Kuwait Ministry of Finance Rhysida Ransomware Hits Government Systems

Sep 2023 路 Government sector

By Karim El Labban · ZERO|TOLERANCE

馃嚢馃嚰 KuwaitSeptember 202310 min read

# Kuwait Ministry of Finance: Rhysida Ransomware Hits Government Systems

In September 2023, the Rhysida ransomware group - the same criminal organization

that struck Abdali Hospital in Jordan weeks earlier - claimed a successful intrusion

into Kuwait's Ministry of Finance, demanding a ransom payment in exchange for

stolen data and the decryption of compromised government systems. The Ministry of Finance

is the fiscal nerve center of one of the Gulf's wealthiest states, overseeing

budget formulation, public expenditure, and the operational activities supporting Kuwait's

$900 billion-plus sovereign wealth fund, the Kuwait Investment Authority.

Kuwait's national Computer Emergency Response Team, CERT-KW, was activated in

response to the incident. Rhysida threatened to publish stolen data publicly on its dark

web leak site if ransom demands were not met, a tactic designed to amplify pressure on

government victims who may be unwilling to acknowledge a compromise publicly. The attack

exposed deep vulnerabilities in Kuwait's government cybersecurity posture at precisely

the moment the country was developing its first comprehensive data protection regulatory

framework under CITRA's oversight.

## Key Facts

  • .**What:** Rhysida ransomware hit Kuwait's Ministry of Finance in September 2023.
  • .**Who:** Kuwait's fiscal governance ministry overseeing the $900B sovereign wealth fund.
  • .**Data Exposed:** Budget data, employee credentials, vendor records, and fiscal documents.
  • .**Outcome:** CERT-KW activated; Rhysida threatened dark web data publication.

## What Was Exposed

  • .Government financial system access, potentially including budget planning data, expenditure records, and inter-ministerial transfer documentation
  • .Internal employee credentials and administrative account data from Ministry of Finance IT infrastructure
  • .Operational data potentially touching Kuwait Investment Authority support systems and sovereign wealth fund reporting
  • .Vendor and contractor records, including payment details and procurement documentation managed through MoF systems
  • .Potentially classified fiscal policy communications, treasury operations data, and debt management records
  • .Public-facing service data, including tax registration information and government fee payment records
  • .Internal network architecture documentation that would enable future intrusion attempts against connected government agencies

The Kuwait Ministry of Finance occupies a uniquely sensitive position within the Gulf

state's administrative structure. Unlike most national finance ministries, Kuwait's

operates in the shadow of an extraordinary sovereign wealth management apparatus. The Kuwait

Investment Authority, established in 1953 and one of the world's oldest and largest

sovereign wealth funds, holds assets estimated at over $900 billion - more than six

times Kuwait's annual GDP. While the KIA itself operates independently, the Ministry

of Finance serves a coordination and oversight function, processing government budgets,

managing the General Reserve Fund, and handling the administrative infrastructure through

which Kuwait's hydrocarbon revenues flow before reaching the KIA.

Rhysida is a ransomware-as-a-service (RaaS) group that emerged in mid-2023 and rapidly

established a reputation for targeting high-profile government and critical infrastructure

victims across multiple continents. The group's operations against healthcare and

government targets in the Middle East during this period were notable for their speed and

the calibre of institutions targeted. Rhysida employed a double-extortion model: encrypting

victim systems to disrupt operations while simultaneously exfiltrating data to use as

additional leverage. This dual-pressure strategy is particularly effective against government

victims who face both operational disruption and the reputational damage of sensitive

information appearing on criminal leak sites.

The technical profile of Rhysida intrusions during this period typically involved initial

access through phishing campaigns targeting employees with administrative privileges, or

through exploitation of publicly exposed remote access services such as VPN appliances

and Remote Desktop Protocol endpoints. Once inside a network, Rhysida operators demonstrated

proficiency with living-off-the-land techniques: leveraging legitimate Windows administration

tools such as PsExec, PowerShell, and Windows Management Instrumentation to move laterally

while avoiding detection by signature-based security controls. The group frequently exploited

Active Directory misconfigurations to escalate privileges, ultimately deploying ransomware

payloads at scale across compromised environments.

