Incident: Blackbaud Ransomware Attack on Universities' Data.

Published Date: 2020-07-23

Postmortem Analysis
Timeline 1. The software failure incident involving the Blackbaud hack targeting universities and organizations happened in May 2020 as mentioned in the article [102531].
System 1. Blackbaud's cloud computing provider systems were hacked [102531].
Responsible Organization 1. Hackers targeted Blackbaud, the cloud computing provider, causing the software failure incident [102531].
Impacted Organization 1. University of York [Article 102531] 2. Oxford Brookes University [Article 102531] 3. Loughborough University [Article 102531] 4. University of Leeds [Article 102531] 5. University of London [Article 102531] 6. University of Reading [Article 102531] 7. University College, Oxford [Article 102531] 8. Ambrose University in Alberta, Canada [Article 102531] 9. Human Rights Watch [Article 102531] 10. Young Minds [Article 102531] 11. Rhode Island School of Design in the US [Article 102531] 12. University of Exeter [Article 102531]
Software Causes 1. Ransomware attack on Blackbaud's systems [102531] 2. Hackers targeting a cloud computing provider (Blackbaud) [102531] 3. Blackbaud paying the hackers an undisclosed ransom [102531]
Non-software Causes 1. Lack of timely disclosure by Blackbaud about the hack, as they did not disclose the incident externally until July despite the hack occurring in May [102531]. 2. Payment of an undisclosed ransom by Blackbaud to the hackers [102531]. 3. Insufficient reassurance provided by Blackbaud to the affected institutions and individuals regarding the potential misuse of the stolen data [102531]. 4. Concerns raised about the effectiveness of Blackbaud's actions in response to the hack, including doubts about whether all the stolen data had been destroyed [102531]. 5. Delay in reporting the breach to data authorities such as the UK's Information Commissioner's Office and Canadian data authorities, as they were informed weeks after Blackbaud discovered the hack [102531].
Impacts 1. Data of students and/or alumni from at least 10 universities in the UK, US, and Canada, as well as organizations like Human Rights Watch and Young Minds, was stolen by hackers [Article 102531]. 2. The stolen data included information such as phone numbers, donation history, and events attended, but credit card and payment details do not appear to have been exposed [Article 102531]. 3. The affected institutions, including universities and organizations, are sending letters and emails apologizing to those whose data was compromised [Article 102531]. 4. Blackbaud, the cloud computing provider that was hacked, paid an undisclosed ransom to the hackers [Article 102531]. 5. The incident raised concerns about the potential misuse of the stolen data, with experts questioning the reassurances provided by Blackbaud regarding the security of the data [Article 102531]. 6. The breach was reported to data authorities, including the UK's Information Commissioner's Office (ICO) and Canadian data authorities, as required by the General Data Protection Regulation (GDPR) [Article 102531].
Preventions 1. Implementing robust cybersecurity measures such as regular security audits, penetration testing, and intrusion detection systems could have potentially prevented the hack on Blackbaud's systems [102531]. 2. Ensuring timely disclosure of security breaches to relevant authorities and affected parties as per GDPR regulations could have helped mitigate the impact of the incident [102531]. 3. Avoiding the payment of ransom demands to hackers, as advised by law enforcement agencies like the FBI, NCA, and Europol, could have prevented the situation from escalating further [102531].
Fixes 1. Enhancing cybersecurity measures within the affected institutions and cloud computing providers to prevent future hacks [102531]. 2. Implementing stricter data protection protocols and encryption methods to safeguard sensitive information [102531]. 3. Conducting regular security audits and vulnerability assessments to identify and address potential weaknesses in software systems [102531]. 4. Improving incident response and communication strategies to ensure timely and transparent disclosure of breaches to relevant authorities and individuals [102531].
References 1. Blackbaud company statement 2. Universities affected by the hack 3. Human Rights Watch 4. Young Minds 5. Cyber-security specialist Rhys Morgan 6. Barrister blogger Matthew Scott 7. Law enforcement agencies including the FBI, NCA, and Europol 8. UK's Information Commissioner's Office (ICO) 9. Canadian data authorities

