• last year
DICT, patuloy na inaalam ang lawak ng epekto ng hacking sa system ng DOST;

Schematics, designs at impormasyon ng mga scientist, kabilang sa naapektuhan ng hacking

Category

šŸ—ž
News
Transcript
00:00 The DOST is continuing to investigate the hacking system due to the large amount of data that may be affected.
00:08 The DOST is also consulting the Department of Information and Communication Technology
00:13 to bring their cybersecurity protocols.
00:16 The details are in the report of Rod Lagusan.
00:19 The Department of Information and Communication Technology is still investigating
00:26 the wide effect of hacking on the system of the Department of Science and Technology.
00:31 According to the DICT, the DOST system is still locked out from accessing the system.
00:36 DICT Assistant Secretary Renato Paraizo explained that this is consistent with the ransomware attack
00:42 which is about encrypting data and losing access
00:45 that will follow a request for a replacement before giving access to the compromised system.
00:51 In the DOST situation, there is still no demand from the hackers.
00:55 But the DICT left a political message on the DOST website
00:58 up to the charter change and political dynasties.
01:02 That's why the DICT did not remove the possibility that it is a part of the activism
01:06 or that the public is afraid of.
01:08 Initially, we are not ruling out anything but we can say to a certain degree of certainty that it is a local threat.
01:17 Not because of the nature of the message but even the language that was used,
01:23 the digital footprints, the digital signatures of the hackers are consistent with local threat actors.
01:30 At present, the National Computer Emergency Response Team or NCERT of the DICT
01:35 has partial access to the system.
01:38 Based on the initial investigation of the DICT,
01:40 the amount of data affected by hacking is up to 2 terabytes.
01:45 But the DICT did not remove the possibility that the data could be more compromised.
01:50 If we do a comparison on the field health hacking, it is small comparatively,
01:56 but the data that was hacked by the field health is more sensitive because it involves the personal data of its members.
02:02 So the storage space is small but it is very significant.
02:05 Here, mostly are the data that were under the custody and care of DOST.
02:11 So it involves the proposals for inventions.
02:14 Even their backup and redundancies were also compromised.
02:18 The schematics, designs, and information of the scientists were also compromised,
02:22 even the login access of the administrator.
02:25 According to the DICT, this is one of the largest data that was hacked.
02:29 The agency also explained that there is a security protocol that was implemented by DOST
02:33 but the hackers were able to hack the system.
02:36 According to this, it is the long procurement process that is affected
02:40 where it is the fastest to procure a new system 45 to 60 days before.
02:46 You have to understand in the world of ICT, the system you might employ now might be obsolete later on,
02:51 it might take six months to turn over.
02:54 We encourage our counterparts in government to be forward-looking and it should be upgradable.
03:02 Whatever they procure, the systems they procure, they have to be thinking in two years' time, it is still applicable.
03:11 The DICT's adviser said that they should first see the systems that the government agencies will use
03:17 to assess if it is within the standard.
03:20 The DOST's coordination with the DICT continues after the hacking.
03:24 According to DOST Secretary Renato Salidong Jr.,
03:27 their technical team is now aware of the weakness of their system
03:30 while strengthening their cyber defense.
03:33 The public's action was probably the reason for the failure and the system was separated from the affected.
03:40 The recovery plan was also started, including the system that was affected.
03:45 For the DICT, it is time to return full access to the DOST system.
03:49 This is where a deeper investigation can be carried out on the methods used and the scope of the hack.
03:56 Based on the DICT's data, there are up to two million attacks happening in the country every day,
04:01 whether it is government or private,
04:03 where there is an opportunity for the use of artificial intelligence.
04:07 Rod Laguzad for Pambansang TV in Bagong, Philippines.

Recommended