{"id":39922,"date":"2021-05-14T09:13:25","date_gmt":"2021-05-14T13:13:25","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=39922"},"modified":"2022-05-05T04:37:49","modified_gmt":"2022-05-05T08:37:49","slug":"irish-health-service-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/irish-health-service-ransomware\/39922\/","title":{"rendered":"Irish health service hit by ransomware"},"content":{"rendered":"<p><strong>Updated on May 17, 2021.<\/strong><\/p>\n<p><a href=\"https:\/\/www.reuters.com\/technology\/irish-health-service-hit-by-ransomware-attack-vaccine-rollout-unaffected-2021-05-14\/\" target=\"_blank\" rel=\"nofollow noopener\">Media outlets are reporting<\/a> an attack by ransomware on the Health Service Executive (HSE), Ireland\u2019s healthcare system. The HSE decided to shut down key information systems for thorough investigation and protection against further threat spread. A number of clinics have reported temporary shutdowns or at least disruptions in their operations, although they continue to provide emergency care services. The COVID-19 vaccination program was not interrupted, although some institutions have had to revert to outdated workflow systems.<\/p>\n<h2>The Irish healthcare system attack in brief<\/h2>\n<p>According to HSE representatives, a \u201cvery sophisticated,\u201d human-operated ransomware attack caused \u201csignificant disruption\u201d to their services. Such incidents are particularly difficult to counter because the cybercriminals adjust their tactics and specific targets during the attack.<\/p>\n<p>External experts and law enforcement cyberspecialists are contributing to the investigation, which is still in early stages. However, HSE representatives presume the main target was data stored on the organization\u2019s servers.<\/p>\n<p>Representatives of Rotunda Hospital, a medical institution affected by the attack, <a href=\"https:\/\/www.bbc.com\/news\/world-europe-57111615\" target=\"_blank\" rel=\"nofollow noopener\">say<\/a> the unified HSE patient registering system may have been a spreading vector. Fortunately, the attack did not affect life-saving equipment; only healthcare records are unavailable.<\/p>\n<h2>Who is behind the attack, and what do they want?<\/h2>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ireland-s-health-services-hit-with-20-million-ransomware-demand\/\" target=\"_blank\" rel=\"nofollow noopener\">According to <em>Bleeping Computer<\/em><\/a>, the operators of <a href=\"https:\/\/www.kaspersky.com\/blog\/top5-ransomware-groups\/39426\/\" target=\"_blank\" rel=\"noopener nofollow\">Conti ransomware<\/a> contacted HSE representatives and demanded almost $20 million in ransom. The crooks claimed that they had been present in HSE\u2019s network for more than two weeks before encrypting any data, that they\u2019d downloaded approximately 700GB of unencrypted files \u2014 including personal data, contracts, and financial documents \u2014 and that they\u2019d publish the information if their terms weren\u2019t met.<\/p>\n<div id=\"attachment_39995\" style=\"width: 825px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/05\/17072900\/irish-health-service-ransomware-conti.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-39995\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/05\/17072900\/irish-health-service-ransomware-conti.jpg\" alt=\"Conti ransom demand. \" width=\"815\" height=\"184\" class=\"size-full wp-image-39995\"><\/a><p id=\"caption-attachment-39995\" class=\"wp-caption-text\">Conti ransom demand. Source: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ireland-s-health-services-hit-with-20-million-ransomware-demand\/\" target=\"_blank\" rel=\"nofollow noopener\">Bleeping Computer. <\/a><\/p><\/div>\n<p><a href=\"https:\/\/twitter.com\/rtenews\/status\/1393269632904138757\" target=\"_blank\" rel=\"nofollow noopener\">Ireland\u2019s prime minister<\/a> refused to pay that ransom, a decision <a href=\"https:\/\/www.kaspersky.com\/blog\/to-pay-or-not-to-pay\/38946\/\" target=\"_blank\" rel=\"noopener nofollow\">we fully support<\/a>.<\/p>\n<h2>How to protect healthcare from ransomware<\/h2>\n<p>Ransomware threats to healthcare institutions around the world are <a>on the rise<\/a>. To minimize infection risk, we recommend prioritizing the protection of remote access tools and e-mail systems, the <a href=\"https:\/\/www.kaspersky.ru\/blog\/top5-ransomware-groups\/30549\/\" target=\"_blank\" rel=\"noopener\">two most common entry points for ransomware<\/a>. In addition, security awareness is more than just important.<\/p>\n<p>In particular, we recommend:<\/p>\n<ul>\n<li><a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Raising employee awareness<\/a> about modern cyberthreats and the role all staff play in cybersecurity;<\/li>\n<li>Avoiding remote connections to internal networks to the extent possible;<\/li>\n<li>Maintaining a strict password policy requiring all passwords be unique, complex, and secure;<\/li>\n<li>Installing security patches and updates promptly;<\/li>\n<li>Using <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">robust security solutions<\/a> on all devices with access to the Internet, including <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/embedded-systems?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">medical equipment and information kiosks and panels<\/a>;<\/li>\n<li>Protecting <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">corporate mail servers<\/a>, through which a fair number of threats enter company infrastructure.<\/li>\n<\/ul>\n<p>Additionally, <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-management-defense-solution?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____tmd___\" target=\"_blank\" rel=\"noopener nofollow\">Endpoint Detection and Response<\/a>\u2013class solutions can help detect ransomware threats in their early stages, simplifying response actions and investigation.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>A ransomware attack forced Ireland\u2019s healthcare service to shut down its servers. Here\u2019s what we know so far.<\/p>\n","protected":false},"author":2706,"featured_media":39926,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,2683],"tags":[2071,3106,2188,420],"class_list":{"0":"post-39922","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-threats","10":"tag-cyberattacks","11":"tag-extortion","12":"tag-healthcare","13":"tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/irish-health-service-ransomware\/39922\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/irish-health-service-ransomware\/22856\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/irish-health-service-ransomware\/18339\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/irish-health-service-ransomware\/24774\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/irish-health-service-ransomware\/22768\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/irish-health-service-ransomware\/25295\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/irish-health-service-ransomware\/24680\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/irish-health-service-ransomware\/30760\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/irish-health-service-ransomware\/16940\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/irish-health-service-ransomware\/17505\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/irish-health-service-ransomware\/14833\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/irish-health-service-ransomware\/26766\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/irish-health-service-ransomware\/30697\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/irish-health-service-ransomware\/27057\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/irish-health-service-ransomware\/23927\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/irish-health-service-ransomware\/29233\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/irish-health-service-ransomware\/29030\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/39922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=39922"}],"version-history":[{"count":8,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/39922\/revisions"}],"predecessor-version":[{"id":40008,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/39922\/revisions\/40008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/39926"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=39922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=39922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=39922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}