Incident: Cyber-Attack Disrupts Internet Access for UK Service Providers

Published Date: 2016-12-01

Postmortem Analysis
Timeline 1. The software failure incident happened in November 2016. - The incident began on Sunday, which was before the article was published on December 1, 2016 [Article 49954].
System 1. Broadband routers running the Linux operating system were targeted by the Mirai worm, causing internet connection issues for customers of service providers like TalkTalk, the Post Office, and KCom [49954].
Responsible Organization 1. The Mirai worm, a malware that targets devices running the Linux operating system, was responsible for causing the software failure incident affecting internet service providers in the UK and Europe [49954].
Impacted Organization 1. TalkTalk [49954] 2. Post Office [49954] 3. KCom [49954] 4. Deutsche Telekom [49954]
Software Causes 1. The software cause of the failure incident was a coordinated cyber-attack using the Mirai worm, which targeted certain types of broadband routers running the Linux operating system, leading to internet connection disruptions for customers of various service providers [49954].
Non-software Causes 1. The failure incident was caused by a coordinated cyber-attack involving the Mirai worm, affecting internet service providers in the UK and Europe [49954]. 2. The attack targeted certain types of broadband routers, damaging their internet connection [49954]. 3. The attack was part of a worldwide effort, with no one claiming responsibility for it [49954]. 4. The attack led to internet access being cut off for more than 100,000 people in the UK and up to 900,000 customers of Deutsche Telekom in Germany [49954].
Impacts 1. More than 100,000 people in the UK had their internet access cut due to the cyber-attack, with a total of about a million affected in Europe [49954]. 2. Service providers like TalkTalk, the Post Office, and KCom experienced disruptions in their services, affecting a significant number of customers [49954]. 3. Germany's Deutsche Telekom reported that up to 900,000 of its customers lost internet connection as part of the same incident [49954]. 4. The attack targeted certain types of broadband routers, damaging their internet connection and causing disruption to online services [49954]. 5. The attack impacted various internet service providers in the UK and abroad, leading to connection issues for some customers [49954].
Preventions 1. Implementing strong network-level controls and security measures to protect against malware attacks like the Mirai worm could have prevented the software failure incident [49954]. 2. Regularly updating and patching devices running the Linux operating system to prevent them from being compromised and used in attacks could have helped prevent the incident [49954]. 3. Enhancing cybersecurity measures and monitoring for unusual network activity to detect and mitigate potential threats before they cause widespread disruption could have been a preventive measure [49954].
Fixes 1. Implementing additional network-level controls to protect customers from the Mirai worm attack [49954] 2. Identifying and resolving the source of the problem that led to service disruptions for customers [49954] 3. Rolling out resolutions to all customers affected by the attack [49954] 4. Blocking future attacks from impacting customers by putting in place measures to enhance network security [49954]
References 1. TalkTalk 2. Post Office 3. KCom 4. Deutsche Telekom 5. Security experts 6. German Chancellor Angela Merkel 7. Jonathan Sander from Lieberman Software 8. Ofcom (UK communications regulator) [49954]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: - TalkTalk confirmed that it had been affected by the Mirai worm cyber-attack, similar to a previous incident where a similar attack had targeted certain types of broadband routers [49954]. (b) The software failure incident having happened again at multiple_organization: - The Mirai worm cyber-attack affected not only TalkTalk but also other service providers in the UK such as the Post Office and KCom [49954]. - Additionally, the incident was part of a worldwide effort, with Germany’s Deutsche Telekom reporting up to 900,000 customers losing their internet connection due to the same attack [49954].
