The Medibank Hack Scenario

The Medibank Hack Scenario

We can learn plenty of lessons from various hacking scenarios around the world. In this article, I want to focus on the Medibank hack scenario. This is only one of the many scenarios I want to tackle in the future, but we’ll concentrate on the Medibank case for now.?


The Medibank Hack Incident

We’ve got a lot of feedback and reports surrounding the hacking of Medibank — one of Australia’s largest private health insurance providers — but little detail on what actually occurred.?

Let’s take a look at this excerpt from The Conversation that somewhat dove into the details of what happened.?

No alt text provided for this image
How were the data stolen?

The hacker sold the Medibank employee’s credentials to REvil, a notorious cybercriminal group. This group then threatened to release the data they stole within 24 hours if Medibank failed to send them a ransom of an undisclosed amount.?

No alt text provided for this image


What Exactly Could Have Happened?

After reading several articles on this case, my best guess is that the credentials were taken from the employee through a phishing attack.?

A phishing attack is when a hacker sends you an email asking you to go to another website — usually an imitation of a well-known legitimate website — and enter your email, password, and other sensitive information.?

No alt text provided for this image

Alternatively, the employee somehow lost their username and password, but them falling victim to a phishing attack is more likely.?

Now, I’m going into what I believe Medibank could’ve done to prevent this incident from happening.


Use a Zero Trust Policy

Most companies that handle sensitive consumer data implement a Zero Trust policy. This is a framework where users have the minimum amount of access to any information within the company.?

No alt text provided for this image

It’s difficult to say for sure whether or not the Medibank employee should’ve had access to the company’s repositories. However, if that employee didn’t have access to the data when they didn’t need it, then the hack wouldn’t have happened.?


Use Multi-Factor Authentication

It’s also unclear whether or not the employee had multi-factor authentication (MFA) access to the repositories.?

Here’s another interesting point: when incidents like this happen, it’s never because of a single thing. Rather, it’s a combination of things.?

No alt text provided for this image

In essence, the phishing scam alone wasn’t enough to execute the full attack. Let’s say the hackers did compromise the Medibank employee’s number, username, and password, and let’s say they were able to log in. MFA would have stopped the hack right there and prompted Medibank of an unauthorized login — if it was enabled.?


Terminate Accounts or Reset Passwords

Not mentioned in some articles: the employee reportedly left Medibank before the incident happened. Therefore, all of their accounts should’ve been terminated at that point. However, according to some sources, the account with repository access wasn’t terminated.?

No alt text provided for this image

This also wasn’t mentioned in many articles: there was a three-to-six-month time interval between the date the hackers acquired the employee’s credentials and when they sold them to REvil.

During that period, Medibank could’ve forced reset the password of their employee’s account, and the attack could’ve been prevented.


A Combination of Mistakes

As a recap, if any of the following steps were followed, the attack wouldn’t have occurred:?

  • Avoid phishing scams?
  • Terminate the account
  • Reset the password
  • Implement Zero Trust policy
  • Activate MFA

Overall, the Medibank hack scenario isn’t a one-sided failure — it’s a failure of a system across multiple processes.

No alt text provided for this image

To be clear, no reports or releases have been published yet to confirm my interpretation of what happened. However, it’s the best explanation I can come up with just by piecing the facts together.?


The Bottom Line

Businesses should be security-conscious at all times. It’s crucial to run as many security processes as possible to make them fail-safe. If you fall for a phishing scam, MFA can save you. If your credentials get compromised even if you follow good password hygiene, you can force reset your password if necessary.?

Security concerns are becoming more pressing, and I’m going to talk about various compliance frameworks and how they could’ve prevented the Medibank hack scenario from happening. For now, it seems that Medibank — even the size they are — didn’t follow such best practices, and it’s a good lesson for all businesses to consider.?



要查看或添加评论,请登录

Mathew Grace的更多文章

  • Leadership & Career Progression: Actionable Tips to Follow

    Leadership & Career Progression: Actionable Tips to Follow

    What do you think are the hallmarks of great leadership? In this article, I’m sharing my thoughts on the most important…

    4 条评论
  • No Code/Low Code: Did It Miss the Mark?

    No Code/Low Code: Did It Miss the Mark?

    Did the no code/low code campaign miss or hit the mark? Here’s what I think: it hit a different area from what it was…

    3 条评论
  • Start With The Customer Experience

    Start With The Customer Experience

    I’ve produced nearly 100 videos on Flying Donkey’s YouTube channel. And I’ve never featured any popular videos from…

    1 条评论
  • Insolvencies and The Growth-at-All-Costs Mindset

    Insolvencies and The Growth-at-All-Costs Mindset

    It’s been a tough period for technology companies since there’s been a shift from a growth-at-all-cost mindset to a…

    2 条评论
  • Remote, Hybrid or In-Office: What Works for SaaS Teams?

    Remote, Hybrid or In-Office: What Works for SaaS Teams?

    Prior to the COVID-19 pandemic, almost all software development companies worked in offices. Some tinkered with the…

    2 条评论
  • Product/Market Fit: What Does It Mean?

    Product/Market Fit: What Does It Mean?

    I’ve talked to a lot of companies trying to launch their product, and they’ve all told me they have the so-called…

  • Does the Best SaaS Product Always Win?

    Does the Best SaaS Product Always Win?

    Does the best product always win? That’s a tough question to answer, but in my experience, the best product doesn’t…

    3 条评论
  • Using Templates in Your SaaS Products

    Using Templates in Your SaaS Products

    Are you using templates in your business? If not, you should — they offer truly surprising benefits in terms of product…

    1 条评论
  • Creating a Crypto Coin: The Fluffy Coin Experiment

    Creating a Crypto Coin: The Fluffy Coin Experiment

    Today, I want to talk about crypto — specifically, launching crypto coins, what’s involved in the process, and what…

    1 条评论
  • How Business Works: Insights from Microsoft’s Activision Acquisition

    How Business Works: Insights from Microsoft’s Activision Acquisition

    Recently, Microsoft said it would acquire Activision Blizzard in a multi-billion-dollar transaction. This deal has…

    4 条评论

社区洞察

其他会员也浏览了