UPDATE: Ransom Attack On Irish Health Service Continues

Ireland's health service operator (HSE) has shut down all its IT systems to protect them from a significant ransomware attack.  This took-down the diagnostic services and disrupted their COVID-19 testing.

It has also meant that a lot of hospitals had to cancel medical appointments. Cyber security experts warned that it could be weeks before the systems return to normal.

The HSE has said that Covid-19 test results and contact tracing services have been successfully restored to normal. 

An international cyber crime gang is believed to be  behind the attack and Ireland's minister responsible for e-government Ossian Smyth describes it as possibly the most significant cyber crime attempt against the Irish state. Speaking on broadcaster RTÉ, Ossian Smyth said the attack "goes right to the core of the health system".

Irish Prime Minister (Taoiseach) Micheál Martin said that he had consulted with cyber security experts and that the state would not be paying a ransom. 

He said it would "take some days" to assess its impact. "What's important is people cooperate with the HSE," Martin said,  adding that emergency services remain open, and the vaccine programme continues uninterrupted. Earlier, a HSE spokesman confirmed a ransom had been demanded and said it would not be paid in line with state policy.  

Health service IT systems could take days to return to normal after being shutdown following what a Government Minister described as “possibly the most significant cyber crime attack on the Irish State” ever. 

Meanwhile, chief medical officer Dr Tony Holohan said the ransomware attack on the HSE will impede the ability of the health service to organise effective testing and to measure the total number of cases.

HSE Live:    Irish Times:        Reuters:     BBC:      Digital Heath Net:     Irish Examiner

You Might Also Read:

Responding To Ransomware Attacks:

 

« British Law To Protect Online Users
Russian Spy Chief Says SolarWinds Was An Inside Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

SecLytics

SecLytics

SecLytics is the leader in Predictive Threat Intelligence. Our SaaS-based Augur platform leverages behavioral profiling and machine learning to hunt down cyber criminals.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.

Data Computer Services

Data Computer Services

Data Computer Services provides professional tailored IT Support and IT Services for businesses throughout Edinburgh and the Lothians.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.