

play07:42

something something like this this is uh

play07:45

called bare metal so you have the

play07:47

hardware the bare metal and then on top

play07:49

of that you put hypervisor and then

play07:51

that's it so you manage the hyper fer to

play07:54

some kind of software or web Bas

play07:57

application or you know um what whatever

play08:00

means but basically you uh manage these

play08:04

VMS on top of this hypervisor okay so uh

play08:09

going back to the case I don't know

play08:11

whether the one that that got hit hit uh

play08:15

was it the hypervisor or the VMS because

play08:20

are the institution the government

play08:22

institution institutions they have

play08:24

access only to these FMS so they were

play08:28

given

play08:29

several VMS one two what have you so

play08:32

yeah they have access to these VMS but

play08:35

they do not have access to the

play08:38

hypervisor now my opinion based on the U

play08:42

uh news the uh the ransomware actually

play08:46

hit the

play08:48

hypervisor now uh before that before

play08:52

that uh there was a news saying that on

play08:56

uh June 17th like 3 days before that

play08:59

there is a an event a security event

play09:02

that a Windows Defender um Windows

play09:05

Defender uh this is like an antivirus

play09:07

antimalware

play09:09

application was disabled my question is

play09:13

how and which part assuming this

play09:16

hypervisor is there right the hypervisor

play09:19

is there

play09:21

um uh my assumption is that the Windows

play09:24

Defender is actually part of this

play09:26

hypervisor so somebody actually uh went

play09:29

inside this hypervisor and disabled the

play09:32

uh Windows Defender and then uh

play09:34

injected uh the ransomware if the

play09:37

Windows Defender the one that you know

play09:40

uh got

play09:43

deactivated was this VM so the attacker

play09:47

mainly um had access to the VM the

play09:51

attacker did not have access to the

play09:52

hyper viser so maybe just

play09:55

one organization or one institution that

play09:58

got hit by and somewhere but not the

play10:00

whole uh data uh the pdns so because of

play10:05

uh the

play10:07

incident happened to the whole pdns so

play10:09

my assumption my assumption is uh the

play10:13

hypervisor the one that got hit so so

play10:16

that's that right so that's the the the

play10:18

the now because of that because of that

play10:22

so this is for those who are not

play10:24

familiar with ransomware uh because of

play10:26

that because everything uh ransomware

play10:28

basically what uh it does is um the

play10:31

ransomware encrypts the hypervisor so

play10:34

you don't have access to the hypervisor

play10:37

because if you want to access it you

play10:39

need password to open it you need

play10:41

password to decrypt it because of this

play10:44

hypervisor is in encrypted format those

play10:47

guas osses they could not run on top of

play10:50

this uh hypervisor so basically you need

play10:54

keys

play10:56

okay now in terms of uh the results uh

play11:00

the effect uh how much money or if you

play11:04

have some kind of

play11:06

calculation

play11:07

um how much can uh kind of

play11:11

uh how big is the incident caused by by

play11:14

this um I don't have the data okay so I

play11:17

don't have data in terms of business

play11:19

process I don't have the data now now

play11:22

about the keys um and this one I uh uh

play11:26

read several uh post things and one of

play11:31

one of the uh posts by johannas uh he

play11:35

actually uh look in uh went and looked

play11:38

into this uh situation and he actually

play11:40

refers engineered uh some part of this

play11:43

uh encryption and the hypervisor was

play11:46

encrypted with babuk encryption so with

play11:49

babuk encryption I read somewhere that

play11:51

babuk uh is an

play11:54

encryption bab somewhere is encrypted by

play11:57

AES 256 so this is more like a private

play12:00

key crypto system but from what I

play12:02

understand from johannas U uh post it

play12:05

was encrypted with ECC curve

play12:10

25519 so ECC is a public key crypto

play12:13

system it's bit different um I I have to

play12:17

believe that

play12:19

uh the the the the incident um the the

play12:23

the sorry the encryption that was used

play12:27

is this one easy one this easy now how

play12:32

how did the uh the hypervisor got hit

play12:36

now I I I read say from sample uh from

play12:39

Sentinel one from the the uh kind of the

play12:42

the web page here it says babuk