CERT-KW's activation in response to this incident was significant - it

represented a real-world test of Kuwait's national incident response capabilities

against a sophisticated criminal adversary targeting the country's financial governance

infrastructure. CERT-KW operates under CITRA's mandate and serves as the primary

coordinator for cybersecurity incident response across Kuwait's government and

critical sectors. However, the fact that Rhysida was able to exfiltrate data and issue

public ransom demands suggests that CERT-KW's detection and containment capabilities

were not sufficient to prevent significant data loss before the breach was identified.

The timing of this attack is also strategically significant. September 2023 placed the

incident in the middle of Kuwait's ongoing process of developing comprehensive data

protection regulations. CITRA was actively working on what would eventually become the

DPPR Decision No. 26/2024 framework. A ransomware attack against the Ministry of Finance

-- one of the most sensitive data controllers in the Kuwaiti government --

occurring during the drafting of data protection regulations sent an unmistakable signal

about the urgency of establishing enforceable security standards for government data

processing operations.

The Rhysida group's public listing of the Kuwait Ministry of Finance on its dark

web leak site represented a form of asymmetric information warfare against a government

sovereign. Publicly naming a national finance ministry as a ransomware victim damages

international credit ratings assessments, creates uncertainty among foreign investors

evaluating Kuwait as a jurisdiction, and potentially affects bond markets if the breach

is perceived as undermining the integrity of Kuwait's financial management systems.

Criminal ransomware groups increasingly understand that the reputational damage imposed

on government victims can be as damaging as the operational disruption of the ransomware

deployment itself.

## Regulatory Analysis

At the time of the Rhysida attack, Kuwait's primary cybersecurity legal framework

was Law No. 63/2015 on Combating Information Technology Crimes, commonly referred to as

the Cybercrime Law. This legislation primarily addresses criminal liability for perpetrators

of cyberattacks rather than establishing data protection obligations for controllers who

suffer breaches. The law creates offenses for unauthorized access, data interference,

and system disruption, but does not specify minimum security standards that organizations

must implement to protect data, nor does it establish a breach notification regime with

defined timelines.

CITRA's Data Protection and Privacy Regulation, Decision No. 26/2024, introduced

a 72-hour breach notification requirement that would have applied directly to this incident

had it been in force at the time. Under the DPPR, the Ministry of Finance, as a data

controller processing personal data of government employees, contractors, and citizens

using Ministry services, would have been obligated to notify CITRA within 72 hours of

becoming aware of the breach. The regulation also requires notification to affected

data subjects where the breach is likely to result in high risk to their rights and

freedoms - a standard that a ransomware attack encrypting and exfiltrating government

financial records would almost certainly meet.

Kuwait's E-Commerce Law No. 20/2014 contains provisions relevant to the security

of electronic transactions and data processed through government digital services. The

Ministry of Finance's online platforms, through which citizens and businesses

interact with government financial services, are covered by this framework. A compromise

that potentially exposes data processed through these platforms engages the security

obligations established under the E-Commerce Law, even where the breach originated

in internal administrative systems rather than the public-facing services themselves.

The maximum fine available under Kuwait's regulatory framework - KWD 20,000,

approximately $65,000 USD - is strikingly disproportionate to the scale of a

ransomware attack against a national finance ministry. For context, the EU's GDPR

allows fines of up to 4% of global annual turnover or EUR 20 million, whichever is higher.

The DPPR Decision No. 26/2024 maximum of KWD 20,000 creates minimal financial incentive

for data controllers to invest meaningfully in cybersecurity beyond the minimum required

to avoid regulatory censure. For a government ministry with a multi-billion dinar annual

budget, the maximum regulatory fine represents a rounding error in the cost-benefit

analysis of cybersecurity investment.

Kuwait is in the process of developing a comprehensive Personal Data Protection Law that

would replace the current patchwork of sectoral regulations with a unified framework.

The Rhysida attack on the Ministry of Finance provides a compelling case study for

lawmakers to consider as they design this legislation: specifically, the need for mandatory

security standards for high-risk data controllers, minimum technical requirements for

government data processing environments, and financial penalties calibrated to create

genuine deterrence rather than being treated as a cost of doing business.

