• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Uncategorized  /  5 Major ransomware attacks in the healthcare industry
05 July 2017

5 Major ransomware attacks in the healthcare industry

Written by Seqrite
Seqrite
Uncategorized
Estimated reading time: 3 minutes

Ransomware attacks affect every industry; however, the healthcare industry is highly vulnerable to them simply because of the severity of risk involved. A ransomware attack may impact either the critical services or the administrative services of a hospital or both. Thus, it is not just the financial, billing or medical history of the person that is in danger, but his very life might be at high risk. Imagine, the computer screen connected to an endoscope, freezes in the middle of a surgery; that can be life threatening! And multiply it with the number of surgeries being done at the same time at a hospital; the impact can be catastrophic.

The cost of cyber-attacks in the healthcare industry

While loss of life is the worst loss for a hospital, there are also other costs that a healthcare provider has to bear in case of such attacks. The top areas of concern for this industry are,

Cost due to System Downtime

An attack on administrative systems like work orders, medical inventories, billing, appointments, prescriptions etc., lead to disruption of normal services, delays and requires additional manpower to bring the system back to the normal state.

Reduced Customer Satisfaction

When the systems are down, the patients are waiting. This has a cascading effect. Even after the systems are recovered, there is a lag to reduce the  long queue of waiting patients. This leads to a dip in customer service.

Bad Publicity

Reduced customer satisfaction and the fact that hospital systems were compromised does not instill confidence in the community they serve.

Loss of Revenue

With bad publicity and risk of loss of their personal information, fewer patients would choose to come to the affected hospital leading to loss of revenue.

The Cost of Ransom

Sometimes the hospitals pay the ransom to get access to their systems quickly. This is never a good idea.

Major Ransomware attacks in the Healthcare Industry

Here are some true incidents and effects of ransomware attacks on healthcare providers.

1.Hollywood Presbyterian Medical Center

This Los Angeles hospital was attacked in 2016 and suffered downtime for 10 days. It lost access to its patient’s electronic medical records during that period. The ransom demanded was a whooping 17,000 USD, instead of the usual 300-500 USD. The hospital actually paid this amount in Bitcoins.

2. Medstar Health

This is one of the largest healthcare system attacks with 10 hospitals and 250 outpatient centres getting affected. The attack was almost simultaneous at all centres and they lost almost complete access to their systems. Although, all the affected sites had a disaster recovery plan, the scale and spread of the attack took the hospital by surprise and they took a lot of time to recover from it. This attack shows that businesses with multiple locations can be affected at the same time and an integrated disaster recovery plan needs to be created for such a scenario. This holds true for every business.

3. Kansas Heart Hospital

This hospital was attacked in May 2016. Thinking that they would get back the access to their systems, they paid the ransom. However, they only got partial access and yet another demand for more money. Sensibly, the second time, they denied. This incident proved that even after paying the ransom, one cannot be sure to get the access back. If anything, paying ransom makes the attackers bold. Besides, who knows what illicit activity is being funded by the ransom that is paid by the victims.

4. Methodist Hospital

This hospital was attacked in March 2016. The attackers demanded 1600 USD. The main effect of the attack was that everything had to be processed by pen and paper. This, in short, doubled the time taken by physicians for their administrative tasks. This incident highlights the need of having a sound recovery plan to ensure minimum downtime so that people can get productive as soon as possible.

5. Christopher Rural Health

This one is an excellent example of how to deal with ransomware attacks. This network of health centres was hit by a ransomware attack in May 2015. But instead of paying the ransom, they used their system backups to restore their systems. This incident shows the real value of a good backup strategy and how it can help in case of a cyber attack.

For a critical service provider, it may be tempting for the business to pay the ransom and get access back to their systems. However, it has been proved many times that paying ransom is not a guarantee of restoring system access. In fact, there is a high probability that attackers will ask for more money and that money will be used for illegal purposes. The best defense against ransomware attacks is to have a sound backup strategy and implement a comprehensive Security Solution.

Seqrite helps businesses simplify IT security and maximize business performance. To know more about our products and services visit our website. 

Photo by Piron Guillaume 

 Previous PostRise of Ransomware: How Seqrite can help your business stay prote...
Next Post  Impact of data breach on startups
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Gorgon APT fractures India’s Industrial Backbone

    Gorgon APT targeting MSME sector in India

    August 10, 2020
  • Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

    May 21, 2020
  • The-need-for-businesses-to-empower-the-CISO

    Why do boards need to empower their CISO?

    October 22, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can EdTech companies deal with rising security challenges?

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (274) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (54) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.