Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Ransomware Attack on Major Payroll System Kronos May Take 'Weeks' to Repair (kronos.com) 76

Earlier this week long-time Slashdot reader DJAdapt wrote: According to a post on the Kronos Community Page, a cyber security incident due to a ransomware attack is affecting UKG Workforce Central, UKGTeleStaff, Healthcare Extensions, and Banking Scheduling. Although they are currently working with cyber security experts on the issue, they say that it may take several weeks to restore full system availability.
CNN reported: Ultimate Kronos Group, one of the largest human resources companies, disclosed a crippling ransomware attack on Monday [December 13th], impacting payroll systems for a number of workers. After noticing "unusual activity" on Saturday [December 11th], Kronos noted that its systems were down and could remain that way for several weeks.

Kronos has a long list of notable customers across the public and private sector, including the city of Cleveland, New York's Metropolitan Transportation Authority (MTA), Tesla and MGM Resorts International. It also works with many hospitals across the country. Some employers find themselves having to make contingency plans in order to pay workers, such as shifting to paper checks. And some impacted employees have been unable to access payroll systems...

In addition to the potential payroll issues, there's also data privacy concerns. The city of Cleveland said in a statement Monday that Kronos alerted it that sensitive information may have been compromised in the attack. Employee names, addresses and the last four digits of social security numbers may have been stolen by the hackers inside Kronos's network.

Other Kronos customers include Whole Foods, GameStop and Honda, as well as state and local government agencies like the state of West Virginia, reports NBC News: John Riggi, the senior advisor for cybersecurity at the American Hospital Association, an industry group, said that he had spoken with multiple hospitals that have had to create contingency plans for getting employees paid, managing their schedules and tracking their hours. "Quite frankly, this could not have happened at a worse time. We've had a surge in Covid patients, flu patients," Riggi said. "It's a distraction to hospital administrators at a time when they don't need any additional burden or diversion of resources."
"Though it has not been confirmed, there is speculation that the notorious Log4Shell vulnerability was involved," writes CPO magazine, "given that the Kronos cloud services are known to be built on Java to a great degree...."

"Microsoft's security team has reported that ransomware attacks are already unfolding after these breaches in at least several cases."
This discussion has been archived. No new comments can be posted.

Ransomware Attack on Major Payroll System Kronos May Take 'Weeks' to Repair

Comments Filter:
  • by 93 Escort Wagon ( 326346 ) on Monday December 20, 2021 @03:53AM (#62098915)

    The hospital my wife works for has already told people they're just planning to pay everyone the same amount they received the previous pay period. Which is fine, for salaried positions like my wife's... but a lot of nurses work per diem, and their hours per pay period can vary greatly.

    I'll be curious to see if they pull it off (this upcoming Friday is the next pay day). I mean, they offloaded this to Kronos quite a while ago - how quickly can the hospital get back to writing / printing paychecks themselves? We're not living paycheck to paycheck anymore, fortunately - but not everyone has a pool of money in the bank they can fall back on.

    Something really needs to be done about these ransomware jerks.

    • Re: (Score:3, Informative)

      by sxpert ( 139117 )

      Something really needs to be done about these ransomware jerks.
      indeed... building IT systems defensively so that those jerks don't fsck the company by taking out a single machine...
      the Windows achitecture is so easy to fsck around with it's not even funny

      • Re: (Score:1, Interesting)

        by Train0987 ( 1059246 )

        The log4j vuln that let the attackers in isn't exactly "Windows architecture".

      • by sjames ( 1099 ) on Monday December 20, 2021 @07:29AM (#62099161) Homepage Journal

        It is certainly good to harden the computer systems, but it would help is law enforcement in general was less clueless and powerless to actually deal with the criminals behind the attacks.

        As an inevitable analogy, I'll bet your house doesn't have half inch iron plate siding and titanium bars on the windows. I'll further guess that you might resent it if someone cleans you out one day while you're out and all anyone does is wag their finger at you about how you should have gone with iron plate siding and titanium bars.

        It's worth noting that even if you leave your front door wide open all weekend, it is still a felony if someone goes inside and steals your stuff. You still have every right to expect police to go after the crooks.

        • Iâ(TM)d be even more fecked off if they did it remotely from Russia, and the FBI still did nothing about them!

      • Re: (Score:3, Insightful)

        by DarkOx ( 621550 )

        payrolls is a contractual obligation. The ransomware folks are criminals and should absolutely be found and incapacitated so they don't harm society again. 30 prison terms with not computer access for them should do nicely.

