• Hey, guest user. Hope you're enjoying NeoGAF! Have you considered registering for an account? Come join us and add your take to the daily discourse.

Guardian: Hospitals across England hit by large-scale cyber attack

I was on a course with someone from the NHS a couple of years ago and their domain controller was still on Windows NT. That must have been a horrific upgrade process assuming it actually happened and isn't still on NT.
 

CTLance

Member
I'm just a small time freelancer IT drone in Germany, but from my experience, IT security standards at any location employing medical staff are at best atrocious. So I kinda wouldn't bat an eye if this turned out to be your bog standard email attachment scam by your average cookie cutter ransomware and not a targeted attack.

I just hope nobody dies to this. Best of luck to all the patients and doctors. (Also, next time the IT department comes up with another one of those obnoxious security guidelines and restrictions, please think of this event. We aren't doing this to torture you. Well, most of us. Usually.)
 
apologies for my repeat thread


this is a terrifying, basically the worst case scenario of a cyber attack directly effecting peoples health

Agreed, besides the already awful situation of this happening to an international bank, or telecommunications company, the added danger of patients who may have been scheduled for aid or operation suffering makes it worse.
 
how do you protect yourself from something like this? aside from good practices because it is hard to train people that barely knows how to use their fucking pcs, does antiviruses work?
 

Jezbollah

Member
Such a large and successful coordinated attach is likely the result of a recent vulnerability that has yet to have enough systems patched for. MS haven't been too good this year when it comes to security releases - and the fact they've recently bundled non-urgent security updates in with security updates (meaning you get forced security rollups as part of Patch Tuesday releases) means a lot of companies have had to change up their update procedures.

If this is the case, it comes down to procedures rather than investment of these environments. Infrastructure teams have got caught with their pants down not being dynamic enough to react to a change in updates. The fact you have international banks bundled in with public sector makes me think this.

Just heard that the variant of the attack we're seeing here is exploiting a vulnerability that was patched by Microsoft in march.

Ineffective Patch Update process on the infrastructure, ladies and gents.
 

Mendrox

Member
how do you protect yourself from something like this? aside from good practices because it is hard to train people that barely knows how to use their fucking pcs, does antiviruses work?

Being up to date with the systems and restricting file usage through exchange helps, also reminding people of security. aaand backups 24/7 like we do, but otherwise? nothing. close everything up
 

slit

Member
Let me tell you something, I don't know about the UK but having worked in Cybersecurity for a hospital system the U.S. I can tell you, one of the problems is doctors. Whenever we had a project to secure up the network, they would rattle on how inconvenienced they were, throwing hissy fits, threaten to quit, etc. When we blocked Google Drive, WWIII started.
 
This stuff has been happening for a long time now. These are from about this time last year:

http://msinc.com/security/crypto-ransomware-health-care-protecting-your-health-care-entity/

http://msinc.com/press-release/lapt...s-and-mitigation-in-the-health-care-industry/

http://blog.talosintelligence.com/2016/03/samsam-ransomware.html

https://www.us-cert.gov/ncas/alerts/TA14-295A

It's why HIPAA regulators are more aggressively stepping up enforcement here in the United States and why medical companies and hospitals are being trained more consistently in basic security protocols and how to handle patient information. It's not a fucking game, and hospitals have been a big target lately due to lax security procedures and oversights being made by staff.

If you're in healthcare IT and you're not doing everything you can to develop good procedures and safety protocols for your medical staff when it comes to computer hardware that stores or accesses patient information files (phones, hard drives, computers, flash drives, etc), you're a disaster, a government fine and a lawsuit waiting to happen.

Is that windows XP?

No, shira. It's Vista.
 

shira

Member
A photo of the message posted onto Twitter.

C_n7v4BWsAAi8Sb.jpg


It seems a lot more medical sites further north are effected, with GPs unable to access any patient records.

Is that windows XP?
 

Hasney

Member
From Twitter: Confirmed - wcry ransomware spreading across Europe uses EternalBlue/MS17-010/SMB. PATCH NOW EVERYWHERE.

This was from that NSA tool dump. Looks like updated systems on Vista SP2 or later should be fine. Windows 10 was never vulnerable.

Is that windows XP?

No, that's 7 or equivilent.
 

shira

Member
From Twitter: Confirmed - wcry ransomware spreading across Europe uses EternalBlue/MS17-010/SMB. PATCH NOW EVERYWHERE.

This was from that NSA tool dump. Looks like updated systems on Vista SP2 or later should be fine. Windows 10 was never vulnerable.



No, that's 7 or equivilent.

