Article Details
Scrape Timestamp (UTC): 2024-10-24 10:43:08.950
Source: https://www.theregister.com/2024/10/24/ransomware_ripple_effect_hospitals/
Original Article Text
Click to Toggle View
Ransomware's ripple effect felt across ERs as patient care suffers. 389 US healthcare orgs infected this year alone. Ransomware infected 389 US healthcare organizations this fiscal year, putting patients' lives at risk and costing facilities up to $900,000 a day in downtime alone, according to Microsoft. In a report published Tuesday, Redmond recounts the surging costs – both in terms of patient care and dollars, with the average admitted payment now up to $4.4 million – to hospitals hit by a ransomware attack as well as those nearby. Keep in mind, these monetary figures are averages. UnitedHealth spent $776 million to date on network restoration and $1.4 billion on increased medical care expenditures as a result of the Change Healthcare ransomware attack in February. Previously, the company's CEO admitted to paying the criminals' $22 million ransom demand. The Microsoft paper, which cites both internal and third-party research, points to highly time-sensitive stroke treatment as an example. Stroke code activation at hospitals close to one suffering from a ransomware infection jumped from 59 to 103, while confirmed strokes skyrocketed 113.6 percent, from 22 to 47 cases, according to a 2023 study. It also found reported cardiac arrests at a nearby hospital dealing with an infected hospital's overflow of patients increased 81 percent, from 21 cases to 38. Meanwhile, survival rates for out-of-hospital cardiac arrests with favorable neurological outcomes plummeted, from 40 percent pre-ransomware infection to 4.5 percent during the incident. These network intrusions also divert ambulances that are transporting people to hospitals and emergency clinics. Microsoft cites a 35.2 percent increase in emergency medical services (EMS) arrivals at other hospitals when one nearby is experiencing an attack. Meet the scumbags attacking hospitals While healthcare attacks are usually perpetrated by "highly organized and specialized threat actor groups," according to Microsoft, ransomware-as-a-service has significantly lowered the barrier to entry for would-be extortionists. This, coupled with Russia providing a safe harbor for ransomware gangs, has led to a 300 percent increase in attacks. Still, Iranian groups have been the most active in terms of attempted attacks against healthcare orgs this year, according to Microsoft's threat intelligence data. This echoes an August warning from the US government about Iran's Pioneer Kitten hacking into American networks, including hospitals, to steal sensitive data and then "collaborate with ransomware affiliate actors to deploy ransomware." In addition to the Russians and Iranians, Chinese crews are also getting in on the healthcare ransomware game and using it as a cover for their government-backed espionage activity, Microsoft suggests.
Daily Brief Summary
Ransomware impacted 389 U.S. healthcare organizations this year, compromising patient safety and incurring significant costs.
Facilities affected by ransomware face up to $900,000 daily in operational losses; with average payments to attackers reaching $4.4 million.
In one case, UnitedHealth spent over $2.1 billion on network restoration and additional medical care costs after a ransomware attack, including a $22 million ransom payment.
Nearby hospitals experience increased strain due to diverted resources and patients, with significant increases in stroke and cardiac arrest cases when a local hospital is attacked.
Survival rates for certain emergency conditions have drastically fallen, from 40% to 4.5%, during ransomware incidents.
Ransomware as a Service (RaaS) and safe harbors provided by countries like Russia have facilitated a 300% increase in healthcare-targeted attacks.
Notably, Iranian groups pose the highest threat this year, actively attempting to breach healthcare networks in conjunction with ransomware campaigns; China and Russia also play significant roles in these cyberattacks.