Cyber-Attack in Bulgaria: 70% Could Be Affected

Akin Gump Strauss Hauer & Feld LLP
Contact

Akin Gump Strauss Hauer & Feld LLP

Introduction

On 15 July 2019, an unprecedented cyber-attack in Bulgaria was announced. Hackers have stolen data from the National Revenue Agency (“NRA”) relating to around 70% of Bulgaria’s population, including foreign nationals and businesses, and comprising names of individuals and companies, personal and corporate identification numbers, email addresses, healthcare and pension contributions information and income details. According to news reports, the Bulgarian Government had thus far considered the NRA system to be one of the most advanced systems, into which substantial and continuous investment has been made. By contrast, the hackers claimed the opposite. The Chairman of Bulgaria’s Commission for Personal Data Protection announced that he would commence an investigation against NRA. In the wake of such a large-scale cyber-attack, we consider certain steps which organisations and individuals might take in the context of cybersecurity and data breach.

An Unprecedented Cyber-Attack: What is Currently Known

On 15 July 2019, a group of hackers sent an email to a number of Bulgarian news agencies, informing them that they had carried out a large scale cyber-attack against the NRA, an agency of the Bulgarian Ministry of Finance, responsible primarily for administering taxes and national insurance contributions, for both citizens and businesses. The cyber-attack was confirmed by Bulgaria’s Prime Minister, who convened an emergency meeting of the Government’s Security Council on 16 July 2019. The hackers reportedly announced that the stolen data relate to personal data of over 5 million Bulgarian nationals, as well as foreign nationals and companies. If correct, this would represent around 70% of the 7 million population of Bulgaria.

It has since been confirmed that the information leaked is authentic and has not been falsified.

Parts of the stolen data were sent by the hackers to news agencies and reportedly include names of individuals and companies, personal and corporate identification numbers, email addresses, healthcare and pension contributions information and income details. The hackers have reportedly stated that the initial leak covers 57 out of a total of 110 compromised sets of data, with a total volume of around 21 gigabytes.

The full scale and details of the cyber-attack are still under investigation. At this stage, it has been reported that the attack took place on 29 June 2019, when the hackers penetrated one of the servers of the Ministry of Finance. The NRA has stated that it operates around 60 databases and personal data are stored on various servers. The attack apparently only infiltrated one of those databases, but as the data are inter-linked, the hackers gained access to wider data sets.

Immediate Aftermath

This is the first publicly reported successful cyber-attack in Bulgaria on such a large scale.

Several Bulgarian national agencies have commenced investigations and are cooperating in the aftermath of the attack, including the State Agency for National Security, the Ministry of the Interior’s Lead Agency for the Fight against Organised Crime and the State e-Government Agency. On 16 July 2019, the Minister of Finance and the Minister of the Interior spoke before members of the Bulgarian Parliament and answered questions in relation to the attack. One of the hackers, reportedly a 20-year old employee of a cyber-security company, was arrested on 17 July 2019.

Bulgaria’s Commission for Personal Data Protection (“CPDP”) has been informed of the cyber-attack, as well as the European Union’s cyber security agency. On 18 July 2019, the Chairman of the CPDP announced that he would commence an investigation against NRA. Further, he has explained that a system will be set up within the next 10 days where Bulgarians can check if their data have been stolen as a result of the cyber-attack.

According to the Bulgarian Minister of the Interior, the NRA systems are being checked to prevent similar attacks in the future. In that context, a thorough investigation is being carried out into: attempts to access the NRA’s servers and databases; any successful access and any unauthorised access that might have taken place during the months preceding the attack; and the status of the relevant cyber-security and IT systems in place.

What Can Be Done Now and What Can Businesses Take Away?

According to news reports, the Bulgarian Government had thus far considered the NRA system to be one of the most advanced systems, into which substantial and continuous investment has been made. By contrast, the hackers claimed the opposite.

One of the take-away points at this stage is that businesses, government agencies, and data controllers and processors generally, would be wise to investigate carefully whether their systems comply with cyber-security regulation, including the GDPR. As recently as 8 July 2019, the Information Commissioner’s Office (the UK data protection authority) announced its intention to fine British Airways £183 million (approximately US$230 million), 1.5 percent of the company’s annual turnover, for a data breach under the GDPR, as a result of a similar cyber-attack, where stolen data affected around 500,000 customers. CPDP, the Bulgarian data protection authority, has announced that an investigation would be undertaken against the NRA (see above) and the outcome remains to be seen. The maximum fine for a data breach under the GDPR is €20 million (approximately US$22.5 million), or 4 percent of an organisation’s annual turnover, whichever is higher.

Further, consideration should be given not only as to whether more could be done to enhance an organisation’s cyber-security, but also whether appropriate protocols are in place and would be followed if and when a cyber-attack takes place. As mentioned in our recent alert, implementing training and education programmes, as well as ensuring that internal controls are at satisfactory levels, will help minimise the risk of a breach.

In addition, in light of the large scale of data affected and the attention, which the cyber-attack has received publicly, individuals and companies affected might wish to consider whether any steps will now be required in order to protect their legal rights.

We will be monitoring the situation for further developments.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Akin Gump Strauss Hauer & Feld LLP | Attorney Advertising

Written by:

Akin Gump Strauss Hauer & Feld LLP
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Akin Gump Strauss Hauer & Feld LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide