The Reporter (Lansdale, PA)

As hospitals surge, cyber threats loom

- By Marion Renault and Wilson Ring

In late October, staff at the University of Vermont realized the phone system was down.

BURLINGTON, VT. » By late morning on Oct. 28, staff at the University of Vermont Medical Center noticed the hospital’s phone system wasn’t working.

Then the internet went down, and the Burlington-based center’s technical infrastruc­ture with it. Employees lost access to databases, digital health records, scheduling systems and other online tools they rely on for patient care.

Administra­tors scrambled to keep the hospital operationa­l — cancelling non-urgent appointmen­ts, reverting to pen-and-paper record keeping and rerouting some critical care patients to nearby hospitals.

In its main laboratory, which runs about 8,000 tests a day, employees printed or hand-wrote results and carried them across facilities to specialist­s. Outdated, internet-free technologi­es experience­d a revival.

“We went around and got every fax machine that we could,” said UVM Medical Center Chief Operating Officer Al Gobeille.

The Vermont hospital had fallen prey to a cyberattac­k, becoming one of the most recent and visible examples of a wave of digital assaults taking U.S. health care providers hostage as COVID-19 cases surge nationwide.

The same day as UVM’s attack, the FBI and two federal agencies warned cybercrimi­nals were ramping up efforts to steal data and disrupt services across the health care sector.

By targeting providers with attacks that scramble and lock up data until victims pay a ransom, hackers can demand thousands or millions of dollars and wreak havoc until they’re paid.

In September, for example, a ransomware attack paralyzed a chain of more than 250 U.S. hospitals and clinics. The resulting outages delayed emergency room care and forced staff to restore critical heart rate, blood pressure and oxygen level monitors with ethernet cabling.

A few weeks earlier, in Germany, a woman’s death became the first fatality believed to result from a ransomware attack. Earlier in October, facilities in Oregon, New York, Michigan, Wisconsin and California also fell prey to suspected ransomware attacks.

Ransomware is also partly to blame for some of the nearly 700 private health informatio­n breaches, affecting about 46.6 million people and currently being investigat­ed by the federal government. In the hands of a criminal, a single patient record — rich with details about a person’s finances, insurance and medical history — can sell for upward of $1,000 on the black market, experts say.

Over the course of 2020, many hospitals postponed technology upgrades or cybersecur­ity training that would help protect them from the newest wave of attacks, said health care security consultant Nick Culbertson.

“The amount of chaos that’s just coming to a head here is a real threat,” he said.

With COVID-19 infections and hospitaliz­ations climbing nationwide, experts say health care providers are dangerousl­y vulnerable to attacks on their ability to function efficientl­y and manage limited resources.

Even a small technical disruption can quickly ripple out into patient care when a center’s capacity is stretched thin, said Vanderbilt University’s Eric Johnson, who studies the health

impacts of cyberattac­ks.

“November has been a month of escalating demands on hospitals,” he said. “There’s no room for error. From a hacker’s perspectiv­e, it’s perfect.”

A ‘call to arms’ for hospitals

The day after the Oct. 28 cyberattac­k, 53-year-old Joel Bedard, of Jericho, arrived for a scheduled appointmen­t at the Burlington hospital.

He was able to get in, he said, because his fluiddrain­ing treatment is not high-tech, and is something he’s gotten regularly as he waits for a liver transplant.

“I got through, they took care of me, but man, everything is down,” Bedard said. He said he saw no other patients that day. Much of the medical staff idled, doing crossword puzzles and explaining they were forced to document everything by hand.

“All the students and in

terns are, like, ‘How did this work back in the day?’” he said.

Since the attack, the Burlington-based hospital network has referred all questions about its technical details to the FBI, which has refused to release any additional informatio­n, citing an ongoing criminal investigat­ion. Officials don’t believe any patient suffered immediate harm, or that any personal patient informatio­n was compromise­d.

But more than a month later, the hospital is still recovering.

Some employees have been furloughed until they can return to their regular duties.

Oncologist­s could not access older patient scans which could help them, for example, compare tumor size over time.

And, until recently, emergency department clinicians could take X-rays of broken bones but couldn’t electronic­ally send the images to radiologis­ts at other

sites in the health network.

“We didn’t even have internet,” said Dr. Kristen DeStigter, chair of UVM Medical Center’s radiology department.

The tech outage also delayed the reporting of about 50 coronaviru­s test results to the state, prompting the hospital to revert to a fax system for reporting results until its informatio­n technology problems are fixed, UVM Medical Center President Dr. Stephen Leffler said Thursday.

Soldiers with the state’s National Guard cyber unit have helped hospital IT workers scour the programmin­g code in hundreds of computers and other devices, line-by-line, to wipe any remaining malicious code that could re-infect the system. Many have been brought back online, but others were replaced entirely.

Col. Christophe­r Evans said it’s the first time the unit, which was founded about 20 years ago, has been called upon to perform what the guard calls “a real-world” mission. “We have been training for this day for a very long time,” he said.

It could be several more weeks before all the related damage is repaired and the systems are operating normally again, Gobeille said.

“I don’t want to get peoples’ hopes up and be wrong,” he said. “Our folks have been working 24/7. They are getting closer and closer every day.”

It will be a scramble for other health care providers to protect themselves against the growing threat of cyberattac­ks if they haven’t already, said data security expert Larry Ponemon.

“It’s not like hospital systems need to do something new,” he said. “They just need to do what they should be doing anyway.”

Current industr y reports indicate health systems spend only 4% to 7% of their IT budget on cybersecur­ity, whereas other industries like banking or insurance spend three times as much.

Research by Ponemon’s consulting firm shows only about 15% of health care organizati­ons have adopted the technology, training and procedures necessary to manage and thwart the stream of cyberattac­ks they face on a regular basis.

“The rest are out there f lying with their head down. That number is unacceptab­le,” Ponemon said. “It’s a pitiful rate.”

And it’s part of why cybercrimi­nals have focused their attention on health care organizati­ons — especially now, as hospitals across the country are coping with a surge of COVID-19 patients, he said.

“We’re seeing true clinical impact,” said health care cybersecur­ity consultant Dan L. Dodson. “This is a call to arms.”

 ??  ??
 ?? RYAN MERCER — UNIVERSITY OF VERMONT HEALTH NETWORK VIA AP ?? IT staff at the University of Vermont Medical Center in Burlington, Vt., work to scan thousands of the hospital’s computer systems for malware after an Oct. 28cyberatt­ack forced a shut down of the hospital’s electronic medical records system and other key systems.
RYAN MERCER — UNIVERSITY OF VERMONT HEALTH NETWORK VIA AP IT staff at the University of Vermont Medical Center in Burlington, Vt., work to scan thousands of the hospital’s computer systems for malware after an Oct. 28cyberatt­ack forced a shut down of the hospital’s electronic medical records system and other key systems.

Newspapers in English

Newspapers from United States