play12:45

ransomware is typically spread through

play12:47

fing emails with malicious attachment or

play12:50

links malicious downloads software

play12:53

vulnerabilities and remote desktop

play12:55

protocol connection so going back to the

play12:58

architecture

play13:00

okay if we and I should have uh describ

play13:03

the the the the this diagram with that

play13:06

text okay uh

play13:08

if the attacker went from uh a malicious

play13:13

email so somebody's reading email on top

play13:16

of

play13:16

this and I think that's not the case

play13:19

because there's no email application

play13:21

there's nobody actually log in here and

play13:23

work here so that was not the case feing

play13:27

download that was not the case unless

play13:29

somebody's downloading something and

play13:30

install it in the hypervisor that was

play13:33

not the case in my opinion uh so there

play13:35

were only two things um the things which

play13:40

is okay remote desktop or some software

play13:43

vulnerability so somebody actually had

play13:46

access to the hypervisor through Network

play13:49

and exploit some kind of

play13:51

vulnerabilities uh if that's the case

play13:53

then there's a bad design in terms of uh

play13:56

the network because you're not supposed

play13:57

to have access to the hypervisor

play14:00

directly usually it's behind some kind

play14:02

of firewall

play14:04

jump um you know uh jump machine or jump

play14:08

host or something like that or uh

play14:10

through remote DOA protocol so there has

play14:13

some kind of web based application and

play14:16

the web based application or the

play14:18

application that uh manages uh

play14:21

hypervisor was taken over that's also

play14:24

possible because I don't know what

play14:26

happens um uh these two

play14:29

they might be the problem now uh this is

play14:33

about the encryption on the hypervisor

play14:35

in terms of the VM itself uh and from

play14:38

the blog posts that I uh read uh the VM

play14:41

was encrypted with log bit A variation

play14:43

of loog bit and I

play14:46

add sorry um lock pit what lock pit uh

play14:51

ransomware and the encryption I have no

play14:54

idea is it salsa 20 or whatever but this

play14:57

is just

play14:59

uh uh

play15:01

um like uh my guess my guess um I'm more

play15:06

concerned about the hypervisor because

play15:08

probably that's the one uh that is U you

play15:11

know the main cause so about the uh the

play15:14

VMR axi oh okay VMware esxi this is the

play15:18

hypervisor by VMware on top of bare

play15:22

metal so

play15:24

apparently uh this was known like a year

play15:28

ago

play15:29

okay the the babuk itself uh the babuk

play15:32

uh

play15:33

encryption um itself um was leaking in

play15:38

2021 so some people actually

play15:40

investigated how an organized ransomware

play15:43

works now uh early

play15:47

2021 Sentinel laps the one that I got uh

play15:51

you know like the one that I read the

play15:53

block post this is Sentinel one sorry

play15:55

Sentinel lab it's one of one of

play15:57

companies that I were actually

play15:59

monitoring this Sentinel one observe an

play16:02

increase in VMware esxi ransomware based

play16:05

on babuk so this was known in

play16:08

2023 now if this is the case then

play16:11

somebody should update the software

play16:14

create a better sop because they uh they

play16:17

should have known that this is a target

play16:20

okay so now you got hit by a ransomware

play16:25

what is the

play16:26

response how come it took uh uh them

play16:29

like four five s days uh even right

play16:33

right now they're they're still trying

play16:35

to to to resolve this case why didn't

play16:38

they switch from the DC to the DRC from

play16:41

pdns 2 switch to pdns

play16:44

one I don't know why why didn't they

play16:47

switch okay uh we got hit by rans

play16:49

someware stop the DC and switch to DRC

play16:53

right maybe one the DRC itself also got

play16:57

hit by ransomware so the main the DC the

play16:59

main one the disaster recovery Central

play17:01

also got here

play17:03

maybe I but I did not hear any respond

play17:06

about that two this is what I heard the

play17:09

technology behind uh DC and DRC they're

play17:13

different um The One is using um VM and

play17:18

the other one is using open stack that's

play17:21

that was um that was the reason maybe

play17:25

that was the reason because they're

play17:27

different in technology so it is

play17:29

difficult to synchronize back up and

play17:32

restore maybe maybe that's the case the

play17:34

third one there was no DRC or maybe in

play17:38

the process of building if that's the

play17:41

case I think it's you know I to me it's

play17:44

unbelievable you're running a production

play17:45

system with a backup system uh and this

play17:48

is like a production system being used

play17:50

all over Indonesia uh it's

play17:53

just you know this is kind of the weird

play17:57

case in my opinion that's that's why you

play17:59

know um I I talked to some friends and

play18:01

they also got confused because this is

play18:04

this is supposed to be like Ani not Ani

play18:06

right this supposed to have like sorry

play18:10

this is laziness in my opinion this is

play18:13

laziness pardon my

play18:15

language so that was uh the first

play18:18

question and then the second question

play18:20

why didn't you uh resume from uh a back

play18:24

up uh restore so basically you got hit

play18:27

by ransomware okay now you reinstall

play18:30

everything and then um restore from

play18:34

backups now there's another story

play18:36

apparently backups were not

play18:40

done in fact many of the VMS or the

play18:43

institutions they don't have a backup

play18:45

system so this is uh kind of strange as

play18:50

a provider of a cloud system you should

play18:52

have back up you know your client so

play18:54

that's one thing and the second uh each

play18:57

individual VMS uh each individual VM

play19:00

they're supposed to have to have backups

play19:04

so if I'm running say I I I am an

play19:07

organization say if

play19:08

I'm Ministry of uh so such and such and

play19:12

such I should have back up my own backup

play19:15

right even though I am I'm running on a

play19:17

cloud say the cloud by uh pdns or A

play19:22

Cloud by a us Google Azure or Alibaba or

play19:27

whatever you I should should have my own

play19:30

backup yeah because I because that's my

play19:33

system I have I have to have my backup

play19:35

so again this is a problem and this is

play19:39

one of the biggest U lesson learned okay

play19:43

now this is what uh it gets strange uh

play19:47

stranger and stranger and stranger kind

play19:50

of weird weirder and weirder and we on J

play19:54

on July 2nd on July 2nd uh there was an

play19:58

a posting here from uh Ministry

play20:02

communication sorry I need coffee uh

play20:05

Minister Ministry of communication and

play20:08

information com info so it's easier to

play20:11

say it in Bess com info from com info uh

play20:15

there was a a posting uh that says the

play20:19

attacker they sent an apology a public

play20:23

statement apologizing um for for the

play20:26

attack and they're willing to give give

play20:29

the uh key or keys back

play20:33

without any payment you for free

play20:37

basically they still have you know we

play20:38

leave a Monero wallet for donation if

play20:41

you still want to send us money fine

play20:43

we'll accept them but you don't have to

play20:45

pay so this is kind of strange usually

play20:48

uh rans of whereare groups they don't

play20:52

really care about what they're doing

play20:54

okay so this is kind of now they said

play20:58

they're going to give you Keys now the

play21:00

problem is this first can the key

play21:04

actually opens the

play21:06

encryption meaning the key can the key

play21:09

decrypts what uh what have been done

play21:12

okay

play21:14

so friends some people tried this and

play21:18

they kind of uh created uh an encrypted

play21:21

version and use uh the key to open it

play21:24

can you open it yes apparently the key

play21:26

can open confirm now second

play21:29

is there a Trojan or another ransomware

play21:32

or whatever Mal software embedded in

play21:34

this key uh application key decryption

play21:36

uh

play21:38

application ah this is a question and

play21:41

some people went through and refers

play21:42

engineered the key and they said no um a

play21:48

higher

play21:50

possibility uh there is no Tren or R

play21:54

someware embedded or malware embedded in

play21:56

the uh application or key that was given

play21:59

okay so that's uh the key to open the

play22:04

hypervisor so if you open the hypervisor

play22:07

everything is up and normal back to on

play22:10

the 20th or before that okay so

play22:13

everything um is supposed to be there

play22:16

now the VMS uh the VMS on top of this H

play22:21

this

play22:22

hypervisor are they also encrypted from

play22:25

what I understand some of them were

