Ransomware infects hospitals in Ohio, West Virginia

(Getty Images)

Share

Written by

Ransomware has infected two hospitals in Ohio and West Virginia, a spokeswoman said Monday.

The attack affected the Ohio Valley Medical Center and East Ohio Regional Hospital, Karen Janiszewski, spokeswoman for parent company Ohio Valley Health Services & Education Corp., confirmed in an email to CyberScoop. Officials did not specify what kind of ransomware caused the incident.

The attack Friday prevented the two hospitals, which together have 340 beds, from receiving patients via ambulance through at least part of Thanksgiving weekend, Ohio’s The Times Leader reported. No patient data was compromised and the hospitals could accept walk-in patients, according to the paper.

The two hospitals are “the area’s only comprehensive behavioral and mental health services and board certified emergency services on both sides of the Ohio River,” which separates Ohio and West Virginia, according to their website.

This attack is only the latest to strike U.S. medical facilities. Health care organizations have been on the front lines of recent ransomware infections. Nearly a quarter of the 67 SamSam ransomware attacks in 2018, for example, targeted the health sector, according to cybersecurity company Symantec.

In a Facebook post Saturday, the Ohio and West Virginia hospitals said, “We apologize for the inconvenience and are continuing to work on the situation.”

We apologize for the inconvenience. And are continuing to work on the situation.

Posted by OVMC and EORH on Saturday, November 24, 2018

In the face of the persistent ransomware threat, medical professionals are prioritizing cybersecurity, but are under-resourced in their defenses, research shows.

Of the 400 medical professionals surveyed by the Chertoff Group and health care company Abbott, more than 90 percent said that securing patient data is a focus at their hospital. However, 75 percent of the doctors and 62 percent of the hospital administrators felt “inadequately trained or prepared” to mitigate cybersecurity risk.

Some organizations have responded to ransomware attacks by paying off the hackers: In January, after SamSam hit an Indiana hospital computer network, hospital officials paid $50,000 to unlock the data.

Beau Woods, a cyber safety innovation fellow at the Atlantic Council, said that health care organizations should take concrete steps to prepare for ransomware such as backing up data, updating clinical systems, and practicing the ability to function offline.

“Tools meant to improve patient care can impede it if not well safeguarded,” Woods told CyberScoop.

As for the pair of Ohio and West Virginia hospitals, the facilities’ IT security team was aiming to have the ransomware infection “resolved” by this past Sunday, Janiszewski told The Times Leader.

In a follow-up statement to CyberScoop Wednesday evening, Janiszewski said that several of the software programs that were affected by the ransomware attack had been restored to normal functioning but that IT personnel were still running tests on multiple other systems.

“It is our hope to have all systems restored online by the end of this week,” Janiszewski told CyberScoop.

“The hospitals are receiving patients as we normally do – if we have a patient arrives and we are not able to treat them due to the software issues then that patient is transferred,” Janiszewski added in her Wednesday email.  “We’ve only seen a slight decline in patient visits in the [emergency department] due to diversion.”

As of Wednesday at 10 pm local time, patients were no longer being diverted from the emergency room because of software issues, she added.

UPDATE, 11/30/18, 10:05 a.m. EDT: This story has been updated with an additional statement from Karin Janiszewski, spokeswoman for the Ohio Valley Health Services & Education Corp.

-In this Story-

cyber resilience, health care security, hospitals, incident response, ransomware
TwitterFacebookLinkedInRedditGoogle Gmail