MTU cyber breach: Probe after ransomware attacks 'like a murder investigation'
Munster Technological University has confirmed a ransom demand was embedded in the cyber attack that closed its four Cork campuses this week. Picture: Larry Cummins
A ransom demand was embedded in the cyber attack that has closed Munster Technological University's four Cork campuses this week.
Its Kerry campus remains unaffected.
The vice president for finance and administration at MTU, Paul Gallagher, confirmed the breach was caused by ransomware that had potentially been working through its IT systems for weeks.
The university has notified the Data Protection Commissioner and has been in âclose contactâ with gardaĂ, the National Cyber Security Centre, and other authorities following the âsignificantâ IT breach.
The college is preparing for a phased reopening of the Cork campuses next week, but there are concerns the attack could be worsened by allowing access to thousands of onsite computers.
âThe worst thing we can do is rush this; that could make matters worse,â Mr Gallagher said.
When asked the size of the ransom demand, Mr Gallagher declined to comment, but he did acknowledge that a demand had been found encoded in one of the servers.
âWe have not engaged, we are taking advice from the National Cyber Security Centre.
âWeâre in a strong position, we can restore the system ourselves.
âWe were very lucky in that we intercepted this at an early stage, which puts us in quite a strong position actually. We have very good backup in place, so we did discover a ransom demand encoded in one of the servers, but we haven't engaged directly at this stage at all with the ransom," he told RTĂ.
However, the ransom demanded by cyber hackers may pale as a problem in comparison to the potential for sensitive data having been stolen, warned Ronan Murphy, executive chairman of Cork-based cybersecurity firm Smarttech247.
Mr Murphy said that remedying a ransomware attack involves forensic investigation, like solving a murder.
âDepending on how widely embedded they were in the network, you can have several, fairly sophisticated data security forensic engineers involved in this process.
"It's quite a time-consuming process because you have to try to figure out how they broke in, where they went, and what they took.
âDid they leave any back doors open that enable them to successfully compromise the situation further?
âWhat kind of data did they steal? What are the regulatory repercussions for the organisation based on whatever data was potentially taken? Are they secure from this happening again?
âIt's a very lengthy process that they now have to engage in as an organisation. It is not trivial. And I would say itâs quite painful."
Mr Murphy said that the process is not straightforward and can take some time. He pointed to the 2021 ransomware attack on the HSE as an example which continues to have repercussions today.Â
The Public Accounts Committee heard last Friday how, although the State refused to pay the hackers, the long-term costs of the attack could rise to âŹ500m. More than 32,000 notification letters have been issued to people who had their data stolen in the attack and more than 100,000 notifications are to be issued by April.

Explaining the process of a ransomware attack, Mr Murphy said: âThe ransoms all are typically on timers. The bad guys try to pressurise you into paying.Â
"So they say, âif you pay âŹ100,000 right now, weâll give you the encryption keys and you get your data back. But every six or 12 hours that passes that goes up by 50%â.Â
âBut thatâs not so much the problem I would say, because most companies now have effective restore mechanisms, they have good back-ups of the data. So where the real problem in fact exists, depending on how long theyâve been in the network, is that they tend to exfiltrate data off the network, like what happened with the HSE.
âAnd thatâs where the problem lies, depending on what they decide to do with that data.Â
"Depending on the sensitivity of it, they can try to hack the people whose data theyâve stolen, they can try to extort them, thereâs a whole pile of nefarious activities around that data.Â
"Thatâs why the whole data piece is such a worry and why itâs such a problem for the HSE, people whoâve had medical records stolen, thereâs obviously a fallout from that."
EU organisations are required under law to notify the Data Protection Commissioner when a breach takes place and to notify the people whose data has been compromised within very stringent timelines, Mr Murphy said.
âSo they will notify the Data Protection Commissioner, theyâll then conduct a forensic investigation to try to understand what has happened, and theyâll try to notify the people whose data has been affected, and what type of data has been affected.
 "And youâd hope in that type of scenario, that the quicker youâre notified, the better," he said.






