(Graphic courtesy of Upstart Cyber)
Ransomware hacks, in which attackers encrypt computer networks and demand payment to make them functional again, have been a growing concern for both the private and public sector since the 90s. But they can be particularly devastating in the healthcare industry, where even minutes of downtime can have deadly consequences, and have become ominously frequent.
The number of ransomware attacks on healthcare organizations increased 94 percent from 2021 to 2022, according to a report from the cybersecurity firm Sophos. More than two-thirds of healthcare organizations in the U.S. said they had experienced a ransomware attack in 2021, the study said, up from 34 percent in 2020.
Ransomware attacks on healthcare are particularly common in the U.S., with 41 percent of such attacks globally having been carried out against U.S.-based firms in 2021.
Ransomware hacks have caused major healthcare disruptions, including delayed chemotherapy treatments and ambulances being diverted from a San Diego emergency room after computer systems were frozen. In 2021, a lawsuit filed by the mother of a baby who died in Alabama alleged the first “death by ransomware”, blaming a 2019 hack of a hospital for fatal brain damage of the newborn after heart rate monitors failed.
The possibly devastating consequences for medical facilities may be one of the reasons hackers have identified them as a high-profile target. “The North Korean state-sponsored cyber actors likely assume healthcare organizations are willing to pay ransoms because these organizations provide services that are critical to human life and health,” said an advisory from Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA).
CISA and others advise hospitals against paying ransoms, but providers often feel they have no choice, said Barak. In 2021, 61 percent of healthcare organizations that suffered a ransomware attack paid the ransom — the highest percentage of any industry sector.
Attacks are typically carried out by private groups of criminals, experts say: in the third quarter of 2021, 30 percent of ransomware attacks on healthcare entities were carried out by Conti, a crime syndicate thought to be based in Russia.
But the North Korea incident revealed last week is just the latest state actor to orchestrate ransomware attacks on healthcare organizations after the FBI revealed in June it had thwarted an attack from Iran on a Boston Children’s hospital.
The healthcare industry has been hit by a perfect storm of factors that have escalated the ransomware problem, experts say: patient information is increasingly being digitized as hospitals struggle with small internet security budgets.
In 2009, the Obama administration passed a bill requiring all public and private healthcare providers to adopt electronic medical records by 2014, resulting in a massive migration of paper patient records to online systems. But today, just four to seven percent of the average healthcare provider’s annual IT budget is focused on cybersecurity.
Legislators are attempting to fill in those gaps. In May, Senator Patty Murray of Washington led a hearing on strengthening cybersecurity in the healthcare and education sectors, saying that the U.S. “needs to address cybersecurity attacks and ensure they are treated like the national security threat they are”.
In March 2022 the Senate introduced a bipartisan bill called the Healthcare Cybersecurity Act, which would direct CISA and the Department of Health and Human Services (HHS) to collaborate on a plan to bolster cybersecurity measures among healthcare and public health organizations.
The state of Oregon also has legislation pending to provide funding for cyber security. Additionally, Oregon community colleges and universities are developing cyber security curriculum for a new generation of cyber security professionals. If you’d like to learn more about cyber security services available in Oregon, please visit us at: upstartcyber.com.