INTELLIGENCE
ZERO|TOLERANCE
Intelligence Advisory
zerotolerance.me

Kuwait Ministry of Finance Rhysida Ransomware Hits Government Systems

Sep 2023 · Government sector

Publication Date
2023-09-01
Category
Ransomware
Author
K. Ellabban
Organization
Zero|Tolerance Security Research

In September 2023, the Rhysida ransomware group - the same criminal organization that struck Abdali Hospital in Jordan weeks earlier - claimed a successful intrusion into Kuwait's Ministry of Finance, demanding a ransom payment in exchange for stolen data and the decryption of compromised government systems. The Ministry of Finance is the fiscal nerve center of one of the Gulf's wealthiest states, overseeing budget formulation, public expenditure, and the operational activities supporting Kuwait's $900 billion-plus sovereign wealth fund, the Kuwait Investment Authority.

Executive Summary

Key Facts

  • WhatRhysida ransomware hit Kuwait's Ministry of Finance in September 2023.
  • WhoKuwait's fiscal governance ministry overseeing the $900B sovereign wealth fund.
  • Data ExposedBudget data, employee credentials, vendor records, and fiscal documents.
  • OutcomeCERT-KW activated; Rhysida threatened dark web data publication.
Impact Assessment

What Was Exposed

  • Government financial system access, potentially including budget planning data, expenditure records, and inter-ministerial transfer documentation
  • Internal employee credentials and administrative account data from Ministry of Finance IT infrastructure
  • Operational data potentially touching Kuwait Investment Authority support systems and sovereign wealth fund reporting
  • Vendor and contractor records, including payment details and procurement documentation managed through MoF systems
  • Potentially classified fiscal policy communications, treasury operations data, and debt management records
  • Public-facing service data, including tax registration information and government fee payment records
  • Internal network architecture documentation that would enable future intrusion attempts against connected government agencies

The Kuwait Ministry of Finance occupies a uniquely sensitive position within the Gulf state's administrative structure. Unlike most national finance ministries, Kuwait's operates in the shadow of an extraordinary sovereign wealth management apparatus.

The Kuwait Investment Authority, established in 1953 and one of the world's oldest and largest sovereign wealth funds, holds assets estimated at over $900 billion - more than six times Kuwait's annual GDP. While the KIA itself operates independently, the Ministry of Finance serves a coordination and oversight function, processing government budgets, managing the General Reserve Fund, and handling the administrative infrastructure through which Kuwait's hydrocarbon revenues flow before reaching the KIA.

Rhysida is a ransomware-as-a-service (RaaS) group that emerged in mid-2023 and rapidly established a reputation for targeting high-profile government and critical infrastructure victims across multiple continents. The group's operations against healthcare and government targets in the Middle East during this period were notable for their speed and the calibre of institutions targeted. Rhysida employed a double-extortion model: encrypting victim systems to disrupt operations while simultaneously exfiltrating data to use as additional leverage.

This dual-pressure strategy is particularly effective against government victims who face both operational disruption and the reputational damage of sensitive information appearing on criminal leak sites.

The technical profile of Rhysida intrusions during this period typically involved initial access through phishing campaigns targeting employees with administrative privileges, or through exploitation of publicly exposed remote access services such as VPN appliances and Remote Desktop Protocol endpoints.

Once inside a network, Rhysida operators demonstrated proficiency with living-off-the-land techniques: leveraging legitimate Windows administration tools such as PsExec, PowerShell, and Windows Management Instrumentation to move laterally while avoiding detection by signature-based security controls. The group frequently exploited Active Directory misconfigurations to escalate privileges, ultimately deploying ransomware payloads at scale across compromised environments.

CERT-KW's activation in response to this incident was significant - it represented a real-world test of Kuwait's national incident response capabilities against a sophisticated criminal adversary targeting the country's financial governance infrastructure. CERT-KW operates under CITRA's mandate and serves as the primary coordinator for cybersecurity incident response across Kuwait's government and critical sectors.

However, the fact that Rhysida was able to exfiltrate data and issue public ransom demands suggests that CERT-KW's detection and containment capabilities were not sufficient to prevent significant data loss before the breach was identified.

The timing of this attack is also strategically significant. September 2023 placed the incident in the middle of Kuwait's ongoing process of developing comprehensive data protection regulations. CITRA was actively working on what would eventually become the DPPR Decision No. 26/2024 framework.

A ransomware attack against the Ministry of Finance -- one of the most sensitive data controllers in the Kuwaiti government -- occurring during the drafting of data protection regulations sent an unmistakable signal about the urgency of establishing enforceable security standards for government data processing operations.

The Rhysida group's public listing of the Kuwait Ministry of Finance on its dark web leak site represented a form of asymmetric information warfare against a government sovereign. Publicly naming a national finance ministry as a ransomware victim damages international credit ratings assessments, creates uncertainty among foreign investors evaluating Kuwait as a jurisdiction, and potentially affects bond markets if the breach is perceived as undermining the integrity of Kuwait's financial management systems.

Criminal ransomware groups increasingly understand that the reputational damage imposed on government victims can be as damaging as the operational disruption of the ransomware deployment itself.

Compliance Impact

Regulatory Analysis

At the time of the Rhysida attack, Kuwait's primary cybersecurity legal framework was Law No. 63/2015 on Combating Information Technology Crimes, commonly referred to as the Cybercrime Law. This legislation primarily addresses criminal liability for perpetrators of cyberattacks rather than establishing data protection obligations for controllers who suffer breaches.

