London Hospitals Held To Ransom

A recent major cyber attack on NHS hospitals caused a number of procedures to be cancelled or changed, with blood transfusions said to be particularly affected, according to health trusts.

Now, a ransom demands of $50million have been made by Qilin cyber gang following the attack impacting London NHS services over two weeks ago, which consequently has held up patient appointments, blood transfusions and operations.

Affected hospitals were forced to launch an appeal for O blood-type donors to book appointments across the country following the ransomware attack affecting several major London hospitals.

Cyber security expert Deryck Mitchelson, former-CISO at NHS Scotland and head of global CISO at Check Point Software has commented "The Qilin ransomware incident has had a huge knock-on effect on the daily running of NHS hospitals in the South-East of England. These attacks always feel quite personal and continue to raise questions about why public services are repeatedly made the target of criminal gangs... While details about the data being held are still unclear, the group's demands for $50 million suggests that it is serious. The size of ransom is based on the scale of disruption and acts as the carrot being dangled to quickly restore services. Although paying it might seem like the easier way out, there are hidden costs to settling...

"Simply put, there is no guarantee the data will be restored or trustworthy, and it might still end up being exposed after payment." 

According to Mitchelson, organisations who choose to pay ransoms won’t be protected from future attacks nor will it prevent the reputational costs they might be left with. "So, it is essential that the organisation is clear on the type of data that has been stolen so that they know the scale of the breach and can plan the right route to recovery."

The recent cyber attack has meant that the affected hospitals cannot currently match patients' blood in the way that they usually do. O-negative is the type that can be given to anyone, known as the universal blood type. It is used in emergencies or when a patient’s blood type is unknown. Air ambulances and emergency response vehicles carry O-negative supplies. Several of the  London based hospitals affected have cancelled operations and tests, and were unable to carry out blood transfusions recently after the attack on the pathology firm Synnovis, which Qilin, a Russian group of cyber criminals, is believed to have been responsible for.

Emails to the NHS staff at King's College Hospital, Guy's and St Thomas’s and primary care services in London has said a critical incident had been declared.

For surgeries and procedures requiring blood to take place, hospitals need to use O- type blood as this is safe to use for all patients and blood has a shelf life of 35 days, so stocks need to be continually replenished, the NHS said. 

Eight per cent of the population have type O-negative but it comprises about 15% of hospital orders. O-positive is the most common blood type, 35% of donors have it, and it can be given to anybody with any positive blood type. This means three in every four people, or 76% of the population, can benefit from an O-positive donation.

Andrew Hollister, CISO at LogRhythm, commented " The urgent call for O-type blood donations following the ransomware attack on Synnovis is proof of the dangerous and disruptive real-life consequences caused by cyberattacks.  The ongoing repercussions from this attack are a critical reminder that cyberthreats are not victimless crimes... "

"Healthcare organizations need to treat this attack as an urgent reminder to prioritize the cybersecurity of not only their own systems but also of any third-party providers they are using."
  
"Keeping ahead of sophisticated risks requires organizations to do the basics well including patching, backups, and implementing two factor authentication everywhere possible... One hundred percent security is not possible, but organizations should seek to reduce the risk as much as possible considering the consequences of a successful compromise...

"Failure to take action risks the well-being of individuals that rely on essential services and no industry is safe." Hollister said.

Blood.UK   |   BBC   |   Guardian   |   Sky   |   Standard   |    Londra Gazete

Image: Anna Shvetsa

You Might Also Read: 

Spanish Healthcare Service Works On Resilience:

DIRECTORY OF SUPPLIERS - Ransomware Protection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Major AI Threats Cyber Security Teams Must Deal With
Business Email Compromise Warning Signs »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

Blackwall

Blackwall

Blackwall (formerly BotGuard) is a security infrastructure company focused on protecting web ecosystems from automated threats, while optimizing performance for hosting environments.

Networks Unlimited

Networks Unlimited

Networks Unlimited is a leading value-added distributor in Africa, providing technology solutions with a focus on security, networking, enterprise systems management and cloud technologies.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.