Posts: 3,073 +97
Yet another hospital has been hit with a ransomware attack. The target this time around was Kansas Heart Hospital in Wichita. But unlike other recent attacks, the hackers didn’t fully keep up their end of the deal after receiving their ransom, only partially restoring access to files and demanding more money to decrypt the remaining data.
The hospital refused to pay a second ransom because it was no longer “a wise maneuver or strategy.” President Greg Duick, MD says the hospital had a plan for this type of attack, helping minimizing the amount of damage done. Patient information was not endangered and routine operations were not affected, according to Duick. He declined to say how much money Kansas Heart Hospital paid, only that it was “a small amount.”
Ransomware is becoming a common threat in the healthcare world. Earlier this year 10 Medstar facilities in the Washington region were targeted by a ransomware attack and was forced to shut down its computer system. A hospital in Los Angeles also had to pay 40 bitcoin (about $17,000) after falling victim to a similar attack in February.
Beyond healthcare many other attacks have targeted regular users. One such example is TeslaCrypt, which first surfaced in early 2015 and was unique in that it targeted gamers by encrypting data such as save files and custom maps in addition to the usual gamut of documents. The developers behind the TeslaCrypt ransomware just recently decided to shut down the “project”, releasing a master decryption key for victims along with a note saying they are sorry. With the master key in hand, ESET has since released a decrypting tool for all TeslaCrypt variants between versions 3.0 and 4.0.