The law creates offenses for unauthorized access, data interference, and system disruption, but does not specify minimum security standards that organizations must implement to protect data, nor does it establish a breach notification regime with defined timelines.

CITRA's Data Protection and Privacy Regulation, Decision No. 26/2024, introduced a 72-hour breach notification requirement that would have applied directly to this incident had it been in force at the time. Under the DPPR, the Ministry of Finance, as a data controller processing personal data of government employees, contractors, and citizens using Ministry services, would have been obligated to notify CITRA within 72 hours of becoming aware of the breach.

The regulation also requires notification to affected data subjects where the breach is likely to result in high risk to their rights and freedoms - a standard that a ransomware attack encrypting and exfiltrating government financial records would almost certainly meet.

Kuwait's E-Commerce Law No. 20/2014 contains provisions relevant to the security of electronic transactions and data processed through government digital services. The Ministry of Finance's online platforms, through which citizens and businesses interact with government financial services, are covered by this framework. A compromise that potentially exposes data processed through these platforms engages the security obligations established under the E-Commerce Law, even where the breach originated in internal administrative systems rather than the public-facing services themselves.

The maximum fine available under Kuwait's regulatory framework - KWD 20,000, approximately $65,000 USD - is strikingly disproportionate to the scale of a ransomware attack against a national finance ministry. For context, the EU's GDPR allows fines of up to 4% of global annual turnover or EUR 20 million, whichever is higher.

The DPPR Decision No. 26/2024 maximum of KWD 20,000 creates minimal financial incentive for data controllers to invest meaningfully in cybersecurity beyond the minimum required to avoid regulatory censure. For a government ministry with a multi-billion dinar annual budget, the maximum regulatory fine represents a rounding error in the cost-benefit analysis of cybersecurity investment.

Kuwait is in the process of developing a comprehensive Personal Data Protection Law that would replace the current patchwork of sectoral regulations with a unified framework.

The Rhysida attack on the Ministry of Finance provides a compelling case study for lawmakers to consider as they design this legislation: specifically, the need for mandatory security standards for high-risk data controllers, minimum technical requirements for government data processing environments, and financial penalties calibrated to create genuine deterrence rather than being treated as a cost of doing business.

Assessment

What Should Have Been Done

Preventing a Rhysida intrusion requires layered defenses that address each phase of the attack lifecycle: initial access, lateral movement, privilege escalation, and ransomware deployment. For an institution of the Ministry of Finance's sensitivity, these defenses should operate at a standard significantly above what might be acceptable for a lower-risk data controller.

Email security is the first line of defense against phishing-based initial access, which represents the most common entry vector for Rhysida and similar RaaS operators. The Ministry should have deployed a cloud-delivered email security platform with machine-learning-based detection of business email compromise attempts, malicious attachments, and credential harvesting links.

This should be supplemented by mandatory security awareness training with phishing simulation exercises for all Ministry employees, with particular emphasis on employees handling financial authorizations or holding administrative system credentials.

DMARC, DKIM, and SPF email authentication controls should have been enforced on the Ministry's email domains to prevent spoofing of government sender addresses.

Exposure of remote access services - VPN appliances and RDP endpoints - to the public internet is a primary attack surface exploited by ransomware groups. The Ministry's VPN infrastructure should have been hardened with mandatory multi-factor authentication for all remote access sessions, with hardware security keys required for privileged users.

RDP should not have been exposed directly to the internet under any circumstances; where remote administrative access was required, it should have been channeled exclusively through a privileged access workstation (PAW) architecture with full session recording and real-time anomaly detection.

Active Directory security is foundational to preventing the privilege escalation that Rhysida operators rely upon to achieve domain-wide ransomware deployment. The Ministry should have implemented a tiered administration model separating domain controllers, server administration, and workstation administration into distinct privilege tiers with dedicated administrator accounts for each tier.

Credential Guard and Protected Users security groups should have been enabled on all Windows systems to prevent credential theft via memory dumping tools like Mimikatz, which are a standard component of the Rhysida operator toolkit. Laps (Local Administrator Password Solution) should have managed local administrator passwords across all endpoints, eliminating the pass-the-hash attack surface.

A 3-2-1 backup strategy with offline immutable backups is the single most effective mitigation against ransomware's operational impact. The Ministry should have maintained three copies of all critical data, on two different media types, with at least one copy stored offline or in an air-gapped environment that ransomware operators cannot reach through network-based encryption.

Cloud-based immutable backup services with object lock enabled provide cost-effective protection against ransomware targeting backup infrastructure, which Rhysida operators routinely attempt to destroy before deploying their encryption payload.

An endpoint detection and response (EDR) solution deployed across all Ministry systems, managed by a 24/7 security operations center with the authority to isolate compromised endpoints, is essential for containing a ransomware intrusion before it achieves widespread encryption.

EDR platforms capable of behavioral detection of ransomware pre-cursor activity -- such as volume shadow copy deletion, rapid file encryption, and credential dumping -- can identify and respond to Rhysida deployment in its early stages, before the ransomware payload has encrypted sufficient data to cause significant operational disruption.

For a ministry of this sensitivity, a managed detection and response (MDR) provider with Gulf region expertise and government security clearance should have been retained.

A ransomware attack against Kuwait's Ministry of Finance is not merely an IT incident - it is an assault on the financial governance infrastructure of a sovereign wealth state. With CITRA's DPPR Decision No. 26/2024 now establishing 72-hour breach notification requirements, the next such attack will carry regulatory consequences alongside operational damage, making proactive investment in enterprise-grade security controls not just a best practice but a legal obligation.