<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>“Special Commando Move” - When Informal, Formal and Technical Cybersecurity Components Fail</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Cybercom Secure</institution>
          ,
          <addr-line>P.O. Box 7574, 103 93 Stockholm</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer and Systems Sciences, Stockholm University</institution>
          ,
          <addr-line>106 91 Stockholm</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>In February 2019, 2.7 million phone calls to Swedish healthcare provider 1177 Vårdguiden were discovered to have been exposed online. In this paper, we posit that incidents like the 1177 case can be explained through a sociotechnical model of informal, formal and technical domains where cybersecurity has failed. In the paper, we outline the events of the 1177 leak, we show how informal, formal and technical components of cybersecurity failed, and how the model could be used before, during and after incidents.</p>
      </abstract>
      <kwd-group>
        <kwd>socio-technical cybersecurity</kwd>
        <kwd>healthcare</kwd>
        <kwd>data breach</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>With the increasing digitization and shift to e-government services, instances where
personal data are processed are multiplying. Such processing needs to be lawful and
secure, maintaining the confidentiality, integrity and availability of the information, for
citizens to trust the services provided. The cybersecurity of the providers of such
services is at the center of maintaining that trust.</p>
      <p>
        One socio-technical model, based on the work of
        <xref ref-type="bibr" rid="ref5">Stamper et al. (1991)</xref>
        and explained
in
        <xref ref-type="bibr" rid="ref1">Björck and Yngström (2001)</xref>
        , classifies the domains of cybersecurity as formal,
informal and technical. The informal domain includes organizational culture,
organizational politics, interpersonal relations, etc. This domain contains the human ideas and
human behavior and ideas relating to these. The formal domain of cybersecurity
includes legal frameworks, organizational policies, standards, etc. These are usually
written rules to align the behavior of humans in information systems. The technical domain
includes the technical objects, or ideas, theories and models relating to these. In this
position paper, we discuss how informal, formal and technical domain components all
play essential parts in having a high level of cybersecurity. We believe that when IT
incidents occur, we can identify failures in the model domains. As exemplified in the
case we outline below, we believe that the reasons why a given incident occurs are
usually to be found in more than one of the domains.
      </p>
      <p>The paper is structured as follows: Section 2 provides a short healthcare background
and outlines the 1177 case. Section 3 applies the model to the case. Section 4 concludes
and presents future research.</p>
    </sec>
    <sec id="sec-2">
      <title>The case</title>
      <sec id="sec-2-1">
        <title>Healthcare</title>
        <p>The case we look at in this paper comes from the healthcare industry in Sweden.
Healthcare is one of seven essential services identified in the NIS Directive as an area
where the European Union member states shall work together towards increasing the
security of network and information systems.</p>
        <p>Healthcare in Sweden is free, and the 10 million citizens have a healthcare hotline
as first line triage. They call 1177 if they need to discuss their health problems with a
nurse and to get advice on whether they need to see a doctor or not. These phone calls
are recorded and stored, forming part of the electronic medical records.</p>
        <p>The 1177 case is an incident where 2.7 million recorded healthcare related phone
calls leaked online while being stored on a network attached storage device at a
subcontractor.</p>
        <p>
          When
          <xref ref-type="bibr" rid="ref6">van Deursen, Buchanan &amp; Duff (2013</xref>
          ) asked a panel of information security
professionals in the healthcare industry to rate different socio-technical risk scenarios
to assess risks in healthcare, the outsourcing scenario with subcontractors and third
parties did not rank among the top risks.
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Exposure revealed</title>
        <p>
          On February 18, 2019, the Swedish IT newspaper “Computer Sweden” published a
story where they showed that 2.7 million recorded healthcare phone calls were leaked
online
          <xref ref-type="bibr" rid="ref2">(Dobos, 2019)</xref>
          . Anyone could enter the URL and – without providing any
password – directly listen to the recorded phone calls. Some of the wave-files were named
by the telephone number of the caller, many of the recordings included unique personal
ID numbers and names identifying the callers, and all calls contained sensitive personal
data about the caller’s health issues.
        </p>
        <p>The server was taken offline before the story was published so there would be no
risk that readers would start to download the available phone calls.
2.3</p>
      </sec>
      <sec id="sec-2-3">
        <title>Reactions</title>
        <p>
          The data breach mainly involved three regions using “Healthhelp”1, which in turn used
“Healthcall”, that used a cloud-based call center solution provided by “Noise
Integrate”. In the first few days, the CEO of “Noise Integrate” was interviewed in Dagen
          <xref ref-type="bibr" rid="ref4">s
Nyheter (Söderberg, 2019</xref>
          )and commented:
        </p>
        <p>“This server is a so-called network-attached storage, NAS... You could say it is
an internal hard drive which is not password protected since you can only reach it
through the computer to which it is connected... We don't know when it happened,
but probably during patching ... someone simply connected an internet cable to the
hard drive. Then it got an ip-address... Regular people can't do it, but those with
skills could perform a special commando move and sneak in through the back door...