Phase (Design/Operation) design, operation (a) The software failure incident in the articles is primarily related to the design phase. The incident was caused by a coordinated cyber-attack using the Mirai worm, which targeted certain types of broadband routers, damaging their internet connection [49954]. This attack was spread via compromised computers and took control of devices running the Linux operating system to knock services offline. The attack affected multiple service providers and disrupted internet access for a significant number of customers in the UK and Europe. The incident highlights the vulnerability of systems to cyber-attacks due to design flaws or vulnerabilities introduced during system development or updates. (b) The software failure incident is also related to the operation phase. The attack disrupted the services of broadband customers, leading to internet connection issues for a significant number of users [49954]. The operation of the affected systems was impacted by the cyber-attack, causing service problems for customers. Service providers like TalkTalk, the Post Office, and KCom had to take steps to review the potential impacts of the Mirai worm and deploy additional network-level controls to protect their customers. The incident demonstrates how the operation of systems can be affected by external threats and the importance of implementing measures to mitigate such risks.
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident related to the Mirai worm attack on internet service providers in the UK, including TalkTalk, the Post Office, and KCom, was caused by malware that spread via compromised computers and targeted certain types of broadband routers, damaging their internet connection [49954]. (b) outside_system: The Mirai worm attack, which affected more than 100,000 people in the UK and up to 900,000 customers of Deutsche Telekom, was believed to be a coordinated cyber-attack that originated from outside the systems of the affected service providers. The attack was part of a worldwide effort, and no one claimed responsibility for it. Security experts speculated that the hackers may have been Russian, but there was no concrete proof of their identity [49954].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was primarily due to non-human actions, specifically a coordinated cyber-attack using the Mirai worm. The attack targeted certain types of broadband routers, causing internet connection issues for customers of various service providers like TalkTalk, the Post Office, and KCom [49954]. (b) Human actions also played a role in responding to the incident. Service providers like TalkTalk and the Post Office took steps to review the potential impacts of the Mirai worm and deployed additional network-level controls to protect their customers. The Post Office confirmed that a "third party disrupted the services" of its broadband customers, but reassured that no personal data or devices were compromised. KCom also implemented measures to block future attacks and notified the communications regulator Ofcom about the incident [49954].
Dimension (Hardware/Software) hardware, software (a) The software failure incident reported in the articles was primarily due to hardware-related factors. The incident involved a coordinated cyber-attack using the Mirai worm, which targeted devices running the Linux operating system, specifically certain types of broadband routers, to disrupt internet connections [49954]. (b) The software failure incident was also influenced by software-related factors as the Mirai worm, a malware, was used to exploit vulnerabilities in the software running on the affected devices, ultimately leading to the disruption of internet services for customers of various service providers [49954].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the articles is malicious in nature. It was caused by a coordinated cyber-attack using the Mirai worm, which is spread via compromised computers. The attack targeted certain types of broadband routers, taking control of devices running the Linux operating system and using them to knock services offline. The attack affected multiple service providers in the UK and Germany, leading to internet outages for hundreds of thousands of customers. Security experts speculated that the hackers behind the attack may have been Russian, although no one claimed responsibility. The attack was part of a worldwide effort, and the German chancellor mentioned that such cyber-attacks are now part of daily life and must be coped with [49954].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the Mirai worm cyber-attack on internet service providers in the UK, including TalkTalk, the Post Office, and KCom, was primarily driven by poor decisions made by hackers. The attack aimed to disrupt services by taking control of devices running the Linux operating system and knocking services offline. Security experts speculated that the hackers, possibly Russian, may have targeted specific types of broadband routers to cause disruption rather than for monetary gain. The attack on Deutsche Telekom and other service providers was seen as part of a coordinated effort globally, highlighting the increasing prevalence of cyber-attacks as part of daily life [49954].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the article as it mentions the Mirai worm attack that targeted certain types of broadband routers, damaging their internet connection. This attack was part of a coordinated cyber-attack affecting multiple service providers in the UK and Europe [49954]. (b) The software failure incident related to accidental factors is also present in the article as it discusses how the Mirai worm attack may have been aimed at causing disruption rather than for financial gain. Security experts speculated that the shutdown of devices hit by the attack could have been a mistake by the hackers, indicating a potential accidental aspect to the incident [49954].
