No year passes without incident, and that’s especially true for a 12-month period equally blighted with COVID-19 as it was with tech-related mishaps and mix-ups.
From public sector IT blunders to catastrophic cyber security failings, here’s our pick of the most eye-catching and alarming incidents to grace the headlines.
Government-funded laptops arrive in schools loaded with malware
The UK government welcomed us into 2021 with a major IT blunder that saw it issue malware-infested laptops to vulnerable children. A number of these devices were found to be infected with a “self-propagating network worm”, and also appeared to be communicating with Russian servers.
The Windows-based laptops were, specifically, infected with Gamarue.1, a worm Microsoft first identified in 2012. At the time, the Department of Education said it was “urgently investigating” the issue that had only affected a “small number of devices.”
Slack kickstarts 2021 with a major outage
Slack, meanwhile, also started 2021 on the wrong footing, with the now Salesforce-owned business communications platform suffering a major outage on 4 January as employees across the globe began to log back onto their systems to start their working year afresh.
The outage saw team members unable to reliably send or receive messages, with some users also struggling to log into the service altogether.
Home Office wipes 15,000 police records
Back in February, the Home Office was forced to admit it had inadvertently deleted the records of more than 15,000 people from the Police National Computer (PNC).
A total of 209,550 offence records that related to 112,697 individuals were wiped from the system, including crucial evidence such as fingerprint scans, DNA and arrest records. This “critical incident” was later blamed on a combination of “human error” and failures at the management level.
SolarWinds blames intern for weak ‘solarwinds123’ password
The password ‘solarwinds123’ – a critical lapse in password security – was publicly accessible through a private GitHub repository from June 2018, before this was finally addressed in November 2019.
SolarWinds failed to mention, however, whether the password played a role in the major cyber attack the company sustained. This incident saw up to 18,000 businesses compromised by a version of its Orion security platform loaded with malware. The incident, nevertheless, serves as a reminder for businesses to stay on top of information security as we transition on into a more dangerous than ever 2022.
Australia’s Channel Nine interrupted by cyber attack
In March this year, an unknown assailant took down a live broadcast by Australia’s Channel Nine TV station. This ransomware attack locked staff out of emails, internet access and print production systems.
This incident, which serves as a concise visual metaphor for the disruptive effects of cyber crime, has since been described as the largest cyber attack to hit a media company in Australia’s history. The incident itself affected several shows, including the Weekend Today programme, and forced the Sydney-based organisation to shift to its Melbourne studios.
Cause of the OVH data centre fire won’t be revealed until 2022
March played host to a series of incidents, as we also saw a fire erupt at an OVH data centre in the French city of Strasbourg. The destruction resulted in both the loss of data and service outages across Europe. The incident was first reported on 10 March and the firefighters, although they responded almost immediately, were unable to stop a blaze inside the SBG2 building. Four rooms inside SBG1 were also destroyed, although two other data centres owned by OVH were not affected. The company, however, did have to switch off every one of its servers. The official root of the blaze still hasn’t been revealed – and likely won’t until 2022 with OVHCloud’s chairman and founder Octave Klaba apologising for the incident, but remaining tight-lipped on the cause.
Gmail “more secure” than Parliamentary email, claims MP
Train firm slammed over ‘bonus’ phishing test
West Midlands Railway found itself in hot water in May after it dangled the prospect of a company-wide bonus for workers as part of a lure in a phishing simulation test.
Julian Edwards, the train operator’s managing director, emailed the company’s 2,500 employees with a message saying the firm wanted to thank them for their hard work during the COVID-19 pandemic, promising a one-off payment. Those who clicked the link for the bonus, however, received a message telling them this was merely a “phishing simulation test” designed by the firm’s IT team to entice employees.
The email was described as “crass and reprehensible” by the leader of the Transport Salaried Staffs Association, Manuel Cortes. Others in the cyber security community, meanwhile, struck a more diplomatic tone, suggesting this was exactly the type of lure cyber criminals would deploy.