Ransomware for District Health Board
# | Post |
---|---|
51 | tony9 wrote:
Nothing to do with morals? Everything has a moral component. That is my point. These hackers are dispicable cowards, and I look forward to their shame being made public. oh_hunnihunni - 2021-05-29 09:33:00 |
52 | Be interesting to see how it goes when they no longer have region dhbs. There is such a range of applications across dhbs. The Auckland (and northland) based ones have over 2000 clinical and business applications alone. Some of these are quite complex apps, and a lot of these aren’t used nationally and are specific to only one dhb. Even those in Auckland are different. Hospitals are like little towns of their own in a way, they have a wide variety of departments. Schooling, medical, finance, engineering, plumbing and other services in-house, kitchen and food, chaplains etc. it’s not just medical although that alone is complex when you’re looking at patient systems, radiology, theatre, cardiology, eye, dental etc. christin - 2021-05-29 10:04:00 |
53 | oh_hunnihunni wrote:
Yes they are. But the chances of them being caught are around ZERO. nice_lady - 2021-05-29 10:07:00 |
54 | Pity. Just a thought, but terrorists have more morals than these guys. At least they take responsibility for their carnage. Edited by oh_hunnihunni at 10:38 am, Sat 29 May oh_hunnihunni - 2021-05-29 10:37:00 |
55 | Well yes that is true, because terrorists generally may believe that they are fighting for a certain cause or ideology perhaps, however the hackers in this case are most likely just criminals. I am not defending terrorism in any way and think that mostly they are doing the wrong thing, but I am just talking philosophically here. tygertung - 2021-05-29 12:22:00 |
56 | In the current setup there was an opportunity for patients to be treated at an other DHB, the separation allowing for some level of availability for critical patients. If they all ran on the same system then they would have all been knocked out with a similar breach. The reality is that system are all shiny and well setup on day 1 by well funded project people, then as the months and years pass the 'cracks' form with the lesser skilled and funded operational team having to deal with changes and exceptions. Did the hackers actually target the DHB or was it a case of a random recipient doing the wrong thing? soundsgood - 2021-05-29 14:36:00 |
57 | soundsgood wrote: Or was it an inside job by someone that knew the vulnerabilities and system architecture? Also seems a bit odd to me that (a) there are 700 servers on site and (b) every one of the 700 servers was 'locked'. I've been involved in the business for 30+ years and even in the big London hospitals, there would be a max of 10 servers (each with their own remote mirror image on failover duty). Edited by tegretol at 2:59 pm, Sat 29 May tegretol - 2021-05-29 14:59:00 |
58 | tegretol wrote:
The desktops are generally Windows whereas the servers are Unix-based. It would be interesting to know what sort of virus it is and whether it has disabled the windows-based systems, through which staff generally access the main applications, or whether it has actually somehow disabled the main applications like PMS and Clinicals. soundsgood - 2021-05-29 15:36:00 |
59 | soundsgood wrote: Agree, it'd be v interesting. You are obviously in the same business! tegretol - 2021-05-29 15:52:00 |
60 | nice_lady wrote:
Ive never seen ransomware do this. Typically it just encrypts any files it can in the documents folders and network drives. All because some stupid idiot clicks on a link on a random email expecting you to pay for delivery of a NZ post parcel! Many questions to be asked, if they do have backups, especially if its in the cloud, a rollback should be fairly easy. What about their antivirus? They were probably using some crappy system such as norton or something. Still dont understand why pacients cant be treated at their hospital and need to be taken elsewhere for treatment? Makes me think there is much more to the story than they are letting on, perhaps it was a targeted attack and the infection not only encrypted data but corrupted windows installations too? nzoomed - 2021-06-02 11:43:00 |
61 | Having used Linux for 10 years, I don't understand how the Health Board's OS allows code to be executed when that code is not approved and installed properly. Maybe they should use a decent OS. trade4us2 - 2021-06-02 11:54:00 |
62 | trade4us2 wrote: Every time I see ransomware it is the user that has opened an attachment they shouldn't of or other equally problematic scenarios, it's called social engineering... king1 - 2021-06-02 12:41:00 |
63 | Linux doesn't generally use executable files very much, and when it does, they are a bit tricky to get them to execute, like you really need to know what you are doing. With Windows for example you just double click and say "Yes" when it asks you if you want to run it. tygertung - 2021-06-02 12:52:00 |
