{"id":1232,"date":"2020-04-20T18:52:00","date_gmt":"2020-04-20T18:52:00","guid":{"rendered":"https:\/\/share.242studio.com\/pandemija-jedne-lozinke-kako-je-sifra-za-covid-19-zavrsila-na-internetu\/"},"modified":"2025-02-02T14:46:48","modified_gmt":"2025-02-02T14:46:48","slug":"a-password-pandemic-how-did-a-covid-19-password-end-up-online","status":"publish","type":"post","link":"https:\/\/share.242studio.com\/en\/a-password-pandemic-how-did-a-covid-19-password-end-up-online\/","title":{"rendered":"A Password Pandemic. How did a COVID-19 password end up online?"},"content":{"rendered":"\n<p>The username and password to access the&nbsp;<em>Covid \u2013 19 Information System<\/em>&nbsp;were publicly available on a health institution\u2019s web page for eight days. This period of time was long enough for the page to be indexed by Google and, although invisible on the web page, it was accessible through a simple search. After discovering the matter on the 17<sup>th<\/sup>&nbsp;of April, we immediately informed the competent authorities.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/share.242studio.com\/wp-content\/uploads\/share_defense_covid_2white-1.png\" alt=\"\" class=\"wp-image-1637\"\/><\/figure>\n\n\n\n<p><em>Screenshot of the webpage with login credentials for the Covid \u2013 19 Information System<\/em><\/p>\n\n\n\n<p>The&nbsp;<em>Covid \u2013 19 Information System<\/em>&nbsp;is a centralized software for collecting, analyzing and storing data on all persons monitored for the purpose of controlling and suppressing the pandemic in Serbia.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">How did we get this data?<\/h3>\n\n\n\n<p>Along with the state of emergency, the Government of Serbia introduced numerous measures to tackle the pandemic, which included collecting and processing personal data in the unprecedented circumstances. The Government also informed citizens about these measures by rendering unclear and undetailed conclusions,&nbsp; none of which specified who was supposed to process the citizens\u2019 data and how.<\/p>\n\n\n\n<p>In an effort to understand the data flow and implications on citizens\u2019 rights, we explored the new normative framework through publicly available sources. By searching keywords on Google, we accidentally discovered the page containing access information for the&nbsp;<em>Covid \u2013 19 Information System<\/em>. The data was published on the 9<sup>th<\/sup>&nbsp;of April.<\/p>\n\n\n\n<p>In addition, we also managed to obtain manuals with instructions for navigating the centralised system webpage.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Which data was at risk?<\/h3>\n\n\n\n<p>As per&nbsp;<a href=\"http:\/\/www.pravno-informacioni-sistem.rs\/SlGlasnikPortal\/eli\/rep\/sgrs\/vlada\/zakljucak\/2020\/50\/1\/reg\" target=\"_blank\" rel=\"noreferrer noopener\">Government\u2019s Conclusion on establishing the&nbsp;<em>Covid \u2013 19 Information System<\/em><\/a>, a significant number of health institutions is required to use the mentioned software to keep records on cured, deceased and tested persons (whether positive or negative), as well as on persons currently being treated, in self-isolation or put in temporary hospitals, including their location data. This system also contains data on persons who are possible disease-carriers due to their contact with other infected persons. The institutions are required to provide daily data updates, as it\u2019s the basis of the diurnal 15 o\u2019clock report read.<\/p>\n\n\n\n<p>While attempting to clarify how our data is being stored, we could not have imagined that we would discover the access password and thus be able to enter the system \u2013 just as anyone else who may have found this webpage. It was immediately clear to us that the most sensitive citizens\u2019 data were endangered and that the crucially important integrity of the system cannot be guaranteed in the fight against the pandemic.<\/p>\n\n\n\n<p>We did not log into the system, which would anyway record such an attempt. Instead, we reported the case to competent authorities:&nbsp;<em>the Commissioner for Information of Public Importance and Personal Data Protection, the National CERT and the Ministry of Trade, Tourism and Telecommunication<\/em>s. Being aware of the risk of misuse arising with the accessibility of citizens\u2019 sensitive data, we have decided to notify the public of the incident only after making sure that the authorities had prevented unauthorized access to the system.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/share.242studio.com\/wp-content\/uploads\/share_defense_covid_3white-1.png\" alt=\"\" class=\"wp-image-1634\"\/><\/figure>\n\n\n\n<p><em>Report of the breach sent to competent authorities<\/em>&nbsp;<em>by email<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">How did the competent bodies react?<\/h3>\n\n\n\n<p>Less than an hour following our report, we were informed that the initial steps were taken as a response to the incident, makings sure that the web page containing the username and the password is no longer publicly available.<\/p>\n\n\n\n<p>Given the scope of the case, we may expect further action from the competent bodies. The Commissioner has the authority to initiate monitoring in line with the&nbsp;<em>Law on Personal Data Protection<\/em>, the competent ministry is in charge of the inspection monitoring in line with the&nbsp;<em>Law on Information Security<\/em>, whereas the National CERT has the obligation to provide advice and recommendations in case of an incident.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Who\u2019s to blame?<\/h3>\n\n\n\n<p>Aware of the pressure put on health services at the peak of the pandemic, we agreed that, for now, it would be appropriate not to publish the information on the specific health institution in which the incident took place. On the other hand, there is no doubt that the scale of this incident demands that the responsibility for its occurrence is properly determined.