In light of the recent Ransomware attacks on HSE IT infrastructure which is being described as the most significant Cyber security attack in the history of the Irish state, we at QuickMinutes wanted to give detailed info on what happened as well as some best practices to avoid Ransomware attacks. We also wanted to give info on how QuickMinutes actively secures its IT infrastructure against these attacks.
It’s been reported that these attacks have come from Russian Cyber criminals using advanced malicious Conti software aka Ransomware to gain access to the HSE network, gather sensitive data and then encrypt the HSE devices and demand a financial sum for the keys to unencrypt the data. We are still unclear on how the attackers gained access to the HSE network but reports suggest it could have been known exploits used on outdated IT software on the HSE staff devices.
What we know about Conti Software;
Conti ransomware is believed to be run by a Russian based cybercrime group known as Wizard Spider. This group uses phishing attacks to install TrickBot and Bazar Loader trojans that provide remote access to the infected machine or machines. They then use this remote access to spread laterally through the network while stealing credentials and harvesting unencrypted data that is stored on workstations and servers. Once they have stolen everything of value and gained access to Windows domain credentials, they wait – during this time they will remain undetected until they strike and deploy the ransomware on the network to encrypt all of its devices. The Conti gang then use the stolen data as leverage forcing the victim to pay the ransom.
Conti is seen as a more sophisticated ransomware type because it is a “double-extortion” ransomware. In other words, where traditional ransomware encrypts files on a computer or system and then unlocks them when a ransom is paid, Conti additionally exfiltrates the data. As a result, the stolen data can then be used to demand a further ransom in exchange for not publishing the data on the dark web.
The original Conti is also a human-operated virus, meaning that rather than automatically worming its way into a system, it can be manipulated by humans.
Some high-profile ransomware attacks conducted by Conti in the past include FreePBX developer Sangoma, IoT chip maker Advantech, Broward County Public Schools (BCPS), and the Scottish Environment Protection Agency (SEPA). The hit on the Scottish Environment Protection Agency (SEPA) took place on Christmas Eve, later publishing roughly 1.2 GB of stolen data on their dark web leak site. Our researchers have noted that the Conti News site has published data stolen from at least 180 victims thus far.
Conti Best Practice Recommendations:
QuickMinutes Security Measures:
1. Azure Cloud IT infrastructure
⦿ More than 90 compliance certifications.
⦿ Including over 50 specific to global regions and countries, such as the US, the European Union, Germany, Japan, the UK, India, and China.
⦿ More than 35 compliance certifications specific to the needs of key industries, including health, government, finance, education, manufacturing, and media.
⦿ Azure adheres to security controls for ISO 27001, ISO 27018, SOC 1, SOC 2, SOC3, FedRAMP, HITRUST, MTCS, IRAP, & ENS.
2. Azure WAF Firewall to protect against common exploits and vulnerabilities:
⦿ WAF is based on Core Rule Set (CRS) 3.1, 3.0, or 2.2.9 from the Open Web Application Security Project (OWASP)
3. Data backups in geo redundant locations.
4. Virus and Malware scanning of all files uploaded and downloaded from the QuickMinutes Servers.
5. Files uploaded to QuickMinutes are encrypted at rest. All files uploaded to Azure Storage services come with built-in support for encryption, based on the 256-bit AES encryption standard. This standard is FIPS 140-2 compliant and is one of the strongest methods available.
6. Strict security policy rules and procedures for all individuals accessing and using QuickMinutes IT assets and resources.
Now more than ever IT infrastructure should be rigorously tested and updated to the latest security standards to protect sensitive users information.
Unlock the potential of QuickMinutes and elevate your meetings and maximize productivity today!
We use cookies to improve your online experience, analyse how our site is performing and offer personalised ads and content. Please let us know if you are happy to accept all cookies.
Our website keeps these types of cookies. You can adjust your preferences at any time. If you want more information about what cookies are and which cookies we collect, please read our cookies policy and our privacy policy.