64 | the point I was delicately trying to make was that no OS can prevent users doing dumb stuff. Having said that in a situation like a hospital/corporate, one would think that the workstations would be strictly locked down. king1 - 2021-06-02 13:07:00 |
65 | nzoomed wrote: “They said they hadn’t backed up in the past year, across the whole domain.” Edited by king1 at 1:27 pm, Wed 2 Jun king1 - 2021-06-02 13:26:00 |
66 | king1 wrote:
Maybe, but it is a lot harder in Linux: https://sites.google.com/site/tipsandtricksforubuntu/executa tygertung - 2021-06-02 13:34:00 |
67 | The member deleted this message. kittycatkin - 2021-06-02 14:24:00 |
68 | gyrogearloose wrote: And I recall a senior DHB executive(can't remember which one) in the last few years losing their job because of issues around the contract regarding that DHB's IT security. brouser3 - 2021-06-02 14:27:00 |
69 | kittycatkin wrote:
I have to say this is no-where near the first time hospitals have been hit. nice_lady - 2021-06-02 14:37:00 |
70 | I know a small organisation here in Wellington in the health field that was hit earlier in the year and had their email traffic 'stolen', as in copied. Now all of their customers occasionally receive email which appear as replies to messages that they had actually sent. Those new emails contain ZIP files. There will always be some recipients who just see the incoming email address, assume it is valid, and click without thinking further. soundsgood - 2021-06-02 15:37:00 |
71 | This message was deleted. kittycatkin - 2021-06-02 15:41:00 |
72 | This message was deleted. kittycatkin - 2021-06-02 15:43:00 |
73 | This message was deleted. kittycatkin - 2021-06-02 15:45:00 |
74 | tygertung wrote: maybe that's why noone uses linux king1 - 2021-06-02 15:53:00 |
75 | kittycatkin wrote: Usually invoice scams are about intercepting the invoice and changing the bank account or payment options. Maybe they couldn't identify the actual client in the client list and just decided to send it to all of them... it would look 'normal' to the correct client Edited by king1 at 3:59 pm, Wed 2 Jun king1 - 2021-06-02 15:58:00 |
76 | king1 wrote:
Yes, I think you are right. No one does use Linux. It is a system with zero users worldwide. tygertung - 2021-06-02 17:47:00 |
77 | nzoomed wrote: No doubt EVERYTHING is driven through the system - eg timetabling, material supply, staffing, vital sign recording, medication administration etc etc. Not just a case of putting a patients name on a clip board. brouser3 - 2021-06-02 18:57:00 |
78 | Probably correct. Total reliance on the system - an insecure system Ooopppss. nice_lady - 2021-06-02 19:16:00 |
79 | king1 wrote:
Huh, I hadn't read down to the end of the article. Thank you for pointing it out. However I *had* gone to the publically available Health Select Committee submission put in by Waikato DHB, to read through their answers for the CyberSecurity section. Waikato's full answer was: "Full recoveries were performed of database restores, virtual machine restores, file and folder restores and exchange mailbox restores. We have not tested a restore of our entire domain, individual file servers or entire application systems in the last financial year." Comparing Waikato's answers to Canterbury's, and Auckland's submissions, even I, and non-techie person, can see that Waikato were recognising alarmingly low levels of cyberattacks to their firewalls etc. Far too much info available publically in my opinion. sumstyle - 2021-06-02 19:31:00 |
80 | kittycatkin wrote:
Usually they come as an email with a link you click on, then it asks to download a .zip archive with the ransomware. king1 wrote:
WTF! nzoomed - 2021-06-02 19:32:00 |
81 | nzoomed wrote:
Yeah but sometimes the activation is hidden in a .doc or .xls or .pdf file the Ms Office files can have autorun macros and if that function isn't locked down on the target system then BOOM. (I'm not quite sure how a pdf can harbour ransonware or viruses but they can apparently). Many office staff wouldn't even know that a macro could be dangerous and if even IF the system is locked down to ask permission to run macros they might just say YES. Edited by nice_lady at 7:37 pm, Wed 2 Jun nice_lady - 2021-06-02 19:36:00 |
82 | nice_lady wrote: PDF can simply have a link to a payload. when they get the right person who just follows instructions, they do all manner of stupid like opening the links regardless of warnings it might be a malicious. Even seen people disable security software simply because they were told to (in the email/link/attachment) in order to open the 'document' Edited by king1 at 8:38 pm, Wed 2 Jun king1 - 2021-06-02 20:38:00 |
83 | Ah. Yes. Ouch. nice_lady - 2021-06-02 20:58:00 |
84 | end of the day the biggest problem with computers is the organic interface sirrab - 2021-06-02 21:07:00 |