<\/p>\n\n\n\n<p>The national legislative framework provides various mechanisms to prevent these kinds of situations, but the occurrences in practice are often far from the prescribed standards. Although they handle particularly sensitive data, health workers are often unaware of all possible risks present in the digital era. Health institutions are required to appoint a data protection officer, but due to limited resources, persons with insufficient expertise and unrelated primary job concerns are usually appointed to this position. In this specific case, the data protection officer may have been a person who takes care of corona-infected persons on a daily basis.<\/p>\n\n\n\n<p>As today\u2019s data protection demands the involvement of an IT expert, this requirement causes an additional burden to the public health institutions\u2019 budget. Sometimes this means that the same person deals with all technical issues within an institution, while being paid far less than their private sector counterparts and without the opportunity to build further information security expertise.<\/p>\n\n\n\n<p><em>Covid \u2013 19 Information System<\/em>&nbsp;established by the Government represents a key point in a complex architecture for collecting and processing all defined data. Data collection occurs through different channels, while a single health institution is only a one system entrance point. In such a system, it is rather difficult to implement protection measures at entrance point level, meaning they should be defined at the central level as it would significantly lower the risk of incidents. Based on this case, we have concluded that only one user account was created for each of the health institutions, which does not enable determining individual responsibility for the system misuse.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">What should have been done?<\/h3>\n\n\n\n<p>Without doubt, this is an ICT system of a special importance within which special categories of personal data are being processed. As such, it implies the necessity to undertake all measures stipulated by the Law on Information Security and the Law on Personal Data Protection in phases of its development and implementation. SHARE Foundation explored these measures to a great detail in its&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/share.242studio.com\/Documents\/vodic_zzpl_gdpr_share_2019.pdf\" target=\"_blank\">Guidebook on Personal Data Protection<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/resursi.sharefoundation.info\/wp-content\/uploads\/2020\/02\/Vodic-za-IKT-sisteme-od-posebnog-znacaja-2019.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Guidebook on ICT Systems of Special Importance<\/a>.<\/p>\n\n\n\n<p>By any means, it is necessary to fully implement&nbsp;<em>privacy by design<\/em>&nbsp;and&nbsp;<em>security by design&nbsp;<\/em>principles, which entail the following regarding the access to a system:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Every system user has their own access account<\/li>\n\n\n\n<li>Every system user has the authorisation to process only the data necessary for their line of work<\/li>\n\n\n\n<li>Access passwords are not published via an open network<\/li>\n\n\n\n<li>A standard on password complexity is put in place<\/li>\n\n\n\n<li>The number of incorrect password entries is limited<\/li>\n<\/ul>\n\n\n\n<p>Our accidental discovery on Google revealed a breach of security and data protection standards within the health system. The state of emergency instituted due to pandemic cannot serve as an excuse for a job poorly done, nor can it serve as an obstacle for conducting an immediate detailed analyses of compliance of&nbsp;<em>Covid \u2013 19 Information System<\/em>&nbsp;with security standards.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Read more:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/share.242studio.com\/sr\/digitalna-prava-na-balkanu-privatnost-pacijenata-na-udaru\/\" target=\"_blank\" rel=\"noreferrer noopener\">Digital rights in the Balkans: endangered privacy of patients<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/share.242studio.com\/sr\/prava-i-slobode-u-vreme-krize-javnog-zdravlja\/\" target=\"_blank\" rel=\"noreferrer noopener\">Limitation of rights and freedoms during a public health crisis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/share.242studio.com\/sr\/dan-posle-pandemije-idemo-li-ka-distopiji-nadzora\/\" target=\"_blank\" rel=\"noreferrer noopener\">The day after the pandemic: are we going towards a surveillance dystopia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/mojipodaci.rs\/agencija-za-privatizaciju-jedinstven-slucaj\/\" target=\"_blank\" rel=\"noreferrer noopener\">Privatisation Agency: a unique case<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Attachment: Data flow in the&nbsp;<em>Covid \u2013 19 Information System<\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/share.242studio.com\/wp-content\/uploads\/Share-Tok-Podataka-K19-300-02-02-1.png\" alt=\"\" class=\"wp-image-1656\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The username and password to access the&nbsp;Covid \u2013 19 Information System&nbsp;were publicly available on a health institution\u2019s web page for eight days. This period of time was long enough for the page to be indexed by Google and, although invisible on the web page, it was accessible through a simple search. After discovering the matter [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1487,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[38,34],"class_list":["post-1232","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-informaciona-bezbednost-en","tag-information-privacy"],"acf":[],"_links":{"self":[{"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/posts\/1232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/comments?post=1232"}],"version-history":[{"count":1,"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/posts\/1232\/revisions"}],"predecessor-version":[{"id":1233,"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/posts\/1232\/revisions\/1233"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/media\/1487"}],"wp:attachment":[{"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/media?parent=1232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/categories?post=1232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/share.242studio.com\/en\/wp-json\/wp\/v2\/tags?post=1232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}