Name | qm_consent |
Host | quickminutes.com |
Duration | 1 year |
Type | 1st Party |
Category | Strictly Necessary Cookies |
Description | Once affirmative consent has value, show the cookie dialog or hide. |
Name | qm_ga_consent |
Host | quickminutes.com |
Duration | 1 year |
Type | 1st Party |
Category | Performance Cookies |
Description | Once affirmative has value, load the script of google analytics. |
Name | qm_fb_consent |
Host | quickminutes.com |
Duration | 1 year |
Type | 1st Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Once affirmative has value, load the script of facebook pixel. |
Name | qm_chat_consent |
Host | quickminutes.com |
Duration | 1 year |
Type | 1st Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Once affirmative consent has value, show or hide the chat support widget. |
Name | qm_linkedin_consent |
Host | quickminutes.com |
Duration | 6 months |
Type | 1st Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Once affirmative has value, load the script of the Linkedin insight tag. |
Name | qm_mixpanel_consent |
Host | quickminutes.com |
Duration | 1 year |
Type | 1st Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Once affirmative has value, load the script of mixpanel. |
Name | XSRF-TOKEN |
Host | quickminutes.com |
Duration | 2 hours |
Type | 1st Party |
Category | Strictly Necessary Cookies |
Description | To protect cross-site request forgeries. To prevent performing unauthorized commands on behalf of an authenticated user. |
Name | laravel_token |
Host | quickminutes.com |
Duration | 2 hours |
Type | 1st Party |
Category | Strictly Necessary Cookies |
Description | Encrypted JSON Web Token(JWT) to authenticate API request from the application. |
Name | quickminutes_session |
Host | quickminutes.com |
Duration | 2 hours |
Type | 1st Party |
Category | Strictly Necessary Cookies |
Description | Used to know the login status of the user classified under Strictly necessary cookies. |
Name | _ga |
Host | quickminutes.com |
Duration | 2 years |
Type | 1st Party |
Category | Performance Cookies |
Description | Aggregate for the purposes of providing advertising and site analytics services. |
Name | _grecaptcha |
Host | quickminutes.com |
Duration | Persistent |
Type | 1st Party |
Category | Functional Cookies |
Description | Aggregate for the purposes of providing advertising and site analytics services. |
Name | _fbp |
Host | quickminutes.com |
Duration | 90 days |
Type | 1st Party |
Category | Performance Cookies |
Description | Aggregate for the purposes of providing advertising and site analytics services. |
Name | G_ENABLED_IDPS |
Host | quickminutes.com |
Duration | Until closing the browser |
Type | 1st Party |
Category | Strictly Necessary Cookies |
Description | Used for Google Single Sign On. |
Name | NID |
Host | google.com |
Duration | 6 months |
Type | 3rd Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Remarketing activity. |
Name | HSID, SAPISID, SID, SSID |
Host | google.com |
Duration | 2 Years |
Type | 3rd party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Aids Google+ Functionality |
Name | SIDCC |
Host | google.com |
Duration | 1 Year |
Type | 3rd party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Aids Google+ Functionality |
Name | APISID |
Host | google.com |
Duration | 1 Year |
Type | 3rd party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Aggregate analysis of website visitors. |
Name | 1p_JAR |
Host | google.com |
Duration | 30 Days |
Type | 3rd party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Used to track conversion rates. |
Name | __Secure-3PAPISID, __Secure-3PSID, __Secure-APISID, __Secure-HISD, __Secure-SSID |
Host | google.com |
Duration | 2 Years |
Type | 3rd party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Aids Google Functionality. |
Name | DV |
Host | google.com |
Duration | 5 minutes |
Type | 3rd party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Aids Google Functionality. |
Name | CONSENT |
Host | google.com |
Duration | 18 Years |
Type | 3rd party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Aids Google Functionality. |
Name | _GRECAPTCHA |
Host | google.com/recaptcha |
Duration | 179 days |
Type | 3rd Party |
Category | Functional Cookies |
Description | This cookie is used to distinguish between humans and bots.This is beneficial for the website, in order to make valid reports on the use of their website. |
Name | rc::a |
Host | google.com/recaptcha |
Duration | Persistent |
Type | 3rd Party |
Category | Functional Cookies |
Description | This cookie is used to distinguish between humans and bots. |
Name | rc::b, rc::c |
