New Zealand Health Service Is Under Attack

New Zealand has been hit by a cyber security incident which has affected five hospitals. Hackers claiming to be behind a cyber attack that led to surgeries being postponed at Waikato public hospitals this week have made contact with health officials. The Waikato District Health Board (DHB) said that investigators are still determining whether patient records had been lost or other privacy breaches had happened. 

The DHB do not know who was behind the apparent ransomware attack or if it was connected in any way to the attack on the Irish Health Service (HSE) although local sources appeared to indicate it was a ransomware attack.

The DHB  has now said that it is addressing “a cyber security incident” and was “experiencing a full outage” of its information systems. The district board said the incident has affected five hospitals, the Waikato, Thames, Tokoroa, Te Kuiti and Taumarunui, all “to varying degrees”. 

An update, said “good progress” had been made overnight to get systems back online.“We are currently working with other government departments to investigate the cause, but are working on the theory that the initial incursion was via an email attachment. A forensic investigation is ongoing.” The statement also revealed that as a result of the disruption on 18 May six elective surgeries were cancelled, while 95 went ahead.

The incident follows a large scale cyber attack on Ireland’s health IT system on 14 May. Services have been switched off following reports of a possible “human-operated ‘Conti’ ransomware attack that had severely disabled a number of systems”.

It also came as high-profile cyber attacks had increasingly made headlines around the world, including the recent Irish attack and another that shut down an important United States' fuel pipeline. It is not yet clear if the ransomware was successfully deployed or how much private, patient data has been affected.

NZHerald:         Digital Health:          WaikatoDHB:           ITPro:          Irish Independent

You Might Also Read:

Cyber Breaches Will Kill:

 

« Dutch Cyber Security Under Threat
Will Governments Ban Ransom Payments To Hackers? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.