A hospital in Los Angeles held hostage by malicious software

Mokey

Magically Delicious
Joined
Jul 24, 2015
Messages
21,850
Reaction score
19,354
Points
204
Age
51
Location
Isla Mariposa
for nearly two weeks has relented and paid hackers $17,000 worth of bitcoins in order to unlock important data. But while that resolves the most high-profile incident yet involving so-called ransomware, the tactic, which involves infecting a network, encrypting data, and demanding a ransom for unlocking it, is only growing in popularity. And cyberattacks on health-care facilities are on the rise.

Hospitals are getting hacked more often for several reasons. Many have converted or are in the process of converting paper records to digital ones, and the data in those records includes personal information that can fetch a healthy price in illegal data markets. Further, data security is commonly not prioritized highly enough in health-care facilities; systems are often out of date or not properly maintained, and the need to access data quickly in urgent situations can trump security.

Officials from the hospital that was attacked this time around, Hollywood Presbyterian Medical Center, claim there is no evidence that any data was stolen from the network. But the episode illustrates the power of ransomware, one of a range of sophisticated cyberweapons available to criminals looking to attack the industry.

Things could get worse before they get better. As hospitals add more connected devices to their networks, they potentially create more ways for hackers to get in. And the push for more personalized medicine—in particular, patients' demands for more and better access to their records—is likely to raise even more security-related challenges.

Hollywood Hospital’s Run-In with Ransomware Is Part of an Alarming Trend in Cybercrime
 
  • Like
Reactions: Debi
Great...now our hospital bills will be going up as well to compensate...
 
  • Like
Reactions: Mokey
I used to have a simple password to log onto my healthcare website. I made it much more complex three years ago.
 
  • Like
Reactions: Debi
Word has it that a particularly nasty strain of ransomware (Crypty, I keep hearing) got into the network somehow, probably through a spear phishing attack. The agent propagated through the network through Windows file shares and went off all at once. I would think that it happened during the overnight shift, when it was least likely for IT staff to be on site at the time.

When it comes to extortion, the attackers tend to demand only what they think the target can pay. As I recall, the ransome was origionally around $3 million dollars US.
 
Word has it that a particularly nasty strain of ransomware (Crypty, I keep hearing) got into the network somehow, probably through a spear phishing attack. The agent propagated through the network through Windows file shares and went off all at once. I would think that it happened during the overnight shift, when it was least likely for IT staff to be on site at the time.

When it comes to extortion, the attackers tend to demand only what they think the target can pay. As I recall, the ransome was origionally around $3 million dollars US.
Thanks for the insight.