play22:27

encrypted but using different kind of

play22:30

keys um maybe not all but some of them

play22:33

or maybe all I have no idea because uh

play22:37

right now we're discussing the

play22:38

hypervisor right okay so what uh what

play22:42

come info offered is they reinstall

play22:45

everything they restarted the hypervisor

play22:48

and they restarted the VMS and it's

play22:51

supposed to uh install again the VMS uh

play22:55

after kind of hardening your own VM and

play22:59

Hyper was Harden okay I'm going to skip

play23:02

this part okay

play23:03

now I I don't have a a a timeline uh

play23:07

this is in the uh in progress I should

play23:09

have cre created timeline here like from

play23:12

17 19 20th and so on and so on up to

play23:15

July 4 up to now I have no idea what's

play23:18

going on right now um whether they're

play23:20

running uh running it based on a v

play23:24

hypervisor or configuration that was

play23:27

decrypted using the key or whether

play23:29

they're running it uh using a fresh

play23:32

install of hypervisor and all these

play23:34

fresh install of the VMS I don't know

play23:37

what's going on these days okay now

play23:38

there's another issue uh that says um

play23:41

that says um uh the uh the server or the

play23:46

data uh the National Data Center was

play23:48

being accessed using a weak passwort uh

play23:52

this was not true uh this was one of the

play23:56

VMS yes uh one of the VMS um I think

play24:00

this one is B

play24:02

bpkp uh their machine uh was managed by

play24:06

weak password so that is possible but

play24:08

only for one VM or one institution not

play24:11

the whole hypervisor so this was kind of

play24:14

the the title was missing okay

play24:16

concluding remarks okay what are the

play24:18

lessons learn through this process and I

play24:23

you know I I haven't heard people talk

play24:24

about this I know uh they have done

play24:27

forensic um

play24:30

to you know foric to investigate the

play24:33

incident I know that the forensic report

play24:35

or reports are not available for uh

play24:39

public consumption man that's that's

play24:41

understandable but lesson learn lesson

play24:43

learn I think we we have to talk about

play24:45

lesson learn because this is important

play24:48

because this is important because

play24:49

otherwise we're going to get hit the

play24:51

same thing again now many things are not

play24:54

clear still to me how the Intruder got

play24:57

in the first time you know the got in

play24:59

and then disabled the Windows Defender

play25:01

and so on and so forth uh uh yeah this

play25:05

this is uh to me uh one of the biggest

play25:08

mystery uh we should have learned from

play25:11

that so that others can learn from our

play25:14

mistakes because this is expensive so

play25:17

this is a kind of lessons that are

play25:19

expensive okay now

play25:23

um about talcom Sigma um they uh talcom

play25:27

Sigma uh host

play25:29

other providers sorry other service

play25:31

providers not only government

play25:33

institutions and these are the clients

play25:36

that other clients are not hit or were

play25:38

not hit and are not hit by uh ransomware

play25:41

so so this is not reflecting telom cell

play25:46

Sigma

play25:47

uh credibility in my opinion this is my

play25:50

personal opinion I'm not paid by tcom

play25:53

Sigma and so on but this is just you

play25:55

know one of the their clients got hit so

play25:58

so this is specific to the pdns not to

play26:04

the uh you know the whole cloud system

play26:07

so that's that I guess uh it's already

play26:09

too long I um as this is what I uh you

play26:13

know I promise earlier okay okay so

play26:16

that's that uh I have delivered my

play26:19

promise

play26:21

uh it's not as good as I want it but I

play26:27

I'm busy I just got got home last night

play26:29

so you know it's one of those hectic

play26:31

days I could not make the uh video

play26:35

earlier because I was on the road you

play26:37

know it's what's difficult I don't have

play26:39

access to my configuration my uh uh disc

play26:42

is full and so on and so forth and so

play26:44

work my apology so I guess

play26:47

uh um this is it I need to uh work now

play26:52

and go back to my world okay stay safe

play26:56

stay healthy bye

Rate This

5.0 / 5 (0 votes)

関連タグ
Indonesia DataRansomware AttackNational Data CenterCybersecurityData BreachIncident ResponseVMware ESXiBabuk EncryptionDigital ForensicsIT InfrastructureLessons Learned
英語で要約が必要ですか?