Incident: Cyberattack on Bayer by Winnti Group: Data Breach Averted

Published Date: 2019-04-04

Postmortem Analysis
Timeline 1. The software failure incident at Bayer due to a cyberattack by the hacker group Winnti was detected by Bayer's Cyber Defense Center in early 2018 [83544]. 2. Published on 2019-04-04. 3. The software failure incident at Bayer due to the cyberattack by Winnti occurred in early 2018.
System 1. Bayer's network systems [83544] 2. Cyber Defense Center's monitoring system [83544]
Responsible Organization 1. Hacker group "Winnti" and potentially "Wicked Panda" from China were responsible for causing the software failure incident at Bayer [83544].
Impacted Organization 1. Bayer [83544] 2. Three companies from the German Mittelstand sector (Chemie, Maschinen- und Anlagenbau, Software) [83544]
Software Causes 1. Cyberattack by the hacker group Winnti, indicating a potential software vulnerability exploited by the attackers [83544]. 2. Presence of the Winnti malware on the systems, suggesting a possible malware infection leading to the incident [83544]. 3. Lack of clarity on when the hackers gained access to Bayer's network, indicating a potential security flaw or vulnerability in the network infrastructure [83544]. 4. Potential communication channels left open by Bayer's Cyber Defense Center to monitor the attackers, highlighting a possible oversight in system security measures [83544].
Non-software Causes 1. The cyberattack on Bayer was attributed to the hacker group "Wicked Panda" from China, which is linked to Winnti, indicating a potential state-sponsored attack [83544]. 2. The Bundesnachrichtendienst (BND) warned of increasing cyberattacks for political, military, or economic advantages globally, with Germany and EU partners being affected [83544]. 3. The hacker group Winnti, believed to act on behalf of the Chinese state, was also responsible for the cyberattack on ThyssenKrupp in 2016 [83544].
Impacts 1. The software failure incident led to Bayer becoming a victim of a cyberattack by the hacker group Winnti, with extensive analyses initiated by Bayer's Cyber Defense Center [83544]. 2. There was no evidence of data leakage as a result of the cyberattack [83544]. 3. The exact extent of the damage caused by the cyberattack was not immediately foreseeable [83544]. 4. The cyberattack was attributed to the group "Wicked Panda" from China, associated with Winnti, as indicated by experts consulted by Bayer [83544]. 5. The cyberattack on Bayer was under observation until the end of March, with infected systems intentionally left uncleansed initially to analyze potential communication from the attackers [83544]. 6. The cyberattack on Bayer was part of a larger trend where cyber-attacks are considered significant risks for businesses, with the BND warning of increasing cyber threats globally [83544]. 7. The Winnti malware was also found in at least three other German companies in the chemical, machinery, and software sectors, indicating a broader impact beyond Bayer [83544].
Preventions 1. Implementing robust cybersecurity measures such as regular security audits, penetration testing, and intrusion detection systems could have potentially prevented the cyberattack on Bayer [83544]. 2. Enhancing employee cybersecurity awareness and training to recognize and respond to phishing attempts or suspicious activities could have helped in preventing unauthorized access to the network [83544]. 3. Collaborating with cybersecurity experts and organizations like the Deutsche Cyber-Sicherheitsorganisation (DCSO) for proactive threat intelligence and mitigation strategies could have bolstered Bayer's defenses against such cyber threats [83544].
Fixes 1. Enhancing cybersecurity measures to prevent future cyberattacks, such as implementing stronger network security protocols and regular security audits [83544].
References 1. Bayer's Cyber Defense Center 2. Deutsche Cyber-Sicherheitsorganisation (DCSO) 3. Staatsanwaltschaft Köln 4. Landeskriminalamt in Nordrhein-Westfalen 5. Bundesnachrichtendienst (BND) 6. BR and NDR (Bayerischer Rundfunk and Norddeutscher Rundfunk) 7. Bundesamt für Sicherheit in der Informationstechnik

