New Zealand Health Service Under Attack

New Zealand has been hit by a cyber security incident which has affected five hospitals. Hackers claiming to be behind a cyber attack that led to surgeries being postponed at Waikato public hospitals this week have made contact with health officials. The Waikato District Health Board (DHB) said that investigators are still determining whether patient records had been lost or other privacy breaches had happened. 

The DHB do not know who was behind the apparent ransomware attack or if it was connected in any way to the attack on the Irish Health Service (HSE) although local sources appeared to indicate it was a ransomware attack.

The DHB  has now said that it is addressing “a cyber security incident” and was “experiencing a full outage” of its information systems. The district board said the incident has affected five hospitals, the Waikato, Thames, Tokoroa, Te Kuiti and Taumarunui, all “to varying degrees”. 

An update, said “good progress” had been made overnight to get systems back online.“We are currently working with other government departments to investigate the cause, but are working on the theory that the initial incursion was via an email attachment. A forensic investigation is ongoing.” The statement also revealed that as a result of the disruption on 18 May six elective surgeries were cancelled, while 95 went ahead.

The incident follows a large scale cyber attack on Ireland’s health IT system on 14 May. Services have been switched off following reports of a possible “human-operated ‘Conti’ ransomware attack that had severely disabled a number of systems”.

It also came as high-profile cyber attacks had increasingly made headlines around the world, including the recent Irish attack and another that shut down an important United States' fuel pipeline. It is not yet clear if the ransomware was successfully deployed or how much private, patient data has been affected.

NZHerald:         Digital Health:          WaikatoDHB:           ITPro:          Irish Independent

You Might Also Read:

Cyber Breaches Will Kill:

 

« Dutch Cyber Security Under Threat
Will Governments Ban Ransom Payments To Hackers? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

Datec PNG

Datec PNG

Datec is the the largest end-to-end information and communications technology solutions and services provider in Papua New Guinea.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.

Clear Ridge Defense

Clear Ridge Defense

Clear Ridge was founded in April 2015 with the mission and vision to support Joint, Service Cyber Components, and commercial clients in specialized cyber support.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Meta 1st

Meta 1st

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer.