May 18, 2017 | | Comments 0
Print This Post
Email This Post

Easily preventable ransomware attack hits hospitals worldwide

Wanna Cry map, Screenshot, Sunday 14

A map of all computer systems struck by the Wanna Cry virus as of May 14. Courtesy of Malwaretech.com

As of Monday, May 15, , forcing them to pay $300 in untraceable currency to regain access to their files. One of the most notable victims of Wanna Cry was the United Kingdom’s National Health Service (NHS). At least 25 NHS hospitals had to reroute patients and cancel appointments while trying to save their medical records from the virus.

Ransomware is a new twist on an old crime. The virus locks down all your computer files so you can’t access them. Then a screen appears telling you that you have a certain number of days to pay the hacker in untraceable currency. Pay and you get all your files back. Refuse and your computer remains locked and your files, documents, photos, and videos are lost forever.

This type of attack particularly devastating for hospitals, where the locked medical records and computer system are critical for patient care and treatment. Nor is Wanna Cry the first ransomware attack to affect hospitals. Here’s a quick list of 12 that happened in 2016,  with many more cases occurring that same year.

Barts Health NHS Trust, which runs four hospitals in London, had its files locked on May 13. The hospital noted the attack had forced it to cancel some appointments, send incoming patients to other hospitals, and slowed down the facilities’ pathology and diagnostic services.

“Barts Health staff are working tirelessly, using tried and tested processes to keep patients safe and well cared for,” the system wrote on Monday. “We are no longer diverting ambulances from any of our hospitals. Trauma and stroke care is also now fully operational. However, we continue to experience IT disruption, and we are very sorry for any delays and cancellations that patients experience. In these circumstances, we would ask the public to use other NHS services wherever possible.”

Microsoft had already created a software patch in mid-March that closed the Wanna Cry vulnerability. However, many facilities didn’t update their security systems.

Entry Information

Filed Under: National News

Tags:

About the Author: Brian Ward is an Associate Editor at HCPro working on accreditation, patient safety, and quality news.

RSSPost a Comment  |  Trackback URL

*