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to a cyberattack by the hacker group Winnti at Bayer has similarities with a previous incident at ThyssenKrupp in 2016, where Winnti was also implicated in the cyber-attack [83544]. (b) The Winnti cyber-attack that targeted Bayer is not an isolated incident. The same hacker group has been involved in cyber-attacks at other organizations as well. According to reports, the Winnti malware was found in at least three other German companies from the middlestand sector, including those in the fields of chemistry, mechanical and plant engineering, and software [83544].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the cyberattack on Bayer by the hacker group Winnti. The attack was detected by Bayer's Cyber Defense Center in early 2018, leading to extensive analyses and collaboration with experts like the Deutsche Cyber-Sicherheitsorganisation (DCSO) [83544]. This incident highlights a failure in the design phase as the attackers exploited vulnerabilities in Bayer's systems, indicating potential weaknesses introduced during system development or updates. (b) The software failure incident related to the operation phase is demonstrated by the actions taken by Bayer's Cyber Defense Center in response to the cyberattack. The experts identified, analyzed, and cleaned the affected systems in collaboration with external organizations like the DCSO and the State Criminal Police Office in North Rhine-Westphalia [83544]. This operational failure suggests that the attack was able to penetrate Bayer's network, possibly due to operational lapses or misuse of the system, leading to the need for extensive cleanup and monitoring efforts.
Boundary (Internal/External) within_system, outside_system (a) The software failure incident reported in the article is within_system. The failure was a result of a cyberattack by the hacker group Winnti on Bayer's network. Bayer's Cyber Defense Center identified and analyzed the attack, working closely with experts and law enforcement to clean the affected systems. The incident involved potential communication analysis with the attackers before cleaning the infected systems [83544]. (b) The software failure incident was also influenced by factors outside the system, specifically the actions of the hacker group Winnti, which is believed to be associated with the Chinese group "Wicked Panda." This external threat actor was responsible for the cyberattack on Bayer, indicating that the failure originated from outside the system [83544].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was due to non-human actions, specifically a cyberattack by the hacker group Winnti, which is believed to be connected to the group "Wicked Panda" from China [83544]. (b) Human actions were involved in the response to the incident, as experts from Bayer's Cyber Defense Center, the Deutsche Cyber-Sicherheitsorganisation (DCSO), and the Landeskriminalamt in Nordrhein-Westfalen worked together to identify, analyze, and clean the affected systems. Additionally, the decision to initially not clean the infected systems to analyze potential communication from the attackers was a human action taken by Bayer's Cyber Defense Center [83544].
Dimension (Hardware/Software) hardware (a) The software failure incident reported in Article 83544 is related to a cyberattack on Bayer by the hacker group Winnti. The incident was detected by Bayer's Cyber Defense Center in early 2018. The attack was attributed to the group "Wicked Panda" from China, which is linked to Winnti. The hackers gained access to Bayer's network, and the Cyber Defense Center identified, analyzed, and cleaned the affected systems in collaboration with experts and law enforcement agencies. The incident involved a cyberattack originating from external sources (hardware-related) [83544]. (b) The software failure incident in Article 83544 was caused by a cyberattack, indicating a failure originating in software systems. The hackers targeted Bayer's systems, leading to the need for analysis, identification, and cleaning of the affected software systems by Bayer's Cyber Defense Center. The incident highlights the vulnerability of software systems to cyber threats and the importance of cybersecurity measures to protect against such attacks [83544].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in Article 83544 was malicious in nature. Bayer was a victim of a cyberattack by the hacker group Winnti, with indications pointing to the involvement of the group "Wicked Panda" from China. The attack was detected by Bayer's Cyber Defense Center in early 2018, and extensive analyses were initiated. The incident involved unauthorized access to Bayer's network by hackers, with the objective likely being to obtain sensitive information or disrupt operations. The seriousness of the attack is highlighted by the involvement of authorities like the Deutsche Cyber-Sicherheitsorganisation (DCSO) and the State Prosecutor's Office in Cologne in the investigation [83544].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident related to poor_decisions: - The software failure incident at Bayer was a result of a cyberattack by the hacker group Winnti, which is believed to be connected to the Chinese group "Wicked Panda" [83544]. - The attack was detected by Bayer's Cyber Defense Center in early 2018, and extensive analyses were initiated [83544]. - The hackers were under observation by Bayer's Cyber Defense Center until the end of March, during which the infected systems were intentionally not cleaned to analyze potential communication from the attackers [83544]. (b) The intent of the software failure incident related to accidental_decisions: - There is no specific mention in the article indicating that the software failure incident at Bayer was due to accidental decisions.
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the article as Bayer fell victim to a cyberattack by the hacker group Winnti. The Cyber Defense Center of Bayer detected the attack in early 2018 and initiated extensive analyses. Despite the attack, there was no evidence of data leakage. The incident showcases the need for robust cybersecurity measures and expertise to prevent and mitigate such attacks [83544]. (b) The accidental aspect of the software failure incident is not explicitly mentioned in the provided article.
Duration temporary (a) The software failure incident in the article is more temporary in nature. The cyberattack on Bayer by the hacker group Winnti was detected by Bayer's Cyber Defense Center in early 2018. Extensive analyses were initiated, and the affected systems were identified, analyzed, and cleaned by the experts. The hackers were under observation until the end of March of the same year, and the infected systems were deliberately not cleaned initially to analyze potential communication from the attackers. All systems were eventually cleaned by the end of March, and the hackers had not been active until then [83544].
Behaviour omission, other (a) The software failure incident described in the article is related to a cyberattack on Bayer by the hacker group Winnti. The incident led to Bayer's Cyber Defense Center identifying and analyzing the affected systems, eventually cleaning them up to mitigate the attack. The systems were intentionally not cleaned immediately to observe potential communication from the attackers [83544]. (b) The software failure incident involved the system omitting to perform its intended functions as it was compromised by the cyberattack. The hackers gained access to Bayer's network, and the Cyber Defense Center had to work on identifying, analyzing, and cleaning the affected systems to address the omission of proper system functioning [83544]. (c) The timing of the software failure incident is notable as the hackers had access to Bayer's network, but the Cyber Defense Center kept them under observation until the end of March before cleaning the infected systems. This delayed response was intentional to monitor potential communication from the attackers [83544]. (d) The software failure incident did not involve the system performing its intended functions incorrectly. Instead, the failure was due to a cyberattack compromising Bayer's network, leading to the need for extensive analysis and cleanup by the Cyber Defense Center [83544]. (e) The software failure incident did not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. The incident was primarily characterized by the cyberattack and the subsequent actions taken by Bayer's Cyber Defense Center to address the breach [83544]. (f) The other behavior exhibited in this software failure incident is the intentional decision by Bayer's Cyber Defense Center to not immediately clean the infected systems to observe potential communication from the attackers. This strategic approach was part of the response to the cyberattack on Bayer's network [83544].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence theoretical_consequence, other (a) death: There is no mention of any deaths resulting from the software failure incident in the provided article [83544]. (b) harm: The article does not mention any physical harm caused to individuals due to the software failure incident [83544]. (c) basic: The incident did not impact people's access to food or shelter [83544]. (d) property: The software failure incident did not result in any direct impact on people's material goods, money, or data as there was no evidence of data leakage mentioned [83544]. (e) delay: There is no specific mention of any activities being postponed due to the software failure incident [83544]. (f) non-human: The software failure incident impacted the systems and networks of Bayer and potentially other companies, but there is no mention of non-human entities being directly impacted [83544]. (g) no_consequence: The article does not mention any observed consequences of the software failure incident [83544]. (h) theoretical_consequence: The article discusses the potential consequences of cyber-attacks on businesses, highlighting the increasing risk of cyber-attacks and the need for collective action to defend against them [83544]. (i) other: The software failure incident led to the involvement of the Cyber Defense Center of Bayer, the Deutsche Cyber-Sicherheitsorganisation (DCSO), and the State Criminal Police Office in North Rhine-Westphalia for analysis and cleanup of the affected systems, indicating a disruption in normal operations and potential security concerns [83544].
Domain information, health (a) The failed system was related to the information industry as Bayer, the victim of the cyberattack, is a pharmaceutical and agrochemical company [83544]. The incident involved a cyberattack by the hacker group Winnti, indicating a breach in the information security systems of Bayer, a company operating in the information industry.

Sources

Back to List