Cyber Attack On Slovakia’s Land Registry

A large-scale cyber attack originating form outside Slovakia borders has hacked the information system of the Office of Geodesy, Cartography and Cadastre of the Slovak Republic (UGKK). The UGKK system contains data about who owns properties and land in Slovakia and the UGKK is used to record and manage this information about the land and property. All systems have been shut down in response to the attack.

This appears to be a similar exploit to the attacks on Ukraine government agencies, including the Ministry of Justice and the Land Registry over Christmas. 

According to reports, the UGKK was hit by a ransomware attack, which involves using a malicious software to usually encrypt data, preventing users from accessing it. Slovakia’s Interior Ministry confirmed the attack on  that the offices of the departments would be shut or operate in a limited capacity from January 9.  

The case is being dealt with by the Office for the Fight Against Organised Crime, according to the Interior Ministry.
Slovakian Politicians Point Finger at Ukraine as the incident comes amid rising tensions between Slovakia and Ukraine following Kyiv’s suspension of Russian gas transit through Slovakian territory. At a press conference on January 10 the Slovak Republic, Minister of Agriculture, Richard Takáč, said that there is suspicion that the attack originated in Ukraine. 

Takáč described the attack as the largest in the history of Slovakia. State Secretary of the Ministry of Investments, Regional Development and Informatisation, Ivan Ivančin, said during the press conference that all data is backed up and there is no risk of changes and fraudulent transcriptions of ownership data.

It has been reported that a multimillion Dollar ransom has been demanded to restore the systems and access to the encrypted data.

The UGKK said it will continue to provide updates on its website. Physical offices are set to return in a limited capacity on January 13. Local state officials said the investigation into the attack is ongoing and more details are expected to emerge.

Slovak Spectator  |    Slovak Spectator   |     Infosecurity Magazine   |   Teraz   |   

Record   |   Kinstellar

Image:  Ideogram

You Might Also Read: 

Ukraine Hackers Disrupt Putin's Birthday:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 



 

« British Online Safety Act Takes Effect
The International Race To Lead In Quantum Technology  »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

ExpressVPN

ExpressVPN

ExpressVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

CYSEC NG

CYSEC NG

Cyber Security Challenge Nigeria Initiative (CYSEC NG) is the first, and largest offensive premier Cyber Conference and Hacking event in Africa.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Suresecure

Suresecure

Suresecure are a specialised consulting company providing Strategic IT security consulting, Managed Security Services, and Incident Response Management.

Matrium Technologies

Matrium Technologies

Matrium Technologies has been a leading provider of technology solutions since 1991, with a strong industry background in Network Testing, Network Visibility and Security.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.

Terra Security

Terra Security

Terra Security is the first agentic-AI platform built for web application penetration testing.