London Hospitals Held To Ransom

A recent major cyber attack on NHS hospitals caused a number of procedures to be cancelled or changed, with blood transfusions said to be particularly affected, according to health trusts.

Now, a ransom demands of $50million have been made by Qilin cyber gang following the attack impacting London NHS services over two weeks ago, which consequently has held up patient appointments, blood transfusions and operations.

Affected hospitals were forced to launch an appeal for O blood-type donors to book appointments across the country following the ransomware attack affecting several major London hospitals.

Cyber security expert Deryck Mitchelson, former-CISO at NHS Scotland and head of global CISO at Check Point Software has commented "The Qilin ransomware incident has had a huge knock-on effect on the daily running of NHS hospitals in the South-East of England. These attacks always feel quite personal and continue to raise questions about why public services are repeatedly made the target of criminal gangs... While details about the data being held are still unclear, the group's demands for $50 million suggests that it is serious. The size of ransom is based on the scale of disruption and acts as the carrot being dangled to quickly restore services. Although paying it might seem like the easier way out, there are hidden costs to settling...

"Simply put, there is no guarantee the data will be restored or trustworthy, and it might still end up being exposed after payment." 

According to Mitchelson, organisations who choose to pay ransoms won’t be protected from future attacks nor will it prevent the reputational costs they might be left with. "So, it is essential that the organisation is clear on the type of data that has been stolen so that they know the scale of the breach and can plan the right route to recovery."

The recent cyber attack has meant that the affected hospitals cannot currently match patients' blood in the way that they usually do. O-negative is the type that can be given to anyone, known as the universal blood type. It is used in emergencies or when a patient’s blood type is unknown. Air ambulances and emergency response vehicles carry O-negative supplies. Several of the  London based hospitals affected have cancelled operations and tests, and were unable to carry out blood transfusions recently after the attack on the pathology firm Synnovis, which Qilin, a Russian group of cyber criminals, is believed to have been responsible for.

Emails to the NHS staff at King's College Hospital, Guy's and St Thomas’s and primary care services in London has said a critical incident had been declared.

For surgeries and procedures requiring blood to take place, hospitals need to use O- type blood as this is safe to use for all patients and blood has a shelf life of 35 days, so stocks need to be continually replenished, the NHS said. 

Eight per cent of the population have type O-negative but it comprises about 15% of hospital orders. O-positive is the most common blood type, 35% of donors have it, and it can be given to anybody with any positive blood type. This means three in every four people, or 76% of the population, can benefit from an O-positive donation.

Andrew Hollister, CISO at LogRhythm, commented " The urgent call for O-type blood donations following the ransomware attack on Synnovis is proof of the dangerous and disruptive real-life consequences caused by cyberattacks.  The ongoing repercussions from this attack are a critical reminder that cyberthreats are not victimless crimes... "

"Healthcare organizations need to treat this attack as an urgent reminder to prioritize the cybersecurity of not only their own systems but also of any third-party providers they are using."
  
"Keeping ahead of sophisticated risks requires organizations to do the basics well including patching, backups, and implementing two factor authentication everywhere possible... One hundred percent security is not possible, but organizations should seek to reduce the risk as much as possible considering the consequences of a successful compromise...

"Failure to take action risks the well-being of individuals that rely on essential services and no industry is safe." Hollister said.

Blood.UK   |   BBC   |   Guardian   |   Sky   |   Standard   |    Londra Gazete

Image: Anna Shvetsa

You Might Also Read: 

Spanish Healthcare Service Works On Resilience:

DIRECTORY OF SUPPLIERS - Ransomware Protection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Major AI Threats Cyber Security Teams Must Deal With
Business Email Compromise Warning Signs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

PeoplActive

PeoplActive

PeoplActive is an IT consulting and recruitment services organization with leading capabilities in digital, cloud and security.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

Technology Mindz

Technology Mindz

Technology Mindz is a leading provider of cybersecurity services. We offer a wide range of services to help businesses. Our services are Identity and access management, Governance risk and compliance.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.