We do monitor our equipment for intrusions and so on... But this was like a personal
home hard drive, you don't monitor that for intrusions, since you cannot access it...
For some reason it got its own little cable to the internet. It would not have mattered
if you did not know the server had this problem, but Computer Sweden found out....
These kinds of incidents happen because you have a lot of people around, not
because someone deliberately is messing with you… We need to review our routines
…We have checklists for all other systems, but not for this hard drive. Someone
probably though it too basic. ”2
2.4</p>
      </sec>
      <sec id="sec-2-4">
        <title>Legal consequences</title>
        <p>In the first two days after the initial publication, “Healthhelp”, “Healthcall” and “Noise
Integrate” were acknowledging the leak and said that it was a mistake due to human
factors. On the third day they changed the language on their web pages and instead of
“leak” they started to talk about dataintrång (English: unauthorized data access). In line
with this, they filed a police report against the journalist and the editor-in-chief at the
newspaper that broke the story, claiming they had committed the crime dataintrång.</p>
        <p>A week after the incident, on February 27, the Swedish Police and the Swedish
Prosecution Authority started to investigate if “Healthhelp” may have committed a crime
against healthcare “professional secrecy”, by putting the records online. In parallel,
there is an investigation by the Swedish Data Protection Authority if there has been a
GDPR breach, and an investigation by Region Stockholm, on whether their agreements
with “Healthhelp” were specific enough, with regards to security requirements. These
four investigations are still ongoing at the time of writing.
1 For the purposes of this paper, the names of the companies involved have been changed in the
main body of the paper.</p>
        <p>2 Translations from Swedish to English by the authors, all errors are our own.
2.5</p>
      </sec>
      <sec id="sec-2-5">
        <title>Cybersecurity</title>
        <sec id="sec-2-5-1">
          <title>There were several technical components involved in this case.</title>
          <p>First, we look at the server containing 170.000 hours of recorded sensitive calls,
which was put online without any protection. Search engines like Shodan, ZoomEye
and others have indexed the server, which is a Ubuntu Linux server that has been
running since 2013. “Noise Integrate” have said that the hardware is a small network
attached storage, NAS. In 2013, “Noise Integrate” install OwnCloud, a file sharing
application, and add a Favicon icon, indicating a possible web server experiment. In 2015,
a web interface for administration of the NAS is downloaded and unzipped. In 2016,
the folder HTML was last changed, indicating a possible web server. Folders containing
the phone calls synced here from the call center software are added in 2017. On the day
the leak was published, they were running Apache 2.4.7, with 23 known vulnerabilities,
not updated in the past five years.</p>
        </sec>
        <sec id="sec-2-5-2">
          <title>Next, we look at the network situation. The server has a static IP address on 188.92.248.19 and the firewall is open for the traffic to the IP on port 443 (the port that was used to access the recorded phone calls). There are DNS entries from nas.applion.se and nas.voiceintegrate.se.</title>
          <p>After the breach was revealed, “Noise Integrate” looked at the web server access log.
They claim logs are missing for the years 2016 to 2018, and that all accesses logged
were made between February 15 and 18, 2019.</p>
          <p>The media reported that, since only 55 phone calls were downloaded, the risk is
basically over. However, there has been no mention of other logs, and ways of getting
the phone calls out of the server, such as rsync, scp, ftp, webdav.</p>
          <p>The server had multiple severe vulnerabilities and quite possibly breached several
times during the years has also not been discussed.</p>
          <p>The fact that search engines, like Shodan and Chinese ZoomEye, have indexed the
server and therefore have had access to the data has not been mentioned in the media.
2.7</p>
        </sec>
      </sec>
      <sec id="sec-2-6">
        <title>Swedish government reaction</title>
        <p>
          On March 1, the minister for Health and Social Affairs, Lena Hallengren, reported that
the risk is over, and everyone can now safely call 1177 again!
          <xref ref-type="bibr" rid="ref3">(Regeringskansliet, 2019)</xref>
          Meanwhile, the cloud-based call center system of “Noise Integrate”
(Linux/Asteriskbased VoIP solution) has not been reported to have been verified for security, and at
the time of writing “Healthcall” still take calls in Thailand.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Application of model</title>
      <p>From what is publicly known about the 1177 case, we can identify failures in all three
of the cybersecurity domains outlined in Section 1: Informal, Formal and Technical.