        However the "jerks" here are Kronos and any of the clients that can't handle payroll without them. Payroll is a contractual obligation. You should not get to just say 'woopsie something happened to our systems' This is an actual example where the employee, employer relationship should h

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Something really needs to be done about these ransomware jerks.

      "Something needs to be done", to be sure, but what?

      In the real world it usually starts with protecting the valuables. Closing the door, locking the paychest. It's nice low hanging fruit that you can do yourself, rather than relying on government to fix it for you.

      These are measures you would have to take even with a handy strong government available for coming down like a ton of bricks on "these ransomware jerks". Or handy bands of vigilantes to do the government's job more sloppily, for a price. For the

    • Something really needs to be done about these ransomware jerks.

      There will always be more of them unless we some day build a star trek-esque society, which I don't expect humanity to actually reach. So the thing that needs to be done is to improve security. There is literally nothing else meaningful than can be done, or at least, that can and will be done.

      • by Kokuyo ( 549451 )

        There will always be more of them unless we some day build a star trek-esque society, which I don't expect humanity to actually reach.

        Yeah... I had to get forty for that dream to finally breathe its last.

      • Something really needs to be done about these ransomware jerks.

        There will always be more of them unless we some day build a star trek-esque society, which I don't expect humanity to actually reach. So the thing that needs to be done is to improve security. There is literally nothing else meaningful than can be done, or at least, that can and will be done.

        I'd like for people to convince me that ransomware and simple screwups are not an inadvertent feature of the cloud. There is enough complexity that screwups that would normally affect one business can affect the entire world - like the Azure expired SSL fiasco.

        Mistakes simply will be made.

        Vulnerabilities simply willbe found, and will be exploited.

        But one of the core values of the cloud is taking as many groups as possible, with the concept that these groups will be saving money, and all will be well. Th

        • by bws111 ( 1216812 )

          What does this problem have to do with 'the cloud'?

          • What does this problem have to do with 'the cloud'?

            Are you replying to me? If so - I have noted exactly what happens when comapanies use the cloud - that cloud being an irresistible source of mayhem, ransomware, customer personal information given to the bad guys. It makes their job easier - all in one shopping for them.

            What of what I wrote do you claim is not true, or has nothing to do with the cloud sources that are hit by ransomware personal information grabbed off the cloud storage. and just general screwups like expired SSL certificates bringing the

            • by bws111 ( 1216812 )

              I am asking you what THIS ATTACK on THIS COMPANY has to do with 'the cloud'. I see no indication anywhere that this attack had anything at all to do with 'the cloud'.

              • I am asking you what THIS ATTACK on THIS COMPANY has to do with 'the cloud'. I see no indication anywhere that this attack had anything at all to do with 'the cloud'.

                https://www.cnn.com/2021/12/16... [cnn.com] https://cloudcomputing-news.ne... [cloudcomputing-news.net] https://www.techrepublic.com/a... [techrepublic.com]

                I'll spell it out slowly for you, since you have your Caplocks loaded and ready to rumble.

                Kronos Private Cloud solutions, a data storing entity for several of the company's services, including UKG Workforce Central, which is used by employees to track hours and schedule shifts.

                Note that the name is Kronos Private Cloud Solutions -the cloud. A company using the cloud was hit by ransomware. That co

      • by jythie ( 914043 )
        Another direction though would be various political solutions. These gangs operate with such impunity because they tend to be based out of countries that both ignore law enforcement AND have access to the wider internet. This situation persists because the gangs are friendly with their governments (they bring in money) and the legitimate companies that need that internet access are not harmed by them.

        One class of solution would be to make that access contingent on cooperation. If gangs in your country pu
    • by Bigbutt ( 65939 )

      Something really needs to be done about these ransomware jerks.

      Sure, but it starts with having companies actually upgrade servers and improve security. Nothing like having 90% of thousands of servers be end of life to improve the odds of a successful attack.

      [John]

      • Something really needs to be done about these ransomware jerks.

        Sure, but it starts with having companies actually upgrade servers and improve security. Nothing like having 90% of thousands of servers be end of life to improve the odds of a successful attack.

        [John]

        That will help some, but there's two things. Thing one is there is a constant stream of security updates, so the bad guys are still finding vulnerabilities.

        Thing two, in a world that the bottom line is "as cheap as possible", we're going to have as cheap as possible. P

        This is just the future of cloud computing. Like it so far?

