iTnews
  • Home
  • News
  • Technology
  • Security

Medibank allegedly missed EDR alerts before data breach

By Jeremy Nadel
Jun 19 2024 6:45AM

Privacy watchdog claims lack of 'baseline' cyber security controls led to 2022 hack.

Medibank or its partners allegedly missed or didn't act on alerts from its endpoint detection and response (EDR) tool before a threat actor stole data from the insurer's systems, Australia's privacy regulator has said.

Medibank allegedly missed EDR alerts before data breach

The Office of the Australian Information Commissioner’s (OAIC) has published court documents [pdf] that allege the insurer had an up to six-week window from when the EDR alerts were generated to when it became clear that data had been stolen, to act.

The OAIC filed a lawsuit against Medibank earlier this month alleging failures by the insurer to protect customers' personal information.

The office's concise statement of claim offers an alleged chronology of events that saw an IT service desk contractor's admin credentials stolen and then misused to enter and chart Medibank’s network before stealing sensitive information.

The forensic details OAIC alleges go beyond Medibank's disclosure [pdf] that the stolen credentials were used to access Medibank's network via “a misconfigured firewall”, from which point the attacker was able to remain undetected and expand laterally.

In support of the proceeding OAIC filed earlier this month, the regulator argued that Medibank did not “implement effective contractor assurance” or take other “reasonable steps” from a cyber security perspective.

These covered domains including security monitoring, MFA for authenticating remote access to Medibank’s VPN, "restricting access" to data holdings based on the "responsibilities of users", and "processes" for responding to detected “incidents in a timely manner”.

OAIC accused Australia's largest health insurer of not "undertaking a first-level review and triage of all security alerts generated by Medibank’s EDR (endpoint detection and response) security software" or detecting suspicious exfiltration by "configuring volumetric alerts”.

Admin credentials saved to personal browser profile

OAIC alleged that at some time before August 7 2022 a contractor saved credentials, including for an admin account, to their personal internet browser profile on a work computer.

The credentials then “synced across to [their] personal computer”, the OAIC alleged, and were stolen by malware on that device.

The admin account granted access “to most (if not all) of Medibank’s systems."

The OAIC alleges the attacker first tried the credentials on a Microsoft Exchange server before finding they worked for Medibank's VPN.

It alleged that one reason the attack succeeded was ’“because…Medibank’s Global Protect VPN…did not require two or more proofs of identity or multi-factor authentication.”

“Rather, Medibank’s Global Protect VPN was configured so that only a device certificate, or a username and password (such as the Medibank Credentials), was required," it alleged.

Medibank’s EDR “generated various alerts" around a fortnight after the attacker had gained persistence.

However, for whatever reason, the OAIC alleges the EDR alerts were not acted upon. The attacker then accessed customer databases and stole 520GB of data sometime over the following six weeks.

The OAIC alleged that the attack and exfiltration was only uncovered on October 11 when “Medibank’s Security Operations team triaged a high severity incident for an…alert that identified modification of files needed to exploit the ProxyNotShell vulnerability", a zero-day found in Microsoft Exchange. 

Several days later, investigations by digital forensic partner Microsoft Threat Intelligence Centre (MSTIC) allegedly uncovered “a series of suspicious volumes of data exfiltrated out of Medibank’s network”,

OAIC alleged that Medibank “was not aware that customer data had been accessed by a threat actor and exfiltrated from its systems” until this time. 

This January, Microsoft also revealed that MSTIC played a “key” role in helping the Australian Signals Directorate unmask the hacker.

MSTIC said that it fed information to the Australian Signals Directorate, which was used to identify the individual behind the sophisticated attack.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
medibankoaicsecurity

Related Articles

  • GPS spoofers 'hack time' on commercial airlines, researchers say GPS spoofers 'hack time' on commercial airlines, researchers say
  • In Pictures: Skybox and BT security roundtable In Pictures: Skybox and BT security roundtable
  • Browser vulnerability can be used to breach local networks Browser vulnerability can be used to breach local networks
  • Services Australia's sweeping security uplift plans for myGov Services Australia's sweeping security uplift plans for myGov

Partner Content

Transforming Education: South Australia's Digital Identity Journey with Okta
Partner Content Transforming Education: South Australia's Digital Identity Journey with Okta
‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World
Partner Content ‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World
Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration
Partner Content Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration
Non-technical job seekers are missing out on this in-demand cybersecurity career
Partner Content Non-technical job seekers are missing out on this in-demand cybersecurity career

Sponsored Whitepapers

Nine Ways To Prepare Your Database for a High-Traffic Event
Nine Ways To Prepare Your Database for a High-Traffic Event
How to Put AI at the Heart of Business Growth
How to Put AI at the Heart of Business Growth
Streamline Your Processes and Reduce Managed File Transfer Expenses
Streamline Your Processes and Reduce Managed File Transfer Expenses
Maximise Your Azure Investment with Fusion5
Maximise Your Azure Investment with Fusion5
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance

Events

  • Integrate Integrate
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia's sweeping security uplift plans for myGov

Services Australia's sweeping security uplift plans for myGov

Medibank allegedly missed EDR alerts before data breach

Medibank allegedly missed EDR alerts before data breach

Northern Beaches Council reviews security stack to shore up widening perimeter

Northern Beaches Council reviews security stack to shore up widening perimeter

CrowdStrike rejects Delta Air Lines claims over outage

CrowdStrike rejects Delta Air Lines claims over outage

Digital Nation

How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
State of Security 2023
State of Security 2023
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.