The taskbar suggests it's​ 7 or later, at least

The circular start button makes it either Windows 7 or Server 2008.

ayyyy ok thanks. I'm like if you are running xp no wonder you got hacked
 

Bilix

Member
I work for a medical software company that recently had some sites hit with ransomware. I don't know how it is in England, but the law here basically forces our hand to pay up because private heath data is involved. Ended up paying ~$30k and they were very helpful in decrypting everything.

Apparently they want these to go as smooth as possible since word will get out and when others are affected, they won't fight and just pay up.
 

RedShift

Member
Should be treated the same way terrorist attacks are.

Whoever is behind this should spend the rest of their life in prison.
 

Jezbollah

Member
How long before this is used to push privatization?

This is no political issue, it comes down to bad IT security practice.

It could have been prevented (and has been prevented by many other NHS organisations) by proper testing and update deployment.
 

THE:MILKMAN

Member
I work for a medical software company that recently had some sites hit with ransomware. I don't know how it is in England, but the law here basically forces our hand to pay up because private heath data is involved. Ended up paying ~$30k and they were very helpful in decrypting everything.

Apparently they want these to go as smooth as possible since word will get out and when others are affected, they won't fight and just pay up.

Honestly it sounds like the wrong thing to do in paying up to these criminals. I'm pretty confident the NHS/Government won't pay a penny to these scum.
 

Hasney

Member
I'm sure we'd only have to glance around on twitter for five minutes before you'd find people calling out for it.

Oh, I assumed he was talking about someone who matters.
You're probably still right.

This is no political issue, it comes down to bad IT security practice.

It could have been prevented (and has been prevented by many other NHS organisations) by proper testing and update deployment.

Yup, the patch to stop this has been available for over 2 months on Vista SP2 and above.
 

Dierce

Member
When shit like this happens it is a fair bet to blame russia unless there is evidence that proves otherwise. The scope seems too big to be an individual.
 

THE:MILKMAN

Member
From the BBC and according to Spain's NCC systems affected:

Microsoft Windows Vista SP2
Windows Server 2008 SP2 and R2 SP1
Windows 7
Windows 8.1
Windows RT 8.1
Windows Server 2012 and R2
Windows 10
Windows Server 2016
 

Hasney

Member
From the BBC and according to Spain's NCC systems affected:

Microsoft Windows Vista SP2
Windows Server 2008 SP2 and R2 SP1
Windows 7
Windows 8.1
Windows RT 8.1
Windows Server 2012 and R2
Windows 10
Windows Server 2016

But it is already patched from what security people on Twitter were saying. 2 months ago.
 

Hasney

Member
How pathetic can you be to attack hospitals? Don't they realize they might harm innocent sick people?

We don't know if it was targeted or not. They're still pieces of shit, but they may not have decided to directly go after hospitals.
 

Gen X

Trust no one. Eat steaks.
When I see that they request $300 to release access to the PCs I can help but think it's some 8yo sitting at home thinking he's going to be rich and buy infinite candies.
 

Jezbollah

Member
When I see that they request $300 to release access to the PCs I can help but think it's some 8yo sitting at home thinking he's going to be rich and buy infinite candies.

This is the thing though - 99% of the time the people who look after these PCs will just say "fuck it, we'll wipe the device and re-image it". You will always have the 1% who have stored their data on it, and cannot afford to lose that data. It's for that reason you always have attacks like this.
 

Audioboxer

Member
When I see that they request $300 to release access to the PCs I can help but think it's some 8yo sitting at home thinking he's going to be rich and buy infinite candies.

More like to buy Overwatch loot boxes. The thirst for cosmetic items.

Just caught this news on the BBC after making dinner. Mental.
 

Hasney

Member
Maybe it isn't just that vulnerability if Windows 10 is affected?

Dunno, people who are respected in the field are saying what it is, even saying that blocking certain ports to stop it from getting on the system. No-ones out there saying it's using some 0-day or unpatched security and I know some of these guys would love to bash MS if they could.

Not sure what the initial entry point is for the attacks, but as it affects SMB shares, once it's on one system, it just spreads through it.
 

Danim

Neo Member
Didn't realise this had made national news, I work in one of the affected NHS Trusts. There were rumours spreading around lunchtime of PC's being affected by some kind of virus on another hospital site a few miles away, about half an hour later it started locking all the PC's in our offices one by one. I've spent most of the afternoon running around to the different wards and outpatient departments on our site to get them to shut everything down before it spread.

I've no doubt this has come about from someone opening something they shouldn't have, we get chain emails making their way around the Trust a few times a week minimum, awareness of IT security seems to be lacking in the NHS to say the least.
 

Hasney

Member
Jesus.

Sky News: Up to 40 NHS Trusts affected by this attack.

Jesus.. For those reading this outside the UK, the Trusts are like responsible for regions the hospitals operate in, so we're probably talking multiple hospitals within those trusts.
 
Top Bottom