Don’t let your patients’ medical records be taken hostage.
|By David Ellis|
In the last year alone, data breaches against the healthcare industry have targeted major providers like Anthem, Premera Blue Cross, and Excellus, and compromised more than 99 million patient records.
How does ransomware work?
In a nutshell, ransomware is digital extortion.Ransomware starts with malware typically downloaded via a phishing email or malicious site link.
When activated, this ransom malware (ransomware) immediately encrypts all of the files on a computer, including:
- Word documents
- The operating system itself
The attacker retains the decryption key and it’s veritably impossible for the user to access the files. The attacker will leave just one decrypted file on the computer. Included in the file is an explanation that the files have been encrypted, and the attacker demands a payment in order to provide the decryption key.
The instructions will include a deadline that, if not met, results in the attacker threatening to discard the decryption key, rendering the computer useless. According to the FBI, the initial ransom amount is anywhere from $200–$5,000, typically accepted only in Bitcoin crypto-currency.
Although there’s no guarantee the files will be decrypted using the key, it’s rare that an attacker has not decrypted the files after payment. After all, it wouldn’t be a very effective extortion tool if word got around that the hackers didn’t fulfill their end of the bargain.
Why ransom a hospital network?The psychology behind ransomware is all about how much value the user thinks the computer’s data holds. For someone with a new personal computer that contains only a few files, paying a hacker $500 to restore locked files doesn’t make sense. It would be easier to wipe the computer and start from scratch.
But what if a hacker got a hold of all patient records for an entire hospital and encrypted them? There could be hundreds of thousands of patient files that suddenly become inaccessible. If the hospital’s data wasn’t properly backed up (outside of the network) and the ransom wasn’t immediately paid, doctors wouldn’t have the vital information needed to treat patients. Records of patient and insurance payments would be lost, patient personal and credit card information would be compromised, and the list goes on.
The ensuing chaos could effectively ruin a hospital’s reputation.
In recent years attacks targeting healthcare organizations have become even more appealing to hackers because of the digitalizing of hospital records, motivated by movements like the EHR Incentive Programs that pay companies to move certain hardcopy health records to electronic format. As more data is digitized, the more records an attacker will be able to affect on a given network, thus, the more lucrative and successful the attack becomes.
Ransomware removal 101In theory, ransomware is not that sophisticated. However, the average user, or even average IT guru, probably couldn’t remove it without accidentally wiping a computer. Which means, the average user has two ransomware removal options: pay up, or wipe the computer.
At BlackHat USA 2015, Dr. Engin Kirda shared research that 61% of ransomware attacks leave files untouched, and only lock down the computer. In cases like these, a professional may be able to either extract your critical files or remove the malware off your computer without you handing out a ransom.
But, in cases where the malware has encrypted each file, paying the attacker is likely the only option.
However, ransomware survivors have no guarantee that the whole thing won’t happen again at some future date. After all, the hacker still has access to the computer either through the original vulnerability that allowed them to download malware in the first place, or because the attacker installed a covert backdoor for future system access.
Preparing your healthcare environment for ransomwareAs shown, ransomware is a very real threat that has the potential to devastate healthcare organizations, and this malware is too effective for attackers to stop using it.
Here are a few things to keep in mind while preparing your networks, computers, and staff for the
possibility of ransomware:
- Store data in the cloud: If you’re using a Health Information Exchange (HIE) in the cloud, pat yourself on the back. As of today, no known ransomware has successfully attacked cloud-based systems.
- Utilize backups: To thwart ransomware, back up files often and make sure that a recent backup is stored offline, so the backup cannot be impacted by ransomware or other digital attack vectors.
- Train staff on data security: Staff members are the weak link in the ransomware equation. In most cases, malware is downloaded onto healthcare environments because of a workforce member surfing the web or opening a link in a phishing email.
- Create a ransomware crisis plan: Each member of your staff that uses a company computer needs to understand and practice your organization’s data security plan in order to avoid the devastating affects of a ransomware attack.
Improving your data security measures to be able to fend off a ransomware attack may seem arduous, but it is a mere speed bump compared to the sheer roadblock that a successful ransomware attack may pose to your organization.
David Ellis (GCIH, QSA, PFI, CISSP) is Director of Forensic Investigations at SecurityMetrics with over 25 years of law enforcement and investigative experience. Check out his other blog posts.