From pirates to mobsters to petty criminals, kidnapping for ransom is nothing new. We’re all familiar with the process – a person is abducted, the abductor demands a ransom, the ransom is paid, and then the person is released.
Now this age-old form of extortion has evolved into the technological world as ransomware.
Ransomware criminals employ the same principles as their predecessors but with a twist: the kidnappee is data.
The kidnapper in this scenario is crypto ransomware, a malware variant programmed to encrypt and lock data. After a company’s records are locked, the infected computer displays a note that demands ransom.
The perpetrator will only unlock the files once the ransom has been paid in full.
Ransomware in Healthcare
The healthcare industry in particular has been struck by a recent spate of ransomware attacks.
With few exceptions, the companies are reluctant to release specific details, leaving the investigating to the FBI.
UMASS Memorial Medical Center
An employee at UMass Memorial Medical Center in Worcester opened an email laced with ransomware last fall, resulting in dozens of locked hospital files on several different computers.
A ransom note was promptly displayed on the hospital monitors.
The hospital chose not to pay ransom, removing all of the encrypted files instead.
Security professionals later restored the system with backup files.
In response, Chief Information Security Officer Bruce Forman outlines his plan to install advanced, persistent threat software that will identify malware based on its behavior.
Hollywood Presbyterian Medical Center
On February 5, 2016, hackers locked patient files at Hollywood Presbyterian Medical Center and demanded ransom for access.
The hospital opted to shell out 40 bitcoins – approximately $17,000 – for the encryption key before calling the FBI.
The hospital was off-line over a week.
Emergency room systems, and computers used for CT scans, lab work and pharmacy needs were were all affected by the attack.
Some 911 patients were even sent to other hospitals.
The International Business Times later reported that a group of Turkish hackers had claimed responsibility for the attack via the text-sharing site Pastebin, threatening more attacks as long as the U.S. supports Kurdish rebels.
The claim is unverified however.
Prime Healthcare Management
The Los Angeles Times reported ransomware attacks on March 27, 2016 at two Prime Healthcare Management, Inc. hospitals: Chino Valley Medical Center in Chino, CA, and Desert Valley Hospital in Victorville.
Spokesperson Fred Ortega said the attacks were “immediately addressed and contained,” and no ransom was paid.
The FBI is still investigating.
A third Prime Healthcare facility, the 306-bed Alvarado Hospital in San Diego, was also infected by a crypto virus on March 31, 2016.
On March 28, 2016 Columbus, MD based provider MedStar Health shut down its database and email after a viral attack.
The provider operates 10 various hospitals, serves hundreds of thousands of patients, and has over 30,000 employees.
MedStar Health claims no information was stolen, and hasn’t labeled the culprit as ransomware, but The Washington Post reported they received a screen shot of a ransom demand for 45 bitcoins – or roughly $19,000 – from a MedStar employee.
The shutdown forced staff to go old-fashioned, relying on paper charts and records. Appointments and surgeries were also delayed.
Other healthcare organizations targeted by ransomware attacks since February, 2016 include the Los Angeles Health Department, Ottawa Hospital in Canada, Methodist Hospital in Henderson, Kentucky, and King’s Daughter’s Health in Madison, Indiana.
In each case, spokespeople reported the systems were shut down, but later restored with back-up files.
Why is healthcare a target?
In general, ransomware attacks are becoming more prominent because they are successful.
In 2012, a server of 5,700 computers was locked – all on the same day according to United States Computer Emergency Readiness Team.
Symantec analyzed the data and determined 2.9% of the users with locked computers had paid an average ransom of $200 per computer.
While this may be true of ransomware overall, many healthcare organizations claim they actually aren’t paying ransoms.
But some are.
Medical professionals rely on computer access for everything, from critical patient information like allergies and lab results to operating schedules.
Locking access to records can literally be a life or death situation.
Healthcare organizations may be targets not because of their industry, but because of the types of applications they use according to Craig Williams of Talos Research in Arstechnica Report.
He suspects ransomware perpetrators scan the internet for vulnerable servers, finding many in the healthcare trade.
The increase in crypto virus attacks is also caused by the antiquated security systems employed by many companies according to Zach Forsyth at Comodo.
Healthcare organizations are relatively new to the digital game, and their security systems lack the maturity of those in the financial and technology industries.
Criminal attacks on healthcare organizations increased 100 percent between 2009 and 2013 according to the Ponemon Institute.
The trend of attacks against the vulnerable healthcare industry shows no signs of slowing. In fact, ransomware is emerging as a popular crime , states Ben Desjardin’s post on Radware.
How do ransomware attacks happen?
Some ransomware attacks gain access through phishing, or luring a user to click on a contaminated email or link. Vulnerable servers can also be targeted remotely.
A recent ransomware campaign against the healthcare industry in March, 2016 was under the scope of Cisco Talos Research.
Perpetrators used the open source tool JexBoss to gain traction in a server. Upon access, a ransomware variant named SamSam encrypyted multiple Window systems.
Another malware distribution method, Ransom as a Service (RaaS), emerged in 2015.
Criminals download the ransomware app builder and customize it according to the Microsoft Malware Protection Center.
Ransom MLIS/Samas also emerged early in 2016, with criminals using a penetration testing attack server that searches to exploit vulnerable networks, and uses a publicly available tool called reGeorg for tunneling.
MSPs and VARs Beware!
It’s not just healthcare providers who should worry about their records being locked. Managed Service Providers and Value Added Re-sellers that service the healthcare industry are also at risk.
HIPAA Regulations for IT Compliance instruct that any business involved in the creation, maintenance or monitoring of electronic protected health information (ePHI) is subject to the Security Rules of HIPAA.
Compliance requires that the confidentiality and integrity of ePHIs remain intact.
Because ransomware locks files rather breaching their integrity, the jury is currently out on whether HIPAA-affected organizations have to report crypto virus attacks to the Department of Health and Human Services’ Office for Civil Rights.
It’s possible that attackers have determined ransomware victims might pay up if they can be assured the data has not been stolen, and therefore they may not have to report the breach.
What can you do?
A simple solution is to back up your files. If you can access what a criminal has encrypted, you can continue to do business.
Train your employees to never click on suspicious emails or links. In addition, a strong password policy should be implemented throughout the company.
Third Tier produced a ransomware protection kit they’ll mail to you in return for a donation that supports females who want to work in the IT field.
Other remedies include installing a multi-tier defense architecture that checks software multiple times for vulnerabilities.
Web scanning can stop your system from accessing malicious sites as well.
Whitelisting is an effective tool that only allows specific, approved programs to run.
Employees can be granted a “least privilege user account,” which means they are not given administrative privileges to their computers.
Ransomware Prevention can also include blocking malicious TOR IP addresses, and testing restores.
Once your security system is set up, do not ignore it – maintain it. The Red Hat-supported JBoss server application was reported vulnerable in 2007 according to The HIPAA Journal.
A patch to correct the vulnerability has existed for almost ten years, and had it been applied, a number of ransomware attacks could have been prevented.