    • The university hospital my wife works at employs over 10k employees. They got hit by this. They had to write a quick and dirty program for management to input hours, sick time accrued, and vacation time accrued. Its also the same university hospital that decided not to hand out bonuses this year, instead sending out some 65th anniversary plastic medallion (jelly of the month club). How is the CEO treated for putting his payroll eggs in the cloud basket? Well hes awarded a $250k pay raise by the BOD, becaus
      • by trparky ( 846769 )
        And you wonder why I say that Medicare for all is a bad idea, it'll only give the CEOs of hospitals like the one your wife works at a blank cheque handed to charge the government whatever the hell it wants to charge. No, we need to reign in the charges that hospitals charge for healthcare and magically the cost of healthcare will go down. Common sense.
        • And you wonder why I say that Medicare for all is a bad idea, it'll only give the CEOs of hospitals like the one your wife works at a blank cheque handed to charge the government whatever the hell it wants to charge. No, we need to reign in the charges that hospitals charge for healthcare and magically the cost of healthcare will go down. Common sense.

          Please explain how you "reign in the charges that hospitals charge for healthcare" without the government getting involved in it. Millions of Americans are waiting for this important information that was promised by the previous administration for years.

          • Of all the universal healthcare I have looked at, I think I like the France system the best. Ive been told they set a price for all the procedures, much like car mechanics have a manual that specifies how much labor a procedure takes. Then france pays 70% and the citizen pays 30%. To me this is the least overhead and bureaucratic way of running something. Its a flat rate system with simple math. I am OK with a system like that. None of this congress getting a different system crap.
        • by jythie ( 914043 )
          If this common sense was true, would we not see higher prices in countries with socialized medicine? Instead the US's private system seems to be producing some of the highest costs in the world despite being the one closest to your proposed solution.

          The problem with common sense is it tends more closely align with magical thinking, it is whatever the speaker believes.
    • Will be interesting to see how they handle the tax reporting they are supposed to provide y'all by Jan 30....

    • Which is fine, for salaried positions like my wife's

      The problem is larger than you think. In a lot of places in Europe (where Kronos is also huge) December often is an odd month in terms of salary. I don't know of anyone who gets their normal salary this month. Tax corrections, yearly deductions, reimbursements, all happen in December, and that's before you take into account the many companies and countries of Europe who have 13 or 14 months in the year.

      Here's what my November paycheck looked like:
      Salary for the 11th month of the year.

      Here's what my December

      • Whatâ(TM)s the 14th month of the year?
        • My yearly salary is divided into 14. Month 13 is paid in June, Month 14 in December. It's common practice in some European countries and sort of a "forced savings" measure which has the effect of ensuring people have enough money to prevent them falling into a debt spiral in the two periods where that happens most commonly: Christmas Shopping, and Summer vacation.

          I thought it was a horrible idea at first, but honestly I actually like the idea of not having to think about if I can afford a holiday or present

    • by Paxtez ( 948813 )

      Yep, my GF's hospital is the same way. Unfortunately she worked a lot of overtime in the previous pay period so she is going to be artificially inflated paychecks for a little bit that she will (presumably) have to pay back.

    • My employer uses Kronos as well. So far no word from them. Can't say I'm surprised, they're pretty clueless.

    • It seems that one of the issues that ransomware takes
      advantage of is that many systems use the same machine
      to interface with the internet as the machine that handles
      data-processing tasks.

      That way a corruption of the internet machine can lead
      to locked-up data files, when those files should be on a
      separate system that only communicates with the internet
      machine by a strict protocol. This protocol should filter out
      anything that could harm the data, including executable code.

  • Weeks to repair? (Score:4, Interesting)

    by tiananmen tank man ( 979067 ) on Monday December 20, 2021 @05:44AM (#62099045)

    Why Is it taking weeks to restore from backup?

    • Re:Weeks to repair? (Score:5, Informative)

      by UncleWilly ( 1128141 ) <<UncleWilly07> <at> <gmail.com>> on Monday December 20, 2021 @06:26AM (#62099079)

      I work in the industry (IT backend compute / storage / hybrid-cloud / damn-near-everything equipment for damn near everyone) It is astounding how many worldwide companies have no backups. Or, sure, all 100PB is backed up, but the slow data link .. lets see .. 3 years to restore...yup, about 3 years...

      • by suss ( 158993 )

        I vaguely recall an article from a few years ago that one of the companies, i believe it was Amazon, will deliver your backup on a "storage box", for a price.

