The Human Impact Of Ransomware In Healthcare

Whilst the rapid digitalisation of the health sector is bringing new benefits to the availability and scope of medical services, there’s been a cybersecurity trade-off which is putting patient’s health and wellbeing at risk. 

Cyberattacks on the sector have reached epidemic proportions and created widespread disruption to services at a time when health providers are already under pressure to keep up with demand.  

In fact, we found that the healthcare sector suffered more ransomware attacks than any other industry for three consecutive months this year. And behind the headlines of major incidents that bring services at large hospitals to a standstill, there are countless more small clinics, practices and surgeries which must absorb the impact resulting in further backlogs, downtime and delays to the continuity of care that patients rely on. 

Data may be the primary target, but it’s certainly not the only casualty when attackers compromise vital digital systems. Since ruthless criminal gangs are willing to use patients’ privacy, safety and health as leverage for ransom demands, it is vital that the sector protects its greatest points of vulnerability to safeguard patients and staff. 

The Direct Impact On Patient Care & Wellbeing

For any sector dealing with the fall out of a cyberattack, the disruption to services can lead to major, long-lasting consequences which can last for weeks or even months. For the health sector there’s always an added level of jeopardy and severity as they’re dealing with adversaries who are willing to put financial profit before human lives. 
In the UK, the cyberattack on the pathology services provider Synnovis, resulted in the cancellation of over 3,000 NHS appointments, affecting critical services like blood transfusions and diagnostic tests. The BlackCat/ALPHV attack on Change Healthcare in the US in February, is estimated to have had a direct impact on patient care at 74% of hospitals, with many patients struggling to access care. 

It is perhaps inevitable that this operational ripple effect also contributes to significant stress and burnout among healthcare workers who are already operating in a high-pressure environment. 

The Erosion Of Trust In Healthcare Systems

The long-term consequences of ransomware extend far beyond operational disruption as cybercriminals increasingly use double extortion tactics to encrypt data while simultaneously exfiltrating it. Criminal gangs will use the threat of selling or leaking medical records to pile more pressure on their ransom demands; in the case of the Change Healthcare breach it was reported that a $22 million ransom was paid.    

There’s also the risk that sensitive data falling into criminal hands erodes public trust in healthcare systems, leaving patients fearful about the safety of their personal information. 

A new precedent was set in September when the Lehigh Valley Health Network came to a $65 million class-action lawsuit settlement in relation to a ransomware attack last year. It was a particularly malicious case, in which the perpetrators posted the nude medical record photos of patients online, with more than 135,000 patients affected in total.

The theft of any sensitive clinical data is huge breach of privacy and can cause further emotional distress to patients. When highly private medical records are in the hands of criminal gangs they can be used as a bargaining chip to target the individual directly for ransom demands, or to be exploited further for identity fraud and theft.   
It’s not only the patients that suffer once data is in the wrong hands. Healthcare staff are just as susceptible to bear the brunt of data breaches and there are numerous cases of financial information belonging to hospital personnel being stolen and leaked alongside patient data in large scale cyberattacks. 

Addressing The Causes Of Healthcare Cyberthreats 

There are several factors that make the healthcare sector more vulnerable to cyberattacks. An ageing IT infrastructure is one the biggest issues, as squeezed budgets and decades of under investment mean that many providers are relying on outdated systems. Legacy assets are more difficult to manage and leave gaps in security processes, but many organisations struggle to find the resources, or money they need to modernise.
For those unable to replace or revamp old systems, the priority should be on limiting attackers’ ability to access and move through the network. Adopting identity-based security measures such as multi-factor authentication (MFA), least privilege access, and Zero Trust frameworks are key here, ensuring only authorised users can access sensitive data. 

Mitigating The Impact

In addition to attempting to limit the root causes of breaches, healthcare organisations need to identify signs of attack and reduce the impact of breaches. 

Endpoint detection and response (EDR) tools play an important role by identifying suspicious activity early and alerting security teams. Additionally, continuous monitoring of third-party vendors is vital, as many attacks exploit weaknesses in external connections.

Next-generation firewalls further enhance security by enforcing identity-based policies, ensuring sensitive data is protected from unauthorised access.

Further, anti data exfiltration (ADX) solutions are important in safeguarding sensitive patient records, providing a critical layer of protection that stops exfiltration and lateral movement within the network, stopping both the activation and spread of ransomware.

Collective Efforts For Greater Security

These organisational-wide measure are vital, but there’s a growing acknowledgment from policy makers and legislators that combatting the growth of ransomware needs a collaborative approach. Healthcare organisations must recognise that they aren’t facing this threat alone and should actively seek to work alongside groups including regulators, law enforcement, and technology partners. 

A coordinated approach can help the sector to stay ahead of cybercriminals by ensuring that health providers have access to the latest threat intelligence and advice on enhancing security strategies. 

This is more important than ever, as there’s a very human impact at the heart of cyberattacks in this sector. Behind every story of private health records that have been stolen, medical images that are leaked, or appointments that are missed, is an individual patient whose right to privacy, wellbeing and care has been compromised. 

It’s a right that leaders and policy makers in the industry need to work hard to defend even as cybercriminals continue to launch ever more damaging attacks. 

Dr. Darren Williams is CEO and Founder of BlackFog    

Image: Alexander Grey

You Might Also Read: 

AI Has The Power To Transform Healthcare Cyber Security:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cyber Security: The Fastest Growing IT Work In The UK
Strengthen Software Supply Chain & Governance For Better AI System Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.