{"id":13887,"date":"2016-03-31T06:13:47","date_gmt":"2016-03-31T11:13:47","guid":{"rendered":"http:\/\/hcstx.org\/?p=13887"},"modified":"2016-03-31T06:13:47","modified_gmt":"2016-03-31T11:13:47","slug":"cyber-crime-why-hospitals-are-the-perfect-targets-for-ransomware","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/03\/31\/cyber-crime-why-hospitals-are-the-perfect-targets-for-ransomware\/","title":{"rendered":"Cyber-Crime: Why Hospitals Are The Perfect Targets For Ransomware"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-13888\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/03\/hospitals-ransomware-186264888-1024x768.jpg?w=620\" alt=\"hospitals-ransomware-186264888-1024x768\" width=\"620\" height=\"465\" \/><\/p>\n<p><span class=\"lede\">RANSOMWARE HAS BEEN <\/span>an Internet scourge for more than a decade, but only recently has it made mainstream media headlines. That\u2019s primarily due to a new trend in ransomware attacks: the targeting of hospitals and other healthcare facilities.<\/p>\n<p>The <a href=\"http:\/\/www.wired.com\/2015\/09\/hacker-lexicon-guide-ransomware-scary-hack-thats-rise\/\">malware works by locking your computer<\/a> to prevent you from accessing data until you pay a ransom, usually demanded in Bitcoin. Hospitals are the perfect mark for this kind of extortion because they provide critical care and rely on up-to-date information from patient records. Without quick access to drug histories, surgery directives and other information, patient care can get delayed or halted, which makes hospitals more likely to pay a ransom rather than risk delays that could result in death and lawsuits.<\/p>\n<p>\u201cIf you have patients, you are going to panic way quicker than if you are selling sheet metal,\u201d says Stu Sjouwerman, CEO of the security firm <a href=\"https:\/\/www.knowbe4.com\/\">KnowBe4<\/a>. Hospitals are a good target for another reason as well: they \u201chave not trained their employees on security awareness \u2026 and hospitals don\u2019t focus on cybersecurity in general,\u201d he says. Instead, their primary concern is HIPAA compliance, ensuring that employees meet the federal requirements for protecting patient privacy.<\/p>\n<p>Last month, attackers <a href=\"http:\/\/www.wired.com\/2016\/02\/hack-brief-hackers-are-holding-an-la-hospitals-computers-hostage\/\">took computers belonging to the Hollywood Presbyterian Medical Center<\/a> in Los Angeles hostage using a piece of ransomware called Locky. Computers were offline for more than a week until officials caved to the extortionists\u2019 and paid the equivalent of $17,000 in Bitcoin.<\/p>\n<p>Earlier this month, Methodist Hospital in Henderson, Kentucky was struck by Locky as well, an attack that prevented healthcare providers from accessing patient files. The facility declared a \u201cstate of emergency\u201d on a Friday but by Monday was reporting that its systems were <a href=\"http:\/\/www.14news.com\/story\/31527745\/methodist-hospital-system-up-and-running-after-cyber-attack\">\u201cup and running.\u201d<\/a> Methodist officials, however, said they did not pay the ransomware; administrators in that case had simply restored the hospital\u2019s data from backups.<\/p>\n<p>Then this week, news broke that MedStar Health, which operates 10 hospitals and more than 250 out-patient clinics in the Maryland\/Washington, DC area, was hit by a virus that may be ransomware. MedStar wrote in a Facebook post that its network \u201cwas affected by a virus that prevents certain users from logging-in to our system,\u201d but a number of employees told the <em>Washington Post<\/em> that they <a href=\"https:\/\/www.washingtonpost.com\/local\/medstar-health-turns-away-patients-one-day-after-cyberattack-on-its-computers\/2016\/03\/29\/252626ae-f5bc-11e5-a3ce-f06b5ba21f33_story.html\">saw a pop-up screen appear on their computers demanding payment in Bitcoin<\/a>. The organization responded immediately by shutting down large portions of its network. Employees were unable to access email or a database of patient records, though clinics and other facilities remained open and operating. MedStar did not respond to a call from WIRED.<\/p>\n<h3><\/h3>\n<div class=\"rad mid-banner-wrap relative bg-gray-1 flex-box align-m justify-c marg-t-50 marg-b-50\">Read the Remainder at <strong><a href=\"http:\/\/www.wired.com\/2016\/03\/ransomware-why-hospitals-are-the-perfect-targets\/?mbid=nl_33016\">WIRED\u00a0<\/a><\/strong><\/div>\n","protected":false},"excerpt":{"rendered":"<p>RANSOMWARE HAS BEEN an Internet scourge for more than a decade, but only recently has it made mainstream media headlines. That\u2019s primarily due to a new trend in ransomware attacks: the targeting of hospitals and other healthcare facilities. The malware works by locking your computer to prevent you from accessing data until you pay a&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2122,13,74,1317,4912,4126,3986,65],"tags":[10766,10767,58,5929,10768,10769,1805],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13887"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=13887"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13887\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=13887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=13887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=13887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}