        • Re:Weeks to repair? (Score:5, Informative)

          by sjames ( 1099 ) on Monday December 20, 2021 @07:38AM (#62099173) Homepage Journal

          That still leaves the minor matter of making sure the right data goes on the right machine. Too often, ther is no rhyme or reason to how the backups are organized. Everything HAS a backup, but those backups are just dumped in a big bag with a promissory note to come up with a restore plan one day.

          It's better than not having a backup, but restoring can take a while.

          Also, you have to make sure that your restore doesn't also restore the sleeping exploit that will lock everything up again next week. One thing is certain, your restored state will be vulnerable and you must address that or you'll be right back to square one in short order.

        • I vaguely recall an article from a few years ago that one of the companies, i believe it was Amazon, will deliver your backup on a "storage box", for a price.

          I believe Backblaze will do this as well.

      • This is why services need external audits and ratings. If you provide payroll for critical industries, the services themselves should prove they are robust.

        Regulations help a bit here but more than anything it opens up a good service sector for well trained cyber experts.

      • by nuckfuts ( 690967 ) on Monday December 20, 2021 @06:59AM (#62099115)

        I work in the industry (IT backend compute / storage / hybrid-cloud / damn-near-everything equipment for damn near everyone) It is astounding how many worldwide companies have no backups. Or, sure, all 100PB is backed up, but the slow data link .. lets see .. 3 years to restore...yup, about 3 years...

        It's not simply a matter of restoring from backup. The exploited vulnerability must be positively identified, and then remediated. It may involve extensive code auditing and rewriting. This can certainly be a time-consuming task for a large and complex code base.

        If the vulnerability is not remediated, you could restore from backup only to get hit again days later.

        • by DarkOx ( 621550 ) on Monday December 20, 2021 @08:14AM (#62099223) Journal

          It's not simply a matter of restoring from backup. The exploited vulnerability must be positively identified, and then remediated. It may involve extensive code auditing and rewriting. This can certainly be a time-consuming task for a large and complex code base.

          If the vulnerability is not remediated, you could restore from backup only to get hit again days later.

          Which is why your disaster recovery plan should probably be more than:
          1) Restore from backups
          2) ???
          3) Resume Profit!

          Restoring from backups does not or at least probably should not mean directly returning to 'situation normal' maybe you don't know exactly how such and and such got in and did this and that, so perhaps you bring up certain systems with only alternative communications paths enabled and have a plan to communicate to existing clients how to use them, etc.

          Its like all these 'cloud native guys' I hear say things like, well we have database snapshots in a storage blob, and we can just have terraform redeploy everything if needed - backup done. Well no not really, don't get me wrong in many ways its absolutely great you can just press the play button and all the 'infrastructure as code' and everything can get rebuilt on the fly almost effortlessly and that afterward you are handful of SQL commands away from restoring the data snapshots and everything being as if nothing happened; but you probably need to think about it a little harder than that.

          You don't actually want to go to 'its like nothing happened' at least not directly. You want to go to some very conservative, essential operations only bastion state until you have identified and addressed the root cause.

          • by MeNeXT ( 200840 )

            What are you restoring from backup? The OS? The applications? Your data?

            My contingency plan in case of a ransomware attack is to just restore my data. The OS and applications come directly from the distributors. Not my backups. My data isn't executable nor is any information that resides on the backup media.

            That only leaves issues with internally developed software. Are their controls in place to mitigate arbitrary code or executables from being inserted. I feel there are few companies who have actual plans

          • by mjwx ( 966435 )

            It's not simply a matter of restoring from backup. The exploited vulnerability must be positively identified, and then remediated. It may involve extensive code auditing and rewriting. This can certainly be a time-consuming task for a large and complex code base.

            If the vulnerability is not remediated, you could restore from backup only to get hit again days later.

            Which is why your disaster recovery plan should probably be more than:
            1) Restore from backups
            2) ???
            3) Resume Profit!

            #2 is "immediately get pwned again".

            It's the kind of arsehole thing I'd do. Have a delay built into whatever I used to compromise the system to ensure that even if they could quickly restore from backups, they'd be back to being my bitch in no time.

            This is why prevention is better than cure... because if I can think like that I guarantee you someone with fewer morals and more time on their hands can as well.

      • Cloudtastrophie. To collect a top salary, there is a defined recovery and resumption of business timeline that some cexec signs off on. And live DR tests. This shambles to me indicates the previous annual reports and audits were falsely signed with respect to normal business resumption. True there may be a risk matrix, never updated of course, and choosing the 'rare' box. Any good reporter should ask what was the signed off resumption of business timelines, and who signed on that dotted line. Yep bonuses fo
      • by jythie ( 914043 )
        Even with backups, things can go badly. Years ago in an IT job I worked with had plenty of budget... multiple production environments (so you could take one down while updating another), a full test environment that was a mirror of a production cluster, backups, version control of all the tools needed to rebuild from scratch, documentation, the works! One weekend the system when down and when we went to restore it.. it didn't work, and took days to figure out all the little things that slipped in to cause
    • Because the work-hours for fixing it are entered in Kronos, i.e. ultimately thanks to the bug, nobody'll get paid.

    • > Why Is it taking weeks to restore from backup?

      They're gonna get sued hard for negligence, probably.

    • by Kokuyo ( 549451 )

      RAID != backup != disaster recovery.

      There is a reason we differentiate between restore point objective and restore time objective.

    • Re:Weeks to repair? (Score:4, Interesting)

      by thegarbz ( 1787294 ) on Monday December 20, 2021 @10:40AM (#62099545)

      Why Is it taking weeks to restore from backup?

      You're not just restoring from backup.
      You're restoring from backup. You're testing the backup restored correctly. You're identifying the activities which occurred since last backup and correcting for them. You're then incorporating into digital form all the shit you're doing right now whilst enacting your business continuity strategy). The actual moving of data is only a small part of the problem when a system goes down.

      I'm reminded of when Randsomware took down Europe's biggest port of some of the stories. The actual outage only went for a few days.

      - DHL for example stopped processing packages, they moved everything into a giant warehouse. It took weeks to get through the mail backlog when they got up and running.
      - Maersk who caused the issue came to a global halt including a massive supply chain fuckup as they went. They had close to a month before they stopped paying demurrage costs for ships arriving at the wrong time.
      - The Port of Rotterdam enacted a very competent business continuation strategy, they dropped their toys and grabbed pencil and paper. They employed a small army of contractors which then also took weeks to get what they were doing on paper synchronised with their electronic backups (which also were recovered in a matter of days).
      - We weren't even involved but for several weeks we were dealing with freight issues, customs receipts not coming, paperwork not agreeing with records because someone couldn't read the hand written text, customers doing orders at weird times were were unprepared for, etc.

      • by gweihir ( 88907 )

        You forgot one very critical item: You need to find and fix the attack vector before putting the restored machines online again. Otherwise you will get attacked again in short order.

    • by gweihir ( 88907 )

      Why Is it taking weeks to restore from backup?

      Simple: Restoring is not enough. If you do that, you will get attacked and compromised again very fast. You need to find out first what the vector was and then fix it before putting servers online again. Still, "weeks" strikes me as too long. They probably never did proper BCM tests and may need to figure out how to do all this first.

  • I'm just wondering (Score:4, Interesting)

    by MeNeXT ( 200840 ) on Monday December 20, 2021 @06:50AM (#62099103)

    When an attack takes weeks to recover from, what king of security was in place? Was there any thought given to recovery? I would assume that a company managing this much sensitive information would limit the access to sensitive data. Is this a case that it can't happen to me and security and data integrity is just a cost on the income statement? Is it another case of check box security where going over a checklist is all the verification on security done?

    There is a lot of talk about the breaches but very little information to help others. I can't imagine with all these breaches that security is still an after thought.

    • by HiThere ( 15173 )

      There can be lots of security in place, none of which addresses the attack vector that was used. Backup & recovery plans can be a real hassle, and management is generally reluctant to admit that the dangers are real. It costs money NOW to deal with something that "probably won't happen".

    • When an attack takes weeks to recover from, what king of security was in place?

      The recovery may have nothing to do with data, and everything to do with synchronising and maintaining an ongoing business.

      The world doesn't stop and twiddle its thumbs waiting for you, and even if it did those employees were on the clock and needed to use a timekeeping system ;-)

      Covering data is a small part of recovering from a business upset.

    • by AmiMoJo ( 196126 )

      You would have thought that the Klingon homeworld would have great security, but I guess if you can't just hit it with a bat'leth maybe they aren't interested.

      Or is this a different Kronos?

  • I thought I finally has a story worth posting lol

    https://slashdot.org/submissio... [slashdot.org]

    • well this is slashdot, so maybe submit it again and you can get credit for being the og AND the dupe?
    • Yes, I almost did the same. I work for Pepsico and received an email about this as well. They're also keeping our paychecks the same (pretty much) from week to week.

"It takes all sorts of in & out-door schooling to get adapted to my kind of fooling" - R. Frost

Working...