Host | google.com/recaptcha |
Duration | Session |
Type | 3rd Party |
Category | Functional Cookies |
Description | This cookie is used to distinguish between humans and bots. |
Name | rc::d# |
Host | google.com/recaptcha |
Duration | Persistent |
Type | 3rd Party |
Category | Functional Cookies |
Description | This cookie is used to distinguish between humans and bots. |
Name | |
Host | facebook.com |
Duration | Session |
Type | 3rd Party |
Category | Targeting Cookies |
Description | This domain is owned by Facebook. The main activity is Social Media |
Name | yt.innertube::nextId, yt.innertube::requests |
Host | youtube-nocookie.com/embed |
Duration | Persistent |
Type | 3rd Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Registers a unique ID to keep statistics of what videos from Youtube the user has viewed. |
Name | yt-remote-device-id |
Host | youtube-nocookie.com/embed |
Duration | Persistent |
Type | 3rd Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Stores the user's video player preferences using embedded Youtube video. |
Name | yt-remote-cast-installed, yt-remote-connected-devices, yt-remote-fast-check-period, yt-remote-session-app |
Host | youtube-nocookie.com/embed |
Duration | Session |
Type | 3rd Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Stores the user's video player preferences using embedded Youtube video. |
Name | JSESSIONID |
Host | salesiq.zohopublic.eu |
Duration | Until Browser is closed |
Type | 3rd Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Used to maintain anonymous user sessions by Zoho. |
Name | LS_CSRF_TOKEN |
Host | salesiq.zohopublic.eu |
Duration | Until Browser is closed |
Type | 3rd Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | QuickMinutes uses Zoho SalesIQ for its chat room functionality. |
Name | siqlsdb |
Host | salesiq.zohopublic.eu |
Duration | Until Browser is closed |
Type | 3rd Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Sets a unique ID for the session. This allows the Website to obtain data on visitor behaviour for statistical purposes. |
Name | utsdb |
Host | salesiq.zohopublic.eu |
Duration | Until Browser is closed |
Type | 3rd Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Registers data on Visitors website-behaviour. |
Name | zab_g_{exp_key} |
Host | pagesense-collect.zoho.eu |
Duration | 1 year |
Type | 1st Party |
Category | Functional Cookies |
Description | Used to track successful custom/pageview goal conversions obtained in the same domain. |
Name | zabUserID |
Host | pagesense-collect.zoho.eu |
Duration | 1 year |
Type | 1st Party |
Category | Functional Cookies |
Description | Used for identifying individual visitors along with the status of new and returning visitors. |
Name | zabVisitID |
Host | pagesense-collect.zoho.eu |
Duration | 1 year |
Type | 1st Party |
Category | Functional Cookies |
Description | Used for identifying every visit made by the user on the web page. |
Name | zabBucket |
Host | pagesense-collect.zoho.eu |
Duration | 1 year |
Type | 1st Party |
Category | Functional Cookies |
Description | Used to consistently serve visitors the same variation of the test they've seen before. |
Name | zps-tgr-dts |
Host | pagesense-collect.zoho.eu |
Duration | 1 year |
Type | 1st Party |
Category | Targeting Cookies and Third-Party Embeds |
Description | Used for activating our experiment based on a given trigger condition. |
Name | bcookie |
Host | linkedin.com |
Duration | 731 days |
Type | 3rd Party |
Category | Targeting Cookies |
Description | This is a Microsoft MSN 1st party cookie for sharing the content of the website via social media. |
Name | UserMatchHistory |
Host | linkedin.com |
Duration | 30 days |
Type | 3rd Party |
Category | Targeting Cookies |
Description | This cookie is used to track visitors so that more relevant ads can be presented based on the visitor's preferences. |
Name | AnalyticsSyncHistory |
Host | linkedin.com |
Duration | 30 days |
Type | 3rd Party |
Category | Targeting Cookies |
Description | Used by LinkedIN for Analytical purposes. |
Name | lang |
Host | linkedin.com |
Duration | Session |
Type | 3rd Party |
Category | Targeting Cookies |
Description | Used by linkedin for language processing. |
Name | lidc |
Host | linkedin.com |
Duration | 1 day |
Type | 3rd Party |
Category | Targeting Cookies |
Description | This is a Microsoft MSN 1st party cookie that ensures the proper functioning of this website. |
Name | _mixpanel |
Host | mixpanel.com |
Duration | 365 days |
Type | 3rd Party |
Category | Targeting Cookies |
Description | Used to collect product usage data for the purpose of improving our service. |