Tag: cyber security

Opinion Piece: Business Continuity and Data Management – a Life-or-death Situation in Healthcare

Photo by Nahel Abdul on Unsplash

By Hemant Harie, Group CTO at DMP SA / Gabsten Technologies

Ransomware attacks are a growing concern for healthcare facilities worldwide, with attacks wreaking havoc, including encrypting complex patient records, cancelling appointments, delaying life-saving surgeries, and even rerouting ambulances. The critical nature of healthcare services, combined with the sensitive personal and medical data they handle, makes hospitals and healthcare providers a prime target for cybercriminals.

When these systems are compromised, the impact is severe, jeopardising patient safety, disrupting service delivery and causing financial strain. It has become imperative for healthcare facilities to adopt more robust cybersecurity measures, including effective data management strategies as part of an overall business continuity approach. Partnering with an expert third-party service provider can assist healthcare facilities in ensuring continuity of care and business operations even in the face of cyberattacks.

Attractive targets with unique vulnerabilities

Digital transformation within the healthcare space, while vital for improving patient care,  can also introduce significant cybersecurity risks. Many hospitals and healthcare facilities are at different stages in their digital transformation , and legacy infrastructure is a common challenge, alongside immature cybersecurity posture and processes, making them more susceptible to attacks.

Cybercriminals often target these systems because they handle vast amounts of sensitive data, including Personal Health Information (PHI), which is highly valuable on the black market. In addition, these facilities often lack the dedicated IT and cybersecurity specialists they need to adequately defend against or recover from ransomware incidents.

The nature of information housed within healthcare and the consequences of a breach mean the stakes are high. This, combined with the fact that healthcare facilities are legally bound by regulations such as the Protection of Personal Information Act (PoPIA), Health Insurance Portability and Accountability Act (HIPAA) and General Data Protection Regulation (GDPR) to protect this information, means potential breaches could have catastrophic consequences.

The impact of ransomware on healthcare

Ransomware attacks can have devastating effects on healthcare organisations, leading to significant downtime that directly threatens patient care. Operations may be postponed or cancelled, disrupting treatment schedules and putting patients’ lives at risk. Additionally, the exposure of PHI can result in severe legal and ethical repercussions, including costly regulatory fines and lawsuits. Financial losses also extend to ransom payments, the cost of recovery, and reputational damage, all of which can linger long after the attack is resolved.

Moreover, a ransomware attack on one healthcare facility can damage the reputation of the entire network, as trust is critical in healthcare. Patients may be less likely to seek care from a hospital they perceive as insecure, leading to long-term financial and operational challenges.

Data management mitigates ransomware risks

To effectively combat ransomware, healthcare organisations must prioritise data management and cyber resilience. This starts with classifying and understanding the types of data being processed and stored , such as medical records, surgical files, and other critical patient information. Once this data is properly categorised, healthcare facilities can implement security controls that ensure the integrity and availability of the data.

Regular, automated backups stored offline are essential for mitigating ransomware risks. These backups allow facilities to restore their systems quickly without paying a ransom, minimising downtime and ensuring continuity of care. In addition to regular backups, hospitals should adopt advanced security measures such as multi-factor authentication, firewalls, and intrusion detection systems to safeguard against unauthorised access.

An expert partner enhances data management and security

Third-party service providers offer critical expertise and comprehensive solutions that healthcare organisations may lack in-house. These providers specialise in data management, backup, and disaster recovery, ensuring that hospitals have access to the latest technologies and best practices for defending against cyber threats. These experts bring valuable experience from handling multiple cyber incidents across various sectors, which can inform and improve the healthcare facility’s own data management practices. In addition to providing technical expertise, third-party providers can offer ongoing education, helping healthcare staff stay informed about the latest cybersecurity threats and recovery processes.

One of the key services offered by third-party providers is automated backup and disaster recovery solutions. These services typically include offsite storage, secure cloud options, and regular backups, all of which are vital for restoring data and reducing downtime during a ransomware attack. Offsite storage and cloud solutions also protect data from physical threats like floods or fires, adding an extra layer of security. In addition to traditional backup services, advanced tools can enhance data protection by providing early warning systems and simulating real-time production environments, which allow healthcare facilities to detect and respond to potential threats before they can cause damage. For example, scanning tools can identify which versions of data are clean and free from malware, enabling faster and more effective recovery.

Partnering with a third-party provider ensures that healthcare organisations have access to continuous support and the latest innovations in data protection. These providers not only help mitigate ransomware risks but also assist in compliance with industry regulations and offer scalable solutions to meet the growing needs of healthcare facilities.