Duration temporary (a) The software failure incident described in the articles can be categorized as temporary. The incident involved a cyber-attack using the Mirai worm that affected internet service providers in the UK and Europe, leading to internet access being cut off for more than 100,000 people in the UK and up to about a million people in Europe [49954]. The attack targeted certain types of broadband routers, causing disruption to internet services. Service providers like TalkTalk, the Post Office, and KCom confirmed the impact on their customers but also mentioned taking steps to review and mitigate the effects of the Mirai worm. The incident was described as part of a worldwide effort, with no one claiming responsibility for the attack. Measures were put in place to block future attacks and ensure a consistent approach to mitigating the threat [49954].
Behaviour crash, omission, value, other (a) crash: The software failure incident in the articles can be categorized as a crash. The incident led to more than 100,000 people in the UK losing their internet access due to a coordinated cyber-attack, causing service providers like TalkTalk, the Post Office, and KCom to be affected by the Mirai worm. This resulted in customers experiencing problems with their internet connection, with some routers being shut down by the attack, rendering them unable to perform their intended functions [Article 49954]. (b) omission: The software failure incident can also be linked to omission. The attack caused the affected routers to omit their intended functions of providing internet connectivity to the customers. This omission resulted in service disruptions for a significant number of users, impacting their ability to access the internet as expected [Article 49954]. (c) timing: The timing of the software failure incident is not explicitly mentioned in the articles. However, it is evident that the attack occurred over a specific period, affecting customers since Saturday and Sunday. The timing of the attack led to customers experiencing problems with their internet connection during that timeframe [Article 49954]. (d) value: The software failure incident can be associated with a failure in value. The Mirai worm attack caused the affected routers to perform their intended functions incorrectly by shutting down the devices they hit, leading to a loss of internet connection for the impacted customers. This incorrect behavior resulted in disruption and inconvenience for the users [Article 49954]. (e) byzantine: The software failure incident does not exhibit characteristics of a byzantine failure. The attack, although coordinated and widespread, did not involve inconsistent responses or interactions from the affected devices or systems. The primary impact was on disrupting internet services rather than exhibiting erratic or inconsistent behavior [Article 49954]. (f) other: The software failure incident can be further categorized as a denial-of-service (DoS) attack. The Mirai worm targeted specific types of broadband routers, causing them to be shut down and disrupting internet services for the affected customers. This deliberate action to overload the routers and prevent them from functioning correctly aligns with the characteristics of a DoS attack, where the goal is to disrupt normal operations [Article 49954].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence delay, non-human, theoretical_consequence, other (a) death: There is no mention of any deaths resulting from the software failure incident in the provided article [49954]. (b) harm: There is no mention of physical harm to individuals resulting from the software failure incident in the provided article [49954]. (c) basic: There is no mention of people's access to food or shelter being impacted due to the software failure incident in the provided article [49954]. (d) property: The software failure incident impacted people's internet access, but there is no specific mention of material goods, money, or data being directly impacted in the article [49954]. (e) delay: The software failure incident caused internet connection issues for customers of various service providers, leading to a delay in their normal internet usage [49954]. (f) non-human: The software failure incident affected devices running the Linux operating system, broadband routers, and internet services, which are non-human entities [49954]. (g) no_consequence: There were observed consequences of the software failure incident, such as internet connection issues for customers of different service providers [49954]. (h) theoretical_consequence: There were discussions about potential consequences of the software failure incident, such as the speculation that the hackers may have been Russian and the suggestion that the aim of the attack may have been to cause disruption [49954]. (i) other: The software failure incident led to a disruption in internet services for customers of various service providers, impacting their ability to use the internet as usual [49954].
Domain information, utilities, government (a) The software failure incident affected internet service providers in the UK, such as TalkTalk, the Post Office, and KCom, disrupting the production and distribution of information to more than 100,000 customers [49954]. (g) The failure incident impacted the internet services provided by companies like TalkTalk, the Post Office, and KCom, which are essential for delivering online services and information, falling under the utilities category [49954]. (l) The incident involved a cyber-attack on internet service providers like TalkTalk, the Post Office, and KCom, which are crucial for communication and information exchange, aligning with the government sector's need for reliable communication services [49954].

Sources

Back to List