Cyber Attack On US Children's Hospital

In June 2021, hackers working for the Iranian government attempted to break into and damage computer systems at Boston Children’s Hospital. This exploit has now been confirmed by the Federal Bureau of Investigation (FBI) Director Christopher Wray who explained this at the Boston College Cyber Security Conference.

The attempted cyber attack took place in June 2021, the attackers exploited popular software made by California-based firm Fortinet to control the hospital's computer network. The FBI was able to help thwart the hackers before they did damage to the hospital's computer network, said FBI Director Wray.

It remains unclear what was the reason behind the cyber attack on the hospital. Boston Children's Hospital has more than 400-beds and is considered one of the premier pediatric centers in the US. The FBI was able to help stop the hackers before they managed to do any damage, according to Wray,

Wray cited this attempt as an example of the potential high-impact hacking threats that the US faces from the governments of Iran, Russia, China and North Korea.

"We cannot let up on China or Iran or criminal syndicates while we're focused on Russia," Wray said in a speech at Boston College. He said the bureau and Boston Children’s Hospital had worked closely together after a hacktivist attacked the hospital’s computer network in 2014. 

In 2014, a US citizen named Martin Gottesfeld launched a  cyber attack at the hospital to protest the care of a teenager at the center of a high-profile custody battle and later was subsequentoy sentenced to 10 years in prison. The Gottesfeld attack cost the facilities tens of thousands of dollars and disrupted operations for days. “Children’s and our Boston office already knew each other well, before the attack from Iran, and that made a difference,” Wray said.

The FBI and other federal agencies have been working to assure hacking victims that it is in their best interest to report intrusions and cyber crimes. Many companies attacked by ransomware gangs often don’t go to the FBI for a variety of reasons.

One unnamed Fortune 500 company told committee staff that the FBI did not offer any “helpful assistance” when responding to a ransomware attack. “For example, the FBI offered their hostage negotiator who appeared to have little expertise in responding to ransomware attacks,” the report said. 

JPost:      PBS:    CNN:       WSJ:      Reuters:     ABC:      FoxNews:     Times of Israel:

You Might Also Read: 

Ransomware, Iranian Hackers & Pornography:

 

« For Sale: Academic Credentials
US Supreme Court Blocks Texas Law On Social Media ‘Censorship’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

A76

A76

A76 offers a range of highly specialized services to protect your business.

White Knight Labs

White Knight Labs

White Knight Labs is a cyber security consultancy that specializes in cybersecurity training.