Archetyp Links

Light Mode

Article Details

New cyber boss about the giant leak: Not surprised

Published on September 20, 2025

On September 1, one week after the cyberattack against the system supplier, the environmental data became John Billow head of Sweden's national cyber security center. - Our assessment is that it is serious, he says of the leak. - It is based on a number of factors: the amount of data published, that there are large amounts of personal data that has expired and we have seen that there are also protected personal data and information about people who are part of sensitive activities. - It has also leaked in structured form, which means that you can get comprehensive information about a specific organization and all its employees. Did it surprise you that this can happen in Sweden in 2025? Advertisement - Unfortunately not.We have seen most similar types of attacks. - At the same time, we know that there are deficiencies in cyber security in organizations in Sweden, even in operations that are of more critical importance. Basic deficiencies How could it happen? -In general, we see that there may be basic deficiencies in how to handle accounts and permissions, how to update systems, what you have for IT architecture, what software you have and how to control your internet access and so on. Will it happen again? - Cyber ​​security work is a continuous work.This is not something you will be done with, as the technology is updated, the software is updated and vulnerabilities are discovered which means that you have to constantly adjust and work with safety.If you do not have that system in your work, then vulnerabilities will arise again in the long run. Threat players step ahead The so -called threat actors are always a step ahead in seeing where the vulnerabilities are, according to John Billow. - Therefore, the business must also constantly update itself.If you do not, there is a risk that it will happen again. How can customers, such as municipalities, protect themselves against cyberattack from a system supplier? - This illustrates the complexity that is in the fact that we have put out a lot of operations on other players.There are sometimes subcontractors in several stages, which make it hit further up the chain. Advertisement - It places great demands on those who procure, to both place the right requirements based on the type of information to be handed over and the service to buy. Facts: Cyber ​​attack on environmental ado On August 23, an IT attack was implemented against the system supplier Environmental Data, which among other things has 80 percent of the municipalities as customers.Regions, authorities and private companies also use environmental data's systems for handling, among other things, labor law cases, rehabilitation cases and the management of work injuries and incidents.The group behind the Cyberattack gained access to information of just over 1.5 million people.These include, for example, social security numbers, telephone numbers, home addresses, email addresses, employment IDs, as well as occupation and position.On September 14, the information was published on Darknet.The event is investigated as a rough data breach and attempted extortion.