## What Should Have Been Done

Preventing a Rhysida intrusion requires layered defenses that address each phase of

the attack lifecycle: initial access, lateral movement, privilege escalation, and

ransomware deployment. For an institution of the Ministry of Finance's sensitivity,

these defenses should operate at a standard significantly above what might be acceptable

for a lower-risk data controller.

Email security is the first line of defense against phishing-based initial access, which

represents the most common entry vector for Rhysida and similar RaaS operators. The Ministry

should have deployed a cloud-delivered email security platform with machine-learning-based

detection of business email compromise attempts, malicious attachments, and credential

harvesting links. This should be supplemented by mandatory security awareness training

with phishing simulation exercises for all Ministry employees, with particular emphasis

on employees handling financial authorizations or holding administrative system credentials.

DMARC, DKIM, and SPF email authentication controls should have been enforced on the

Ministry's email domains to prevent spoofing of government sender addresses.

Exposure of remote access services - VPN appliances and RDP endpoints - to

the public internet is a primary attack surface exploited by ransomware groups. The

Ministry's VPN infrastructure should have been hardened with mandatory multi-factor

authentication for all remote access sessions, with hardware security keys required for

privileged users. RDP should not have been exposed directly to the internet under any

circumstances; where remote administrative access was required, it should have been

channeled exclusively through a privileged access workstation (PAW) architecture with

full session recording and real-time anomaly detection.

Active Directory security is foundational to preventing the privilege escalation that

Rhysida operators rely upon to achieve domain-wide ransomware deployment. The Ministry

should have implemented a tiered administration model separating domain controllers, server

administration, and workstation administration into distinct privilege tiers with dedicated

administrator accounts for each tier. Credential Guard and Protected Users security groups

should have been enabled on all Windows systems to prevent credential theft via memory

dumping tools like Mimikatz, which are a standard component of the Rhysida operator

toolkit. Laps (Local Administrator Password Solution) should have managed local administrator

passwords across all endpoints, eliminating the pass-the-hash attack surface.

A 3-2-1 backup strategy with offline immutable backups is the single most effective

mitigation against ransomware's operational impact. The Ministry should have

maintained three copies of all critical data, on two different media types, with at

least one copy stored offline or in an air-gapped environment that ransomware operators

cannot reach through network-based encryption. Cloud-based immutable backup services

with object lock enabled provide cost-effective protection against ransomware targeting

backup infrastructure, which Rhysida operators routinely attempt to destroy before

deploying their encryption payload.

An endpoint detection and response (EDR) solution deployed across all Ministry systems,

managed by a 24/7 security operations center with the authority to isolate compromised

endpoints, is essential for containing a ransomware intrusion before it achieves widespread

encryption. EDR platforms capable of behavioral detection of ransomware pre-cursor activity

-- such as volume shadow copy deletion, rapid file encryption, and credential dumping

-- can identify and respond to Rhysida deployment in its early stages, before the

ransomware payload has encrypted sufficient data to cause significant operational disruption.

For a ministry of this sensitivity, a managed detection and response (MDR) provider with

Gulf region expertise and government security clearance should have been retained.

A ransomware attack against Kuwait's Ministry of Finance is not merely an IT

incident - it is an assault on the financial governance infrastructure of a

sovereign wealth state. With CITRA's DPPR Decision No. 26/2024 now establishing

72-hour breach notification requirements, the next such attack will carry regulatory

consequences alongside operational damage, making proactive investment in enterprise-grade

security controls not just a best practice but a legal obligation.

RELATED ANALYSIS

Conduent/SafePay: 25M Americans Exposed in 84-Day Ransomware Dwell - Largest US Government Data Breach
Jan 13, 2025 路 25M+ affected 路 8.5TB exfiltrated 路 84-day dwell
UAE Foils AI-Powered Ransomware Campaign - 200,000 Attacks/Day Intercepted
Feb 18-21, 2026 路 200K/day
University of Mississippi Medical Center: 35 Clinics Shut Down 9 Days by Ransomware
Feb 19 - Mar 2, 2026 路 Healthcare
Passaic County, NJ: Medusa Ransomware Disables Government Services for 526,000 Residents
Mar 4, 2026 路 526K residents 路 $800K ransom
Omrania & Associates: INC Ransom Publishes 4TB of Saudi Critical Infrastructure Drawings
Jan 9, 2026 路 4TB published 路 Egis subsidiary
MORE RANSOMWARE →