Cyber Attack On US Children's Hospital

In June 2021, hackers working for the Iranian government attempted to break into and damage computer systems at Boston Children’s Hospital. This exploit has now been confirmed by the Federal Bureau of Investigation (FBI) Director Christopher Wray who explained this at the Boston College Cyber Security Conference.

The attempted cyber attack took place in June 2021, the attackers exploited popular software made by California-based firm Fortinet to control the hospital's computer network. The FBI was able to help thwart the hackers before they did damage to the hospital's computer network, said FBI Director Wray.

It remains unclear what was the reason behind the cyber attack on the hospital. Boston Children's Hospital has more than 400-beds and is considered one of the premier pediatric centers in the US. The FBI was able to help stop the hackers before they managed to do any damage, according to Wray,

Wray cited this attempt as an example of the potential high-impact hacking threats that the US faces from the governments of Iran, Russia, China and North Korea.

"We cannot let up on China or Iran or criminal syndicates while we're focused on Russia," Wray said in a speech at Boston College. He said the bureau and Boston Children’s Hospital had worked closely together after a hacktivist attacked the hospital’s computer network in 2014. 

In 2014, a US citizen named Martin Gottesfeld launched a  cyber attack at the hospital to protest the care of a teenager at the center of a high-profile custody battle and later was subsequentoy sentenced to 10 years in prison. The Gottesfeld attack cost the facilities tens of thousands of dollars and disrupted operations for days. “Children’s and our Boston office already knew each other well, before the attack from Iran, and that made a difference,” Wray said.

The FBI and other federal agencies have been working to assure hacking victims that it is in their best interest to report intrusions and cyber crimes. Many companies attacked by ransomware gangs often don’t go to the FBI for a variety of reasons.

One unnamed Fortune 500 company told committee staff that the FBI did not offer any “helpful assistance” when responding to a ransomware attack. “For example, the FBI offered their hostage negotiator who appeared to have little expertise in responding to ransomware attacks,” the report said. 

JPost:      PBS:    CNN:       WSJ:      Reuters:     ABC:      FoxNews:     Times of Israel:

You Might Also Read: 

Ransomware, Iranian Hackers & Pornography:

 

« For Sale: Academic Credentials
US Supreme Court Blocks Texas Law On Social Media ‘Censorship’ »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Abacode

Abacode

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.

Cyberspatial

Cyberspatial

Cyberspatial Teleseer - Discover and map your network in minutes. Next-gen packet analysis and network visualization. All from your web browser.