The Human Impact Of Ransomware In Healthcare

Whilst the rapid digitalisation of the health sector is bringing new benefits to the availability and scope of medical services, there’s been a cybersecurity trade-off which is putting patient’s health and wellbeing at risk. 

Cyberattacks on the sector have reached epidemic proportions and created widespread disruption to services at a time when health providers are already under pressure to keep up with demand.  

In fact, we found that the healthcare sector suffered more ransomware attacks than any other industry for three consecutive months this year. And behind the headlines of major incidents that bring services at large hospitals to a standstill, there are countless more small clinics, practices and surgeries which must absorb the impact resulting in further backlogs, downtime and delays to the continuity of care that patients rely on. 

Data may be the primary target, but it’s certainly not the only casualty when attackers compromise vital digital systems. Since ruthless criminal gangs are willing to use patients’ privacy, safety and health as leverage for ransom demands, it is vital that the sector protects its greatest points of vulnerability to safeguard patients and staff. 

The Direct Impact On Patient Care & Wellbeing

For any sector dealing with the fall out of a cyberattack, the disruption to services can lead to major, long-lasting consequences which can last for weeks or even months. For the health sector there’s always an added level of jeopardy and severity as they’re dealing with adversaries who are willing to put financial profit before human lives. 
In the UK, the cyberattack on the pathology services provider Synnovis, resulted in the cancellation of over 3,000 NHS appointments, affecting critical services like blood transfusions and diagnostic tests. The BlackCat/ALPHV attack on Change Healthcare in the US in February, is estimated to have had a direct impact on patient care at 74% of hospitals, with many patients struggling to access care. 

It is perhaps inevitable that this operational ripple effect also contributes to significant stress and burnout among healthcare workers who are already operating in a high-pressure environment. 

The Erosion Of Trust In Healthcare Systems

The long-term consequences of ransomware extend far beyond operational disruption as cybercriminals increasingly use double extortion tactics to encrypt data while simultaneously exfiltrating it. Criminal gangs will use the threat of selling or leaking medical records to pile more pressure on their ransom demands; in the case of the Change Healthcare breach it was reported that a $22 million ransom was paid.    

There’s also the risk that sensitive data falling into criminal hands erodes public trust in healthcare systems, leaving patients fearful about the safety of their personal information. 

A new precedent was set in September when the Lehigh Valley Health Network came to a $65 million class-action lawsuit settlement in relation to a ransomware attack last year. It was a particularly malicious case, in which the perpetrators posted the nude medical record photos of patients online, with more than 135,000 patients affected in total.

The theft of any sensitive clinical data is huge breach of privacy and can cause further emotional distress to patients. When highly private medical records are in the hands of criminal gangs they can be used as a bargaining chip to target the individual directly for ransom demands, or to be exploited further for identity fraud and theft.   
It’s not only the patients that suffer once data is in the wrong hands. Healthcare staff are just as susceptible to bear the brunt of data breaches and there are numerous cases of financial information belonging to hospital personnel being stolen and leaked alongside patient data in large scale cyberattacks. 

Addressing The Causes Of Healthcare Cyberthreats 

There are several factors that make the healthcare sector more vulnerable to cyberattacks. An ageing IT infrastructure is one the biggest issues, as squeezed budgets and decades of under investment mean that many providers are relying on outdated systems. Legacy assets are more difficult to manage and leave gaps in security processes, but many organisations struggle to find the resources, or money they need to modernise.
For those unable to replace or revamp old systems, the priority should be on limiting attackers’ ability to access and move through the network. Adopting identity-based security measures such as multi-factor authentication (MFA), least privilege access, and Zero Trust frameworks are key here, ensuring only authorised users can access sensitive data. 

Mitigating The Impact

In addition to attempting to limit the root causes of breaches, healthcare organisations need to identify signs of attack and reduce the impact of breaches. 

Endpoint detection and response (EDR) tools play an important role by identifying suspicious activity early and alerting security teams. Additionally, continuous monitoring of third-party vendors is vital, as many attacks exploit weaknesses in external connections.

Next-generation firewalls further enhance security by enforcing identity-based policies, ensuring sensitive data is protected from unauthorised access.

Further, anti data exfiltration (ADX) solutions are important in safeguarding sensitive patient records, providing a critical layer of protection that stops exfiltration and lateral movement within the network, stopping both the activation and spread of ransomware.

Collective Efforts For Greater Security

These organisational-wide measure are vital, but there’s a growing acknowledgment from policy makers and legislators that combatting the growth of ransomware needs a collaborative approach. Healthcare organisations must recognise that they aren’t facing this threat alone and should actively seek to work alongside groups including regulators, law enforcement, and technology partners. 

A coordinated approach can help the sector to stay ahead of cybercriminals by ensuring that health providers have access to the latest threat intelligence and advice on enhancing security strategies. 

This is more important than ever, as there’s a very human impact at the heart of cyberattacks in this sector. Behind every story of private health records that have been stolen, medical images that are leaked, or appointments that are missed, is an individual patient whose right to privacy, wellbeing and care has been compromised. 

It’s a right that leaders and policy makers in the industry need to work hard to defend even as cybercriminals continue to launch ever more damaging attacks. 

Dr. Darren Williams is CEO and Founder of BlackFog    

Image: Alexander Grey

You Might Also Read: 

AI Has The Power To Transform Healthcare Cyber Security:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cyber Security: The Fastest Growing IT Work In The UK
Strengthen Software Supply Chain & Governance For Better AI System Cybersecurity »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.