As ransomware threats continue to rise, healthcare organisations must take proactive steps to safeguard their systems and protect patient data. Effective data management, including regular backups and disaster recovery plans, is essential for mitigating these risks. By partnering with third-party service providers, healthcare facilities can leverage specialised expertise and advanced technologies to enhance their cybersecurity defences and maintain continuity of care, even in the face of growing cyber threats.

FBI Disrupts Cybercrime Group Which Extorted Hospitals

Photo by Nahel Abdul Had on Unsplash

The Hive ransomware group that has targeted more than 1500 victims in over 80 countries around the world, including hospitals, has been disrupted in a months-long campaign against, the US Justice Department has announced.

Hive ransomware attacks have caused major disruptions in victim daily operations around the world and hindered responses to the COVID pandemic. In one case, a hospital attacked by Hive ransomware had to fall back to pen and paper to treat existing patients and could not take new admissions shortly after the attack. 

The Justice Department revealed that the FBI had penetrated Hive’s computer network and captured its decryption keys, which were then offered to victims around the world. This saved them $130 million in ransom they would have had to otherwise pay to get their networks back.

Finally, the department announced that, in coordination with German and Dutch law enforcement, it has seized control of the servers and websites that Hive uses to communicate with its members, disrupting Hive’s ability to attack and extort victims.

Since June 2021, the Hive ransomware group has targeted more than 1500 victims around the world and received over $100 million in ransom payments.  

Hive used a ransomware-as-a-service (RaaS) model featuring administrators, and affiliates. RaaS is a subscription-based model where the administrators develop an easy-to-use ransomware strain and then recruit affiliates to deploy the ransomware against victims. Affiliates identified targets and deployed this readymade malicious software to attack victims and then earned a percentage of each successful ransom payment.

Hive actors used a double-extortion model of attack: before encrypting the victim’s system, the affiliate would steal sensitive data. The affiliate then sought a ransom for both the decryption key necessary to decrypt the victim’s system and a promise to not publish the stolen data – usually the most sensitive, such as hospital patient data. After a victim pays, the affiliates and administrators split the ransom 80/20. Victims who do not pay on the Hive Leak Site. After Consulate Health Care was unable to pay the ransom, since its insurance did not cover such cyber crimes, Hive posted 550GB of personally identifiable information on its patients and employees online.

For more information about the malware, including technical information for organisations about how to mitigate its effects, is available from CISA, visit https://www.cisa.gov/uscert/ncas/alerts/aa22-321a.

Cyber Attack Cripples Ireland’s Health Services

Photo by Nahel Abdul Hadi on Unsplash

A “significant ransomware attack” caused widespread disruption to Ireland’s health service, forcing cancellations and blocking services.

Paul Reid, Ireland’s Health Service Executive chief executive, told RTÉ there had been a “human-operated” attempt to access data for a likely ransom. “There has been no ransom demand at this stage. The key thing is to contain the issue. We are in the containment phase.”

Reid said the HSE was working with police, the defence forces and third-party cybersecurity experts to respond to the cyber attack. He apologised to patients and the public for the disruption.

The attack has affected national and local systems that provide core services. However COVID vaccinations and ambulance services were unaffected.

Several hospitals cancelled outpatient visits or asked patients with appointments to not attend. The Rotunda, a Dublin maternity hospital, said it was experiencing a “critical emergency”, cancelling all outpatients visits save for women over 35 weeks pregnant.

At Cork university hospital, the oncology department was reportedly brought to a halt. The child and family agency Tusla said its IT systems, including the portal through which child protection referrals are made, were offline.

In the US earlier this week, the Colonial petrochemical pipeline was crippled in a major cyberattack by a cybercriminal group called Darkside, resulting in fuel shortages and states of emergency being declared. The pipeline company reportedly paid a ransom fee of $5 million to get control back of their systems.

Master of the Rotunda Hospital Professor Fergal Malone told Morning Ireland that accessing patient records and data was the reason for the cancellations.

There was a backup plan to use an “old-fashioned” paper-based system, he said, but added that “throughput would be much slower” this way.

Malone said the hospital discovered unusual activity in its IT systems at about 2am and later detected what appeared to be a ransomware virus. “We use a common system throughout the HSE in terms of registering patients and it seems that must have been the entry point or source,” he told RTÉ. “It means we have had to shut down all our computer systems.”

However, all patients were safe. “We have systems in place to revert back to old-fashioned record-keeping.” Lifesaving equipment was not affected. “Patients will come in in labour over the weekend and we will be well able to look after them.”

Source: The Guardian