Tax software blamed for cyber-attack spread


By Jane Wakefield

A global cyber-attack that affected companies around the world may have started via corrupted updates on a piece of accountancy software.

Fingers are increasingly pointing to a piece of Ukrainian tax-filing software, MEDoc, as the source of the infection, although the company denies it.

Malware generally infiltrates networks via email attachments that users click on in error.

Microsoft described the method as “a recent dangerous trend”.

The cyber-attack has caused disruption around the world and infected companies in 64 countries, including banks in Ukraine, Russian oil giant Rosneft, British advertising company WPP and US law firm DLA Piper.

Automatic updates

Shipping giant Maersk said it was unable to process new orders and was expecting delays to consignments, while one of Europe’s largest port operators in Rotterdam said that it had to use manual processes, and Dutch global parcel service TNT said it was operating with restrictions.

A Cadbury’s factory on the island state of Tasmania ground to a halt when computer systems went down, according to Australian Manufacturing and Workers Union state secretary John Short.

Ukraine was hit hardest, suggesting the attack might be politically motivated.

According to anti-virus vendor ESET, 80% of all infections were in Ukraine, with Germany second hardest hit with about 9%.

A growing number of security experts, including the British malware expert Marcus Hutchins – credited with ending the WannaCry ransomware outbreak – claim to have logs that reveal MEDoc as the source.

In email correspondence with the BBC, Mr Hutchins said: “It looks like the software’s automatic update system was compromised and used to download and run malware rather than updates for the software.”

It was not yet clear how it had been compromised, he added.

MEDoc has denied the claims, in a Facebook post – but in a blog post analysing how the infection had taken hold on Windows machines, Microsoft also points the finger at the accounting software.

“Active infections of the ransomware initially started from the legitimate MEDoc update process,” it writes.

Possible channel

Alan Woodward, a computer scientist from the University of Surrey, said: The ironic thing about this situation (if it proves to be the case) is that we always advise users to keep their software up to date, ideally using automated updates.

“However, it assumes hackers can’t take over the update process and misuse it.

“This process is normally a very tightly controlled process, so this is unusual.

“I can imagine many vendors are now triple-checking to make sure they don’t end up being an attack vector.”

He said that it showed “hackers will probe every possible channel” to find a route into systems.

“As users there isn’t a lot we can do as we are in the hands of the software vendors.”

As to how the infection spread beyond Ukraine, he added: “I wouldn’t mind betting that a lot of these multinationals such as Maersk and Merck had this software installed.”

Mikko Hypponen, a security expert at F-Secure, has studied the recruitment pages of many of the companies affected and found that some did indeed use the MeDoc software.

“If you do business in Ukraine, the software appears to be de facto,” he said.

There were other anomalies in the attack that pointed to it having been targeted, said Prof Woodward.

“The software was sophisticated, but the attackers only provided one single email address and that was closed down very quickly so it is difficult not to conclude that this wasn’t about money but targeted at Ukraine or those doing business with it,” he said.


Share this:

Share News

submit to reddit