Gunnebo did nothing to clean up the leak.



[ad_1]

As DN has previously revealed, Gunnebo’s big data breach was on a publicly available server, where anyone could access and download it.

The content was 38,000 files, stolen in a data breach earlier this year. Among other things, drawings showing alarm systems in Swedish banks, documents revealing details about the protection of the Riksdag’s shell, and security drawings for skyscrapers, casinos and luxury stores.

Now new information is emerging about how Gunnebo handled the leak. CEO Stefan Syrén has emphasized in various interviews over the past week that the company knew that the information had been stolen and uploaded long before the media began reporting on it.

But what has not emerged is that Gunnebo did nothing to remove the file, according to the company’s own description, in a completely conscious way.

The server on which the leak was published. It is run by Mega, a New Zealand company that offers online storage. In an email to DN, Mega’s head of legal affairs, Stephen Hall, writes that it wasn’t until October 27, after DN’s disclosure of the leak, that a private person found out about him and informed him about it. the file and referred to a news article.

Then he retired in five minutes.

“We did not receive a report from Gunnebo,” writes Stephen Hall, continuing: “Mega has zero tolerance for illegal activity on its platform and responds quickly to reports.”

DN contacted Gunnebo more than three days before the publication of the first article on the leak. It was also noted that the file was in a commercial service. Even after that, Gunnebo made no attempt to get rid of him, it now seems.

The Mega company is easily accessible. There is a clearly posted email address on their site where you can report abuse.

According to Gunnebo, a conscious decision was behind the fact that no one contacted Mega. Isabelle Ljunggren, who handles Gunnebo’s media contacts, describes it as “a very difficult subject to assess”, with the aim of “minimizing the spread of stolen data to criminal circles.” Gunnebo then saw that it was more risky to try to get rid of the file than to leave it behind, because hackers could auction data to criminals or upload it to more places.

What happens is that the file of Megas The server was easy to find, as the hacker group behind the intrusion had linked to it from their own darknet site.

Leif Nixon, an IT security expert at Sectra Communications, who has analyzed the leak with DN, is critical even though he has some understanding of the reasoning.

– Still weird that they haven’t even tried to delete the files. Of course, the attackers could continue to upload the files over and over again, but they are at least as likely to be happy and move on to the next victim. I think Gunnebo has a moral obligation to reduce the dissemination of its customer data by all available means, he says.

According to Gunnebo, the decision was made after discussions with various experts. However, the company does not want to say who they are. The leak was disclosed to Gunnebo on September 24, CEO Stefan Syrén previously told DN.

Read more: Big data breach from security company Gunnebo

Read more: Revealed in Gunneboläckan: Plan for a gun room at the central bank of Kazakhstan

[ad_2]