Recurring |
one_organization, multiple_organization |
(a) The software failure incident having happened again at one_organization:
The article mentions that Visma, the Norwegian software firm, was breached by hackers working on behalf of Chinese intelligence. This incident is part of a global hacking campaign known as Cloudhopper, which targets technology service and software providers to reach their clients. The article also states that other companies like Hewlett Packard Enterprise Co and IBM were victims of the same campaign [81162].
(b) The software failure incident having happened again at multiple_organization:
The article mentions that the hacking campaign by China's Ministry of State Security, known as Cloudhopper, has targeted multiple technology service and software providers to reach their clients. While specific companies affected by this campaign were not disclosed, it is indicated that there are many more victims beyond Visma, Hewlett Packard Enterprise Co, and IBM [81162]. |
Phase (Design/Operation) |
design, operation |
(a) The software failure incident related to the design phase can be seen in the breach of the network of Norwegian software firm Visma by hackers working on behalf of Chinese intelligence. The breach was part of a global hacking campaign by China's Ministry of State Security to steal intellectual property and corporate secrets. The hackers accessed Visma's network by using stolen login credentials, indicating a failure in the design of the system's authentication and access control mechanisms [81162].
(b) The software failure incident related to the operation phase is evident in the potential catastrophic consequences highlighted by Visma's operations and security manager, Espen Johansen. Although he was confident that no client networks were accessed, he acknowledged the severity of the situation if the hackers had been able to harvest information. This indicates a failure in the operation or misuse of the system that could have led to significant data breaches [81162]. |
Boundary (Internal/External) |
within_system |
(a) The software failure incident involving the breach of Norwegian software firm Visma's network by hackers working on behalf of Chinese intelligence can be categorized as a within_system failure. The breach was initiated by the hackers using stolen login credentials to access Visma's network [81162]. This indicates that the failure originated from within the system itself, as the hackers were able to infiltrate the system using internal credentials. |
Nature (Human/Non-human) |
non-human_actions |
(a) The software failure incident in this case was primarily due to non-human actions, specifically a cyber attack orchestrated by hackers working on behalf of Chinese intelligence [81162]. The breach of the network of Norwegian software firm Visma was a result of the hackers exploiting vulnerabilities and using stolen login credentials to access the systems. The attack was part of a global hacking campaign known as Cloudhopper, targeting technology service and software providers to reach their clients. The hackers were operating as part of a hacking group known as APT 10, which is behind the Cloudhopper campaign. The incident highlights the dangers organizations face from cyber attacks on their supply chains, emphasizing the role of non-human actions in causing software failures. |
Dimension (Hardware/Software) |
software |
(a) The software failure incident related to hardware:
- The software failure incident reported in the article is not attributed to hardware issues but rather to a cyber attack orchestrated by hackers working on behalf of Chinese intelligence [81162].
(b) The software failure incident related to software:
- The software failure incident reported in the article is due to a cyber attack on the network of Norwegian software firm Visma by hackers associated with China's Ministry of State Security [81162]. |
Objective (Malicious/Non-malicious) |
malicious |
(a) The software failure incident reported in the articles is malicious in nature. Hackers working on behalf of Chinese intelligence breached the network of Norwegian software firm Visma to steal secrets from its clients. The attack was part of a global hacking campaign by China's Ministry of State Security to steal intellectual property and corporate secrets [81162]. The attackers accessed Visma's network using stolen login credentials and were operating as part of a hacking group known as APT 10, which is behind the Cloudhopper campaign [81162]. The incident was described as potentially catastrophic, and the hackers' activity inside Visma's network suggested they intended to infiltrate client systems in search of commercially-sensitive information [81162]. |
Intent (Poor/Accidental Decisions) |
poor_decisions |
[a] The intent of the software failure incident in the reported articles is related to poor_decisions. The incident involved hackers working on behalf of Chinese intelligence breaching the network of Norwegian software firm Visma to steal secrets from its clients. This attack was part of a global hacking campaign by China's Ministry of State Security to steal intellectual property and corporate secrets, targeting technology service and software providers to reach their clients [81162]. The attackers accessed Visma's network using stolen login credentials and were operating as part of a hacking group known as APT 10, which is behind the Cloudhopper campaign [81162]. The hackers' activity inside Visma's network suggested they intended to infiltrate client systems in search of commercially-sensitive information [81162]. |
Capability (Incompetence/Accidental) |
unknown |
(a) The software failure incident related to development incompetence is not explicitly mentioned in the provided article. Therefore, it is unknown whether the failure was due to contributing factors introduced due to lack of professional competence by humans or the development organization.
(b) The software failure incident related to accidental factors is also not explicitly mentioned in the article. Therefore, it is unknown whether the failure was due to contributing factors introduced accidentally. |
Duration |
temporary |
The software failure incident reported in the articles is more aligned with a temporary failure rather than a permanent one. This incident was a result of a targeted cyber attack by hackers working on behalf of Chinese intelligence, specifically breaching the network of Norwegian software firm Visma to steal secrets from its clients [81162]. The attack was detected shortly after the hackers accessed Visma's systems, and the company's operations and security manager expressed confidence that no client networks were accessed [81162]. Additionally, cybersecurity experts mentioned that the attackers intended to infiltrate client systems in search of commercially-sensitive information, indicating a temporary breach rather than a permanent failure [81162]. |
Behaviour |
other |
(a) crash: The software failure incident in the article is not described as a crash where the system loses state and does not perform any of its intended functions [81162].
(b) omission: The incident does not involve the system omitting to perform its intended functions at an instance(s) [81162].
(c) timing: The failure is not related to the system performing its intended functions correctly but too late or too early [81162].
(d) value: The software failure incident does not involve the system performing its intended functions incorrectly [81162].
(e) byzantine: The incident does not describe the system behaving erroneously with inconsistent responses and interactions [81162].
(f) other: The behavior of the software failure incident in the article is related to a cybersecurity breach where hackers working on behalf of Chinese intelligence breached the network of Norwegian software firm Visma to steal secrets from its clients. This breach is part of a global hacking campaign by China's Ministry of State Security to steal intellectual property and corporate secrets [81162]. |