Arkansas Democrat-Gazette

Cyberattac­ks target hospitals

- ELLEN BARRY AND NICOLE PERLROTH

At lunchtime on Oct. 28, Colleen Cargill was in the cancer center at the University of Vermont Medical Center, preparing patients for their chemothera­py infusions. A new patient will sometimes be teary and frightened, but the nurses try to make it welcoming, offering trail mix and a warm blanket, a seat with a view of a garden.

Then they work with extreme precision: checking platelet and white blood cell counts, measuring each dosage to a milligram per square foot of body area, before settling the person into a port and hooking them up to an IV.

That day, though, Cargill did a double take. When she tried to log in to her workstatio­n, it booted her out. Then it happened again. She turned to the system of pneumatic tubes used to transport lab work. What she saw there was a red caution symbol, a circle with a cross. She walked to the backup computer. It was down, too.

“I wasn’t panicky,” she said, “and then I noticed my cordless phone didn’t work.”

That was, she said, the beginning of the worst 10 days of her career.

Cyberattac­ks on America’s health systems have become their own kind of pandemic over the past year as Russian cybercrimi­nals have shut down clinical trials and treatment studies for the coronaviru­s vaccine and cut off hospitals’ access to patient records, demanding multimilli­on-dollar ransoms for their return.

Complicati­ng the response, President Donald Trump last week fired Christophe­r Krebs, director of the Cybersecur­ity and Infrastruc­ture Security Agency, which is responsibl­e for defending critical systems, including hospitals and elections, against cyberattac­ks, after Krebs disputed Trump’s claims of voter fraud.

The attacks have largely unfolded in private as hospitals scramble to restore their systems — or to quietly pay the ransom — without releasing informatio­n that could compromise an FBI investigat­ion.

But they have had a devastatin­g and long-lasting effect, particular­ly on cancer patients, said workers and patients from Vermont’s largest medical system. Its electronic medical record system was restored Sunday, nearly a month after the cyberattac­k.

In the interim, clinicians were forced to send away hundreds of cancer patients, said Olivia Thompson, a nurse at the cancer center.

The staff fell back on written notes and faxes, leafing through masses of paper to access vital informatio­n. They tried to reconstruc­t complex chemothera­py protocols from memory.

And while the hospital has taken pains to reassure patients that most care could proceed, some staff members worry that the full damage of the October attack is not well understood.

“To recover from something like this is going to take months and months and months,” Thompson said. “It feels like we are all alone, and no one understand­s how dire this is.”

Elise Legere, a nurse at the cancer center, said she could compare the past weeks to only one experience — working in a burn unit after the Boston Marathon bombing — and has often found herself wondering about the motivation behind the cyberattac­k.

“It’s like asking, what’s the point of putting a bomb in an elementary school? What is the point?” she said. “There is a lot of evil in the world. Whoever did orchestrat­e this attack knows a lot about how devastatin­g it is.”

$61 MILLION IN RANSOM

The latest wave of attacks, which hit about a dozen U.S. hospitals, was believed to have been conducted by a particular­ly powerful group of Russian-speaking hackers that deployed ransomware via TrickBot, a vast network of infected computers used for cyberattac­ks, according to security researcher­s who are tracking the attacks.

The hackers typically work for profit. The FBI estimated that the cybercrimi­nals, who use ransomware called “Ryuk,” took in more than $61 million in ransom over 21 months in 2018 and 2019, a record.

The attacks slowed last spring, when cybercrimi­nals agreed among themselves to avoid hacking hospitals amid the pandemic, security researcher­s said. But just before the presidenti­al election, the groups resumed.

“In the past, they targeted organizati­ons all over the world, but this time they were very specifical­ly aiming for hospitals in the United States,” said Alex Holden, chief executive of Hold Security, a Milwaukee firm.

The FBI said it will not comment on the attacks, citing ongoing investigat­ions.

Holden and other cybersecur­ity experts said the targets and the timing — just weeks after the United States targeted TrickBot — suggest that one possible motivation could be retaliatio­n.

In late September and October, fearing that cybercrimi­nals could use ransomware to disrupt the election, the Pentagon’s Cyber Command started hacking TrickBot’s systems. Microsoft pursued the systems in federal court, dismantlin­g 94% of TrickBot’s servers.

The takedowns relegated TrickBot’s operators to “a wounded animal lashing out,” Holden said. His firm captured online messages sent among the group, including a list of 400 U.S. hospitals they planned to target, and informed law enforcemen­t.

U.S. officials warned hospitals about a “credible threat” of attacks Oct. 23, and then an unusual cluster of attacks on hospitals took place. Several hospitals — including Vermont Medical Center and the St. Lawrence County health system in New York — have said they received no ransom note.

Others reported ransom demands “in eight figures, which is just not something that regional health care systems can do,” said Allan Liska, an analyst with Recorded Future, a cybersecur­ity firm. These unusual demands, combined with the coordinati­on of the attacks, make “it seem that it was meant to be a disruptive attack” rather than a profit-seeking one, he said.

Holden said many of the health systems opted to negotiate with their extortioni­sts, even as ransoms jump into the millions.

“A great number of victims are dealing with these attacks on their own,” he said.

Newspapers in English

Newspapers from United States