Technical Report RHUL–ISG–2020–5 22 June 2020
Total Page:16
File Type:pdf, Size:1020Kb
The WannaCry Attack: An Evaluation of Centrally Mandated Information Governance for the English NHS and Local Government Tony Leary Technical Report RHUL–ISG–2020–5 22 June 2020 Information Security Group Royal Holloway University of London Egham, Surrey, TW20 0EX United Kingdom Student Number: 100886647 Anthony Leary THE WANNACRY ATTACK: AN EVALUATION OF CENTRALLY MANDATED INFORMATION GOVERNANCE FOR THE ENGLISH NHS AND LOCAL GOVERNMENT Supervisor: Geraint Price Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from published or unpublished work of other people. I also declare that I have read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences, and in accordance with these regulations I submit this project report as my own work. Signature: Date: 21st August 2019 Information Security Group Royal Holloway University of London Egham, Surrey, TW20 0EX United Kingdom i Page Intentionally Left Blank ii Keywords NHS, WannaCry, Ransomware, Security Management, Local Government, Local Authorities, Health and Social Care Information Centre, HSCIC, NHS Digital, information governance, cyber security, malware, information security. iii Acknowledgements I would like to express my gratitude to my course advisor, Prof. Peter Komisarczuk, and my project supervisor, Dr Geraint Price, for their guidance. And a huge thank you to Sara, my wife, and to my children, Danny and Erin. Their support and understanding over the last two years allowed me to focus, not only on this project, but the whole MSc programme. iv Table of Contents Keywords .................................................................................................................... iii Acknowledgements ..................................................................................................... iv Table of Contents ......................................................................................................... v List of Figures ............................................................................................................ vii List of Tables............................................................................................................. viii List of Abbreviations................................................................................................... ix Executive Summary ..................................................................................................... x Chapter 1: Introduction ...................................................................................... 1 1.1 Context ................................................................................................................ 1 1.2 Objectives ........................................................................................................... 1 1.3 Structure Of The Remainder Of This Dissertation ............................................. 2 Chapter 2: Background ....................................................................................... 5 2.1 Approach............................................................................................................. 5 2.2 What Is Ransomware? ........................................................................................ 5 2.3 The WannaCry Attack ...................................................................................... 12 2.4 The NHS in England ......................................................................................... 18 2.5 English Local Government ............................................................................... 19 2.6 NAO report: “Investigation: WannaCry cyber-attack and the NHS” ............... 20 2.7 NHS report: “Lessons learned review of the WannaCry ransomware attack” . 22 2.8 UK Parliament report: “Cyber-attack on the NHS” ......................................... 23 2.9 Summary ........................................................................................................... 23 Chapter 3: Governance Analysis ...................................................................... 25 3.1 Approach........................................................................................................... 25 3.2 ISO/IEC 27001:2013 Annex A controls ........................................................... 25 3.3 Cyber Essentials................................................................................................ 27 3.4 WannaCry: Security Control Failures .............................................................. 27 3.5 NHS England Security Controls ....................................................................... 29 3.6 English Local Government Security Controls .................................................. 32 3.7 Summary ........................................................................................................... 34 Chapter 4: Data Discovery Methodology ........................................................ 35 v 4.1 Approach ........................................................................................................... 35 4.2 Information Commissioner’s Office Data ........................................................ 35 4.3 Organisational Breach Reporting: NHS England ............................................. 37 4.4 Organisational Breach Reporting: Local Government ..................................... 39 4.5 Summary ........................................................................................................... 44 Chapter 5: Data Analysis................................................................................... 47 5.1 Approach ........................................................................................................... 47 5.2 ICO Complaint Data ......................................................................................... 47 5.3 ICO Civil Monetary Penalty (CMP) Data ........................................................ 53 5.4 ICO Security Incident Trends April 2016 to Sept. 2018 .................................. 56 5.5 Summary ........................................................................................................... 58 Chapter 6: Conclusions...................................................................................... 59 6.1 Governance Weaknesses ................................................................................... 59 6.2 Vulnerability Reporting .................................................................................... 60 6.3 Security Data Reporting .................................................................................... 60 6.4 Limitations ........................................................................................................ 61 6.5 Recommendations ............................................................................................. 61 Bibliography ............................................................................................................. 63 Appendices ................................................................................................................ 78 Appendix A Project Analysis of ICO Complaint Data .............................................. 79 Appendix B Project Evaluation of ICO Civil Monetary Penalty Data ...................... 82 Appendix C Project Evaluation of ICO Security Incident Data ................................. 86 vi List of Figures Figure 1 Google search term trends: malware & ransomware 2004 to 2018 [11] ....... 6 Figure 2 Kaspersky ransomware detection trends [37]–[39] ..................................... 11 Figure 3 NHS England structure [71, pp. 2–3], [73] .................................................. 18 Figure 4 English LA funding and relationships [3], [71, p. 3], [74] .......................... 20 Figure 5 Frequency of Annex A control sets in Table 16: ICO CMP NHS data ....... 54 Figure 6 Frequency of Annex A control sets in Table 17: ICO CMP LA data.......... 54 Figure 7 ICO incident data NHS 2016/17 and 2017/18 ............................................. 57 Figure 8 ICO security incident data for LAs 2016/17 and 2017/18 ........................... 57 vii List of Tables Table 1 CVSS 3.0 severity scale from [58, Sec. 5] .................................................... 14 Table 2 CVSS 3.0 metrics and values, based on [58, Secs 6 and 8.4] ....................... 15 Table 3 ISO 27001 Annex A summary, from [7, pp. 10–22] .................................... 26 Table 4 Project evaluation of WannaCry root causes using ISO 27001 [7] .............. 28 Table 5 Project evaluation of WannaCry root causes and IGT v.14 [90] .................. 30 Table 6 Project evaluation of WannaCry root causes and DSPT v1.9.6 [83] ............ 32 Table 7 Project evaluation of WannaCry control failures and PSN V1.31 [97] ........ 33 Table 8 Project analysis of ICO complaint reporting fields ....................................... 48 Table 9 Project summary of ICO data sets ................................................................. 49 Table 10 Project evaluation of ICO case outcome applicability ................................ 50 Table 11 Project evaluation of ICO complaint nature and CIA applicability ............ 51 Table 12 Project analysis of ICO complaints relating to security failures ................. 52 Table 13 Project analysis of ICO