Major Cyberattack on Thailand’s Ministry of Labour Exposes 300GB of Sensitive Data

Published:

spot_img

Cyberattack on Thailand’s Ministry of Labour: A Deep Dive

Overview of the Incident

Recently, a cyberattack attributed to a hacker group known as Devman has targeted Thailand’s Ministry of Labour, resulting in a substantial data breach of over 300 gigabytes. This attack has disrupted critical government functions significantly. Rather than a random act, Devman’s approach was quite calculated; they had access to the Ministry’s network for more than 43 days leading up to the attack.

Preparation and Strategy

In their announcement on a dark web blog, Devman outlined the methods they used to infiltrate the Ministry’s information systems, including both Active Directory and various Linux servers. This extended reconnaissance allowed them to gather vital data methodically, setting the stage for a successful breach.

Public Response and Website Defacement

The breach became glaringly apparent when the Ministry’s official website was compromised. Visitors were met with a message boldly declaring, “THIS IS NOT JUST THE WEBSITE. WHAT YOU WITNESS HERE IS PART OF OUR COORDINATED ATTACK, AIMED AT CRIPPLING THIS MINISTRY.” This act of defacements serves as a clear communication of power from the hackers to the public and the Ministry.

Damage Assessment

At the time of the attack, this threatening message was removed from the website. However, Devman claimed to have encrypted approximately 2,000 laptops, over 98 Linux servers, and more than 50 Windows servers. Disturbingly, they also stated that they had wiped the Active Directory environment, erasing all associated backups. This destruction poses a critical hurdle in any recovery efforts.

Details of the Breached Data

The information obtained includes:

  • Over 600 classified government documents
  • Extensive datasets of citizens and foreign visitors
  • Confidential communications and personal information

Moreover, the attackers have issued a ransom demand of $15 million to prevent the publication or sale of this sensitive data, amplifying the overall impact of the breach.

Vulnerability Analysis

In light of this cyberattack, preliminary investigations conducted by security analysts revealed several vulnerabilities in the Ministry’s digital infrastructure. Though a limited scan, vital weaknesses were identified that contributed to the attack.

Key Vulnerabilities Found:

  1. Insecure Cookie Settings: Missing secure and HttpOnly flags on session cookies heightened the risk of session hijacking.

  2. Outdated jQuery UI Library: The use of jQuery UI version 1.11.4, known for multiple security vulnerabilities, could facilitate arbitrary code execution.

  3. Weak Content Security Policy (CSP): Unsafe directives in the CSP could allow for the execution of malicious scripts.

  4. Exposed Email Addresses: Certain email addresses were publicly accessible, increasing susceptibility to phishing attacks.

  5. Server Technology Fingerprinting: Identifying technologies like PHP and MySQL provided attackers with details valuable for exploitation.

  6. Misconfigured robots.txt File: This file inadvertently disclosed sensitive paths that should not have been publicly accessible.

The combination of these vulnerabilities suggests that the cyberattack likely succeeded due to a mix of client-side vulnerabilities exploited through outdated libraries and weak session management, greatly compromising the Ministry’s network security.

Ongoing Developments

As of now, the Ministry of Labour has not provided an official response to this severe breach. The Cyber Express has reached out for comments but is yet to receive a reply. If the claims by Devman are verified, this cyberattack could be recognized as one of the most significant data breaches in Southeast Asia’s recent history, with devastating implications for a vital governmental body.

Given the reported damage to backup systems and the encryption of numerous devices, recovery will likely be a prolonged and complex process. This evolving story will be monitored closely, with updates on any official responses or announcements from the affected agencies.

The cybersecurity community is keenly observing this case, understanding its implications and potential lessons for organizational security moving forward.

spot_img

Related articles

Recent articles

Discover Six Flags Qiddiya: Opening Date, Ticket Prices, and 28 Record-Breaking Rides

Discovering Qiddiya City: A New Era of Entertainment An Overview of Qiddiya City Nestled in the stunning Tuwaiq Mountains and just a 40-minute drive from Riyadh,...

Five Plead Guilty for Aiding North Korean Hackers in Breaching 136 Companies

U.S. Justice Department Takes Action Against North Korean Fraud Network On Friday, the U.S. Department of Justice (DoJ) announced significant developments in the ongoing fight...

127 Organizations Rally Against Proposed Changes to GDPR and EU Data Protection Laws

A coalition of 127 civil society organizations and trade unions has come together to express their opposition to proposed modifications that they...

Washington Post Confirms Data Breach: CL0P Claims Over 40 Oracle Targets

The Washington Post has confirmed that it recently suffered a data breach linked to a concentrated threat campaign exploiting vulnerabilities...