I had forgot how big Capita are. It's like 492304932 different business units. Shodan Safari is like looking into the sun.
It looks like some of the plc centrally use Okta for authentication.. I hope they enabled Number Verification.
Capita, one of the UK’s biggest outsourcers, is investigating an incident with its IT systems which has prevented staff from logging in.Employees at the company, which handles important government contracts including for the NHS, have been denied access since before 7am.They have been told in round robin phone messages “not to attempt access via VPN or submit password recovery requests”.
The Times reporter is being verbally briefed as #Capita still don't have email (almost 10 hours in).
They're told: 'There appears to be no risk to personal data processed by the business. The outage seems to be is hitting Office365 programmes including Outlook, Excel and Teams rather than client systems...'
Financial Times have a new article up about #Capita, saying two people familiar with the matter say cyber incident cannot be ruled out.
Curiously all the media articles about it this evening talk about the IT incident in the past tense - but it is still ongoing, it hasn't been resolved.
https://www.ft.com/content/00f9591f-e07a-4339-ba3e-413818602515
Verbal update from #Capita - they’re still restoring internal service, “there is no evidence that any data has been compromised."
They won’t discuss what is happening.
The Times have a report up saying #Capita NHS services staff are working using WhatsApp and Google Drive, rather than approved Microsoft tooling.
Massively concerned by lack of transparency, going to start digging into this tomorrow with officials. https://www.thetimes.co.uk/article/capita-dogged-by-it-problem-for-three-days-wthl2zp5v
#Capita are listed on Black Basta ransomware portal as a victim.
They posted various screenshots of access to personal data (e.g. passport scans), security vetting, nuclear BACS payment details, architecture diagrams, school reports etc - Capita customer data.
http://stniiomyjliimcgkvdszvgen3eaaoz55hreqqx6o77yvmpwt7gklffqd.onion/?id=CAPITA
#Capita's breach is also being sold on the portal, you can pay cryptocurrency for "Remote exclusive server with data of "CAPITA""
Black Basta focus on data exfiltration, traditionally using rclone. Prior reading: https://www.hhs.gov/sites/default/files/black-basta-threat-profile.pdf
I took a look at Capita’s ransomware incident, and look at what they’ve told the media and customers versus the reality of what has happened.
Black Basta ransomware group extorts Capita with stolen customer data, Capita fumble response.
There’s an interesting piece in The Times today, where the CEO of Capita declares Capita’s response to the hack “will go down as a case history for how to deal with a sophisticated cyberattack”…
The Times website has a report this evening about the Black Basta breach of Capita. Capita still deny there is any evidence of data being compromised.. in a story that even includes details of Capita’s office floor plans leaking. #ransomware
The Record reports #Capita is "...understood to be working to establish whether the data is authentic or if the extortion group had cobbled it together from other sources."
Maybe the source is cobbled together from Capita Business Services... or Capita Nuclear. Or one of the other Capita business units in the #BlackBasta portal. https://therecord.media/capita-investigates-authenticity-data-leak
After two weeks of telling press and customers privately my blog was inaccurate, suggesting the leaked data was public domain, denying it was ransomware etc.. #Capita have now admitted a data breach.
They’re still not giving full story or admitting Black Basta, more to come on how to defend your org.
I've written a post on the #Capita ransomware breach, which potentially has national security implications in the UK.
- Includes technical steps orgs can take to protect themselves from a similar situation
- A call to arms on a change in how organisations handle ransomware incidents, makes case for transparency
It's a month since Russian hackers first got into #Capita, on March 22nd.
Black Basta also list Capita as CAPITA_2, just noticed - two listings.
Really interesting piece in The Times, where Capita claim that they informed clients they were hacked at 11am on Friday 31st March (the first day) and kept them briefed.
Anybody agree or disagree this was true? https://www.thetimes.co.uk/article/silence-is-deafening-after-cyberattack-on-capita-dgns935gz
Error messages flashed up as staff at Capita tried to log into their accounts on Friday, March 31. Frustrated workers were advised not to submit password reset requests to swamped technology teams as the outsourcer got to grips with what was going on. In a preliminary statement that morning, dictat
BBC report on the Pension Regulator concerns about the data breach at #Capita.
Capita administer pensions for around 4 million people. https://www.bbc.co.uk/news/business-65443841
#Capita were still listed unindexed on Black Basta's portal, so I entered a chat and asked Black Basta if they hacked Capita.
Black Basta erased the chat history, and removed CAPITA and CAPITA_2 from their portal just now. Previously, Capita declined to comment about communicating with Black Basta to @BleepingComputer
This isn’t the case. #Capita handle BPSS clearances, but SC and DV are handled by UKSV, part of the Cabinet Office.
You might want to update your Medium post.
@GossiTheDog update from Capita
source: https://www.proactiveinvestors.co.uk/LON:CPI/Capita-PLC/rns/1300585
@GossiTheDog ah, so the entire school system in this country
great
@GossiTheDog well let me give you some background...
NDA
NDA
Official secrets..
NDA
NDA
not sure what happened there.....