The threat of ransomware attacks and how to stop them
Ransomware attacks in healthcare are rising, we take a look at how these can be prevented
Ransomware attacks in healthcare are rising, we take a look at how these can be prevented
A recent study by software security firm VMware Carbon Black looked at cyberattacks among their healthcare customers and found an unprecedented figure – almost 240 million attempted attacks in 2020. This demonstrated the dramatic rise in the risk cyber criminals pose to healthcare.
In October 2020 the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) warned of the increased threat to healthcare providers and hospitals. They cited a particular group, named UNC1878, who were behind financially motivated attacks where they used ransomware to encrypt their target and extort the owner.
Ransomware attacks can be extremely damaging. Last year Rangely District Hospital in Colorado suffered an attack whereby the proprietary software used to access medical records was infected. The hospital didn’t pay the ransom, and five years of patient records became inaccessible.
Perpetuators of these types of attacks often act fast, with organisations sometimes experiencing the full lifecycle of an attack in just two days.
In their report, VMware Carbon Black were able to identify the top five ransomware families currently plaguing the healthcare industry:
VMware’s research found “secondary infections,” across the digital healthcare supply chain, which are used to facilitate long-term cyberattack campaigns. This is leading to a surge in extortions and helping to fuel a cybercrime market mostly taking place on the dark web.
Information that is typically being sold includes personal info and medical records, such as names, patient IDs, home addresses, and health insurance details. In the last year data containing details of patients who have taken a COVID-19 test has also been stolen and sold.
An example VMware found was doctors’ private information, including home phone number and personnel number, being sold for $500 on the dark net.
During the speculation last year that Hydroxychlorquine could help treat patients with COVID-19, cybercriminals began selling this on the dark web for about $1.
Key to preventing these attacks is ensuring staff are informed and taking precautions such as scanning emails for threats, checking firewalls are working, and being mindful of phishing attacks. Staff training on security is essential for this. Additionally the following measures are important:
Lastly Darren Guccione, CEO of password manager app Keeper, recommends that organisations don’t pay ransoms, even if their systems have been compromised. "Cybercriminals frequently don't release access after a ransom is paid” he said. “Don't trust them. Instead, take the necessary precautions and internal control measures regarding file backup, recovery, and incident response."