The Human Impact Of Ransomware In Healthcare

Whilst the rapid digitalisation of the health sector is bringing new benefits to the availability and scope of medical services, there’s been a cybersecurity trade-off which is putting patient’s health and wellbeing at risk. 

Cyberattacks on the sector have reached epidemic proportions and created widespread disruption to services at a time when health providers are already under pressure to keep up with demand.  

In fact, we found that the healthcare sector suffered more ransomware attacks than any other industry for three consecutive months this year. And behind the headlines of major incidents that bring services at large hospitals to a standstill, there are countless more small clinics, practices and surgeries which must absorb the impact resulting in further backlogs, downtime and delays to the continuity of care that patients rely on. 

Data may be the primary target, but it’s certainly not the only casualty when attackers compromise vital digital systems. Since ruthless criminal gangs are willing to use patients’ privacy, safety and health as leverage for ransom demands, it is vital that the sector protects its greatest points of vulnerability to safeguard patients and staff. 

The Direct Impact On Patient Care & Wellbeing

For any sector dealing with the fall out of a cyberattack, the disruption to services can lead to major, long-lasting consequences which can last for weeks or even months. For the health sector there’s always an added level of jeopardy and severity as they’re dealing with adversaries who are willing to put financial profit before human lives. 
In the UK, the cyberattack on the pathology services provider Synnovis, resulted in the cancellation of over 3,000 NHS appointments, affecting critical services like blood transfusions and diagnostic tests. The BlackCat/ALPHV attack on Change Healthcare in the US in February, is estimated to have had a direct impact on patient care at 74% of hospitals, with many patients struggling to access care. 

It is perhaps inevitable that this operational ripple effect also contributes to significant stress and burnout among healthcare workers who are already operating in a high-pressure environment. 

The Erosion Of Trust In Healthcare Systems

The long-term consequences of ransomware extend far beyond operational disruption as cybercriminals increasingly use double extortion tactics to encrypt data while simultaneously exfiltrating it. Criminal gangs will use the threat of selling or leaking medical records to pile more pressure on their ransom demands; in the case of the Change Healthcare breach it was reported that a $22 million ransom was paid.    

There’s also the risk that sensitive data falling into criminal hands erodes public trust in healthcare systems, leaving patients fearful about the safety of their personal information. 

A new precedent was set in September when the Lehigh Valley Health Network came to a $65 million class-action lawsuit settlement in relation to a ransomware attack last year. It was a particularly malicious case, in which the perpetrators posted the nude medical record photos of patients online, with more than 135,000 patients affected in total.

The theft of any sensitive clinical data is huge breach of privacy and can cause further emotional distress to patients. When highly private medical records are in the hands of criminal gangs they can be used as a bargaining chip to target the individual directly for ransom demands, or to be exploited further for identity fraud and theft.   
It’s not only the patients that suffer once data is in the wrong hands. Healthcare staff are just as susceptible to bear the brunt of data breaches and there are numerous cases of financial information belonging to hospital personnel being stolen and leaked alongside patient data in large scale cyberattacks. 

Addressing The Causes Of Healthcare Cyberthreats 

There are several factors that make the healthcare sector more vulnerable to cyberattacks. An ageing IT infrastructure is one the biggest issues, as squeezed budgets and decades of under investment mean that many providers are relying on outdated systems. Legacy assets are more difficult to manage and leave gaps in security processes, but many organisations struggle to find the resources, or money they need to modernise.
For those unable to replace or revamp old systems, the priority should be on limiting attackers’ ability to access and move through the network. Adopting identity-based security measures such as multi-factor authentication (MFA), least privilege access, and Zero Trust frameworks are key here, ensuring only authorised users can access sensitive data. 

Mitigating The Impact

In addition to attempting to limit the root causes of breaches, healthcare organisations need to identify signs of attack and reduce the impact of breaches. 

Endpoint detection and response (EDR) tools play an important role by identifying suspicious activity early and alerting security teams. Additionally, continuous monitoring of third-party vendors is vital, as many attacks exploit weaknesses in external connections.

Next-generation firewalls further enhance security by enforcing identity-based policies, ensuring sensitive data is protected from unauthorised access.

Further, anti data exfiltration (ADX) solutions are important in safeguarding sensitive patient records, providing a critical layer of protection that stops exfiltration and lateral movement within the network, stopping both the activation and spread of ransomware.

Collective Efforts For Greater Security

These organisational-wide measure are vital, but there’s a growing acknowledgment from policy makers and legislators that combatting the growth of ransomware needs a collaborative approach. Healthcare organisations must recognise that they aren’t facing this threat alone and should actively seek to work alongside groups including regulators, law enforcement, and technology partners. 

A coordinated approach can help the sector to stay ahead of cybercriminals by ensuring that health providers have access to the latest threat intelligence and advice on enhancing security strategies. 

This is more important than ever, as there’s a very human impact at the heart of cyberattacks in this sector. Behind every story of private health records that have been stolen, medical images that are leaked, or appointments that are missed, is an individual patient whose right to privacy, wellbeing and care has been compromised. 

It’s a right that leaders and policy makers in the industry need to work hard to defend even as cybercriminals continue to launch ever more damaging attacks. 

Dr. Darren Williams is CEO and Founder of BlackFog    

Image: Alexander Grey

You Might Also Read: 

AI Has The Power To Transform Healthcare Cyber Security:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cyber Security: The Fastest Growing IT Work In The UK
Strengthen Software Supply Chain & Governance For Better AI System Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service - basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Technology Mindz

Technology Mindz

Technology Mindz is a leading provider of cybersecurity services. We offer a wide range of services to help businesses. Our services are Identity and access management, Governance risk and compliance.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.