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization a) The software failure incident having happened again at one_organization: - Blackbaud, the cloud computing provider targeted in the hack, experienced a ransomware attack in May where hackers stole data from their systems [102531]. b) The software failure incident having happened again at multiple_organization: - Multiple universities in the UK, US, and Canada, including University of York, Oxford Brookes University, Loughborough University, University of Leeds, University of London, University of Reading, University College Oxford, Ambrose University in Alberta, Canada, Rhode Island School of Design in the US, and University of Exeter, were affected by the hack targeting Blackbaud [102531].
Phase (Design/Operation) design, operation (a) The software failure incident in the Blackbaud hack can be attributed to the design phase. The incident occurred due to a ransomware attack on Blackbaud's systems, a cloud computing provider that offers education administration, fundraising, and financial management software [102531]. The hackers targeted Blackbaud's systems, indicating a vulnerability in the design or security measures of the software. Additionally, the delayed disclosure of the hack by Blackbaud and the decision to pay the hackers an undisclosed ransom suggest weaknesses in the system's design or security protocols. (b) The software failure incident can also be linked to the operation phase. The incident involved data being stolen from at least 10 universities, Human Rights Watch, and Young Minds after hackers attacked Blackbaud's systems [102531]. This indicates that the operation of the system, including how data was stored and accessed, played a role in the breach. The fact that the hackers were able to remove a copy of data from Blackbaud's environment before being locked out suggests operational vulnerabilities that allowed unauthorized access to sensitive information.
Boundary (Internal/External) within_system (a) within_system: The software failure incident involving the Blackbaud hack was primarily due to contributing factors that originated from within the system. The hack targeted Blackbaud's systems, which are used for education administration, fundraising, and financial management software [Article 102531]. The ransomware attack resulted in data being stolen from at least 10 universities and organizations, including student and alumni information, donation history, and events attended. Blackbaud discovered and stopped the ransomware attack in May but did not disclose it externally until July, and the company paid the hackers an undisclosed ransom [Article 102531]. The incident involved a breach of data within the Blackbaud system, highlighting a failure originating from within the software system itself.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was primarily due to non-human actions, specifically a ransomware attack on the cloud computing provider Blackbaud's systems. The hackers targeted Blackbaud's systems and managed to steal a subset of data from their self-hosted environment [102531]. (b) However, human actions also played a role in this incident as Blackbaud decided to pay the hackers an undisclosed ransom to prevent the stolen data from being misused. This decision to pay the ransom goes against the advice of law enforcement agencies like the FBI, NCA, and Europol [102531].
Dimension (Hardware/Software) hardware, software (a) The software failure incident in this case occurred due to contributing factors that originate in hardware. The incident involved a hack targeting Blackbaud, a cloud computing provider, where hackers attacked the company's systems. The hack resulted in data being stolen from at least 10 universities in the UK, US, and Canada, as well as from organizations like Human Rights Watch and Young Minds. Blackbaud discovered and stopped a ransomware attack on its self-hosted environment, during which the cyber-criminal removed a copy of a subset of data [Article 102531]. (b) The software failure incident also had contributing factors originating in software. Blackbaud, the software provider, faced criticism for not disclosing the hack externally until July, despite the attack occurring in May. Additionally, Blackbaud paid the hackers an undisclosed ransom, which is against the advice of law enforcement agencies like the FBI, NCA, and Europol. The incident highlighted concerns about data security and privacy, especially under the General Data Protection Regulation (GDPR) [Article 102531].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in this case is malicious. Hackers attacked the cloud computing provider Blackbaud, one of the world's largest providers of education administration, fundraising, and financial management software, with the intent to steal data. The hackers demanded and received an undisclosed ransom from Blackbaud after removing a copy of a subset of data from their systems [102531].
Intent (Poor/Accidental Decisions) poor_decisions [a] The software failure incident related to the Blackbaud hack can be attributed to poor decisions made by the company. Blackbaud paid the hackers an undisclosed ransom after their systems were hacked, which has been criticized for not disclosing the incident externally until July [102531].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the Blackbaud hack incident. Blackbaud, a major provider of education administration software, was hacked in May, but they did not disclose the breach externally until July [102531]. This delay in disclosure could be seen as a lack of professional competence in handling the security incident promptly and transparently. (b) The software failure incident related to accidental factors is seen in the ransomware attack on Blackbaud's systems. The company mentioned that the cyber-criminal removed a copy of a subset of data from their environment before being locked out, indicating an accidental exposure of data due to the attack [102531].
Duration temporary The software failure incident reported in Article 102531 was temporary. The incident involved a ransomware attack on Blackbaud's systems, a cloud computing provider, which resulted in data being stolen from at least 10 universities and other organizations. The hack occurred in May, but Blackbaud did not disclose it externally until July. The company paid the hackers a ransom, and it claimed that the cyber-criminals removed a copy of a subset of data from their environment before being locked out. Blackbaud also mentioned that they had received confirmation that the stolen data had been destroyed. The incident was temporary in nature as it involved a specific breach that was addressed and contained within a certain timeframe, rather than being a permanent failure [102531].
Behaviour crash, omission, timing, other (a) crash: The software failure incident in this case can be categorized as a crash. The incident involved a ransomware attack on Blackbaud's systems, resulting in the loss of data about students, alumni, and other individuals from various institutions. The attack led to a situation where the system lost its state and was unable to perform its intended functions, leading to data theft and compromise [Article 102531]. (b) omission: The software failure incident can also be categorized as an omission. Blackbaud was criticized for not disclosing the hack externally until July, despite the attack occurring in May. This omission to inform the affected parties and the public about the breach in a timely manner can be considered a failure of the system to perform its intended function of promptly notifying stakeholders about security incidents [Article 102531]. (c) timing: The timing of the software failure incident is also relevant. The attack on Blackbaud's systems occurred in May, but the company did not disclose it externally until July. This delay in timing in informing the public and affected parties about the breach can be seen as a failure of the system to perform its intended function at the correct time [Article 102531]. (d) value: The software failure incident did not involve a failure due to the system performing its intended functions incorrectly in terms of the data itself. The stolen data included information like phone numbers, donation history, and events attended, but credit card and other payment details were not exposed. Therefore, there was no indication of the system providing incorrect values in terms of the data compromised [Article 102531]. (e) byzantine: The software failure incident did not exhibit behavior characteristic of a byzantine failure, which involves inconsistent responses and interactions. The incident primarily involved a ransomware attack leading to data theft, with the focus on the loss of data and the response to the breach rather than erratic or inconsistent behavior of the system itself [Article 102531]. (f) other: The software failure incident can be further characterized as a failure to adequately assess the potential risks and impacts of the breach. Some individuals expressed concerns about the reassurances provided by Blackbaud regarding the stolen data, questioning how the company could be certain that the data would not be misused. This failure to address the uncertainties and risks associated with the breach can be considered as another aspect of the incident's behavior [Article 102531].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence The consequence of the software failure incident reported in Article 102531 was primarily related to the impact on people's property and data due to the hack on Blackbaud's systems. The incident resulted in data being stolen about students, alumni, staff, and supporters from various universities and organizations. The stolen data included information such as phone numbers, donation history, and events attended. However, credit card and other payment details do not appear to have been exposed. The affected institutions, including universities and charities, are sending letters and emails apologizing to those whose data was compromised. Additionally, there were concerns raised about the potential misuse of the stolen data by the hackers, as well as the decision of Blackbaud to pay the ransom demanded by the cyber-criminals [102531].
Domain finance, knowledge (a) The failed system was intended to support the education industry, specifically education administration, fundraising, and financial management for universities and other educational institutions. The hack targeted Blackbaud, a provider of such software systems used by universities in the UK, US, and Canada [Article 102531].

Sources

Back to List