UK Health Service Should Have Prevented WannaCry Attack

NHS trusts were left vulnerable in a major ransomware attack in May because cyber-security recommendations were not followed, a government report has said.
 
More than a third of trusts in England were disrupted by the WannaCry ransomware, according to the UK National Audit Office (NAO).
 
At least 6,900 NHS appointments were cancelled as a result of the attack. NHS England said no patient data had been compromised or stolen and praised the staff response.The NAO chief said the Department of Health and the NHS must now "get their act together".
 
WannaCry, which spread to more than 150 countries in a worldwide ransomware outbreak beginning on 12 May, was the biggest cyber-attack to have hit the NHS to date. The malware encrypted data on infected computers and demanded a ransom roughly equivalent to £230 ($300). The NAO report said there was no evidence that any NHS organisation paid the ransom, but the financial cost of the incident remained unknown. An assessment of 88 out of 236 trusts by NHS Digital before the attack found that none passed the required cyber-security standards.
 
The report said NHS trusts had not acted on critical alerts from NHS Digital and a warning from the Department of Health and the Cabinet Office in 2014 to patch or migrate away from vulnerable older software. The Department of Health also lacked important information, the report said. "Before 12 May 2017, the department had no formal mechanism for assessing whether NHS organisations had complied with its advice and guidance."
 
Organisations could also have better managed their computers' firewalls - but in many cases they did not, it said.
NHS organisations have not reported any cases of harm to patients or of their data being stolen as a result of WannaCry.
NHS England has identified 6,912 appointments - including operations - that were cancelled as a direct result of the ransomware.
 
It estimated that about 19,000 appointments in total may have been affected. Cases included at least 139 people potentially with cancer, who had urgent referrals cancelled. It is not known: 
  • how many GP appointments were cancelled
  • how many ambulances and individuals were diverted from five accident and emergency departments unable to treat some patients
  • how many trusts or GPs experienced delays in information, such as test results
The NAO credits the widely reported work of cyber-security researcher Marcus Hutchins, who accidentally helped to stop the spread of WannaCry. His "kill switch" involved registering a domain name linked to the malware, which deactivated the program's ability to spread automatically.
 
Home Office Minister Ben Wallace was reported to say that the government was "as sure as possible" that North Korea was behind the attack."This attack, we believe quite strongly that it came from a foreign state," he said. "It is widely believed in the community and across a number of countries that North Korea [took on] this role". Former chairman of NHS Digital, Kingsley Manning, said that a failure to upgrade old computer systems at a local level within the NHS had contributed to the rapid spread of the malware. He said: "The problem with cyber security for the NHS is [that] it has a particular vulnerability... It's very interconnected so if you get an attack in one place it tends to spread." Mr Manning blamed a lack of time and resources but also "frankly a lack of focus, a lack of taking it seriously" for individual NHS organisations' failure to keep up with cyber-security improvements. "This was an extremely unsophisticated attack," he added. 
 
The NAO said the NHS "has accepted that there are lessons to learn" from WannaCry and will now develop a response plan. It will also ensure that critical cyber-security updates - such as applying software patches - are carried out by IT staff, the NAO said.
 
WannaCry was "a relatively unsophisticated attack and could have been prevented by the NHS following basic IT security best practice," said Sir Amyas Morse, comptroller and auditor-general of the NAO. "There are more sophisticated cyber-threats out there than WannaCry so the Department and the NHS need to get their act together to ensure the NHS is better protected against future attacks."
 
Keith McNeil, NHS chief clinical information officer for health and care, said: "As the NAO report makes clear, no harm was caused to patients and there were no incidents of patient data being compromised or stolen. "Tried and tested emergency plans were activated quickly and our hard-working NHS staff went the extra mile to provide patient care, keeping the impact on NHS services and patients to a minimum."
 
For many executives, a serious cyber-attack is now very high on their list of risks to their organisations and a priority for disaster planning.
 
So what is most shocking in this report is the lack of planning at a local level in the NHS for such an event. 
To be fair, the Department of Health had developed a plan - it was just that it had not been properly communicated or tested in the NHS trusts. When disaster struck, nobody seemed to know who was in charge or what to do. Of course, all of this could have been avoided if security patches had been applied to protect the Windows 7 systems common throughout the NHS.
 
Once again, there had been warnings sent out by NHS Digital, but many trusts failed to act upon them - though in that they were no different from many organisations around the world that were also hit. In one way, the NHS was lucky - if, instead of a Friday in May, the attack had taken place on a Monday in winter, with a week's appointments affected, the damage would have been far worse.
 
Cybersecurity experts will tell you that dealing with attacks like these is mostly a management rather than a technology problem. And in this case the NHS proved itself incapable of managing a speedy and effective response to its first major cyber-security crisis.
 
Analysis - by Rory Cellan-Jones, BBC technology correspondent
 
BBC
 
You Might Also Read:
 
British NHS Sure To Be Hit By More Cyber Attacks:
 
A New Form Of Ransomware Attacks UK Hospital:
 
 
« A New IoT Botnet Storm Is Coming
‘Bad Rabbit’ Cyber Attack Hits Russia & Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

Secure Innovations

Secure Innovations

Secure Innovations is a cybersecurity firm dedicated to providing top-tier cyber security solutions for the Defense and the Intelligence Community.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.

Hanwha Systems

Hanwha Systems

Hanwha Systems is a global company based in South Korea providing defense electronics and smart ICT solutions.