The domains are enumerated and exemplified below
3.1</p>
      <sec id="sec-3-1">
        <title>Informal</title>
        <p>Examples of failures linked to the informal domain of human behavior:
i. Awareness: Someone at “Noise Integrate” connected the Network Attached</p>
        <p>Storage device to the Internet
ii. Culture: Someone at “Noise Integrate” excluded the NAS from intrusion
monitoring and checklists as it was deemed too basic
iii. Arrogance: The CEO of “Noise Integrate” believed only highly skilled
hackers could find the server’s open port
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Formal</title>
        <p>Examples of failures linked to the formal domain of regulating human behavior:
i. Governance: “Noise Integrate” did not have management systems that
prevented the storage unit to be attached to the internet
ii. Procurement: The Regions did not perform security audits at the
subcontractors as part of the procurement procedure
iii. Legal Compliance: “Noise Integrate” did not comply with the GDPR, for
example the Privacy by Design requirement
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Technical</title>
        <p>Examples of failures linked to the technical domain of technical artefacts:
i. Security set-up: The entire architecture at “Noise Integrate”
ii. Patching: The server had several known vulnerabilities and not updated in 5
years
iii. Configuration: The server had DNS entries
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Concluding remarks and future work</title>
      <p>It is our position that this socio-technical cybersecurity model is valuable before, during
and after an incident.</p>
      <p>Before By considering informal, formal and technical domains equally when
designing controls for cybersecurity.</p>
      <p>During By identifying in what domain(s) the incident is occurring to provide the
most appropriate incident response.</p>
      <p>After By performing post mortems where the informal, formal and technical
domains are analyzed to provide thorough lessons learned on how the different domains
facilitated the incident and improve cybersecurity.</p>
      <p>There are different roads ahead for future research. One natural extension of this
position paper would be to contextualize previous research in the area of socio-technical
cybersecurity and to look at several cases where cybersecurity failed and see if
repetitive patterns could be identified. Another part could be to look at to what extent
organizations consider all three domains for a balanced socio-technical cybersecurity
approach in their control design.</p>
      <p>The Technical and Formal domains are well researched compared to the Informal
domain. In a wider perspective, it would be beneficial to take an interdisciplinary view
on Informal cybersecurity to identify models to understand, predict and change human
cybersecurity behavior.</p>
      <p>
        Acknowledgements. The authors would like to thank participant
        <xref ref-type="bibr" rid="ref4">s at STPIS 2019</xref>
        and
two anonymous referees for excellent comments that helped improve this paper.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Björck</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Yngström</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <source>IFIP World Computer Congress/SEC 2000 Revisited. IFIP TC11 WG 11.8 Second World Conference onf Information Security Education</source>
          (pp.
          <fpage>209</fpage>
          -
          <lpage>222</lpage>
          ). Perth: School of Information Science, Edith Cown University.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Dobos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2019</year>
          , February 18).
          <article-title>2,7 miljoner inspelade samtal till 1177 Vårdguiden helt oskyddade på internet</article-title>
          .
          <source>Retrieved March</source>
          <volume>15</volume>
          ,
          <year>2019</year>
          , from Computer Sweden: https://computersweden.idg.
          <source>se/2.2683/1</source>
          .714787/inspelade-samtal-1177
          <string-name>
            <surname>-</surname>
          </string-name>
          vardguiden-oskyddade-internet
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Regeringskansliet.</surname>
          </string-name>
          (
          <year>2019</year>
          , March 1).
          <article-title>Socialministern i möte med anledning av händelserna rörande 1177 Vårdguiden</article-title>
          . Retrieved from Regeringskansliet: https://www.regeringen.se/pressmeddelanden/2019/03/socialministern-imote
          <article-title>-med-anledning-av-handelserna-</article-title>
          <string-name>
            <surname>rorande-</surname>
          </string-name>
          1177-vardguiden/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Söderberg</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2019</year>
          , February 19).
          <article-title>Ansvarig för Vårdguiden-haveriet: "Mänskliga faktorn"</article-title>
          .
          <source>Retrieved March</source>
          <volume>15</volume>
          ,
          <year>2019</year>
          , from Dagens Nyheter: https://www.dn.se/ekonomi/ansvarig
          <article-title>-for-vardguiden-haveriet-manskligafaktorn/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Stamper</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolkman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klarenberg</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Van Slooten</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ades</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Van Slooten</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>1991</year>
          ). From Database to Normbase.
          <source>International Journal of Information Management</source>
          ,
          <volume>11</volume>
          ,
          <fpage>67</fpage>
          -
          <lpage>84</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>van Deursen</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buchanan</surname>
            ,
            <given-names>W. J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Duff</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Monitoring information security risks within healthcare</article-title>
          .
          <source>Computers &amp; Security</source>
          ,
          <volume>37</volume>
          ,
          <fpage>31</fpage>
          -
          <lpage>45</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.cose.
          <year>2013</year>
          .
          <volume>04</volume>
          .005
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>