Hackers Broke Into Hospitals Despite Software Flaw Warnings: Report

Advertisement
By Associated Press | Updated: 6 April 2016 17:13 IST
The hackers who seriously disrupted operations at a large hospital chain recently and held some data hostage broke into a computer server left vulnerable despite urgent public warnings since at least 2007 that it needed to be fixed with a simple update, The Associated Press has learned.

The hackers exploited design flaws that had persisted on the MedStar Health Inc. network, according to a person familiar with the investigation who spoke on condition of anonymity because this person was not authorized to discuss the findings publicly. The flaws were in a JBoss application server supported by Red Hat Inc. and other organizations, the person said.

The FBI, which is investigating, declined to discuss how the hackers broke in.

The JBoss technology is popular because it allows programmers to write custom-built software tools that can be quickly made available across a company, but security researchers discovered it was routinely misconfigured to allow unauthorized outside users to gain control. The US government, Red Hat and others issued urgent warnings about the security problem and a related flaw in February 2007, March 2010 and again earlier this week. The government warned in 2007 the problem could disrupt operations and allow for unauthorized disclosures of confidential information.

Advertisement

Fixing the problem involved installing an available update or manually deleting two lines of software code.

It was not immediately clear why the hospital chain, which operates 10 hospitals in Maryland and Washington including the MedStar Georgetown University Hospital, was still vulnerable years after those warnings. The new disclosure doesn't diminish the potential culpability of the hackers responsible for the break-in, but it reveals important details about how the crime unfolded. And it could affect MedStar's civil or administrative exposure under US laws and regulations that require health providers to exercise reasonable diligence to protect their systems.

(Also see:  Hospital Cyber-Attack Highlights Health Care Vulnerabilities)

MedStar's assistant vice president, Ann C. Nickles, said in a statement Tuesday to the AP that the company "maintains constant surveillance of its IT networks in concert with our outside IT partners and cyber-security experts. We continuously apply patches and other defenses to protect the security and confidentiality of patient and associate information." MedStar said Monday its systems "are almost fully back online," just over a week after the March 28 hacking. The company hired experts from Symantec Corp. to help investigate.

Advertisement

Nickles said Tuesday there was no evidence that patient or employee records were compromised.

MedStar said in a statement Friday evening to the AP that it would not provide details about how the attack occurred, and it criticized further media coverage of the case as perpetuating "the infamy of malicious attacks for airtime and publicity" and encouraging copycat hackers.

Advertisement

The MedStar hackers employed virus-like software known as Samas, or "samsam," that scours the Internet searching for accessible and vulnerable JBoss application servers, especially ones used by hospitals. It's the real-world equivalent of rattling doorknobs in a neighborhood to find unlocked homes. When it finds one, the software breaks in using the old vulnerabilities, then can spread across the company's network by stealing passwords. Along the way, it encrypts scores of digital files and prevents access to them until victims pay the hackers a ransom, usually between $10,000 and $15,000.

(Also see:  Why Hackers Are Going After Health-Care Providers)

If a victim hasn't made safe backups of files, there may be little choice except to pay, although MedStar has said it paid nothing. The hospital chain shut down its systems quickly after discovering the attack, limiting its impact to archives, some imaging and lab files and other duplicate records, according to the person with inside knowledge of the attack.

Advertisement

"This old issue is still somehow spread across Internet-facing servers," said Stefano Di Paola and Giorgio Fedon of Minded Security, an Italian security firm, in a joint statement to the AP. They discovered a related vulnerability in the servers in 2010 that Red Hat designated its highest priority to fix.

The FBI issued a flash message to companies days after the MedStar hacking, describing the dangers of samsam and asking for help detecting it and improving defenses against it. Days later, the Homeland Security Department issued a separate warning about samsam and another common ransomware strain, Locky, which tricks victims into opening email attachments to infect computers.

Cisco Systems Inc., which has studied the attacks, estimated there were about 2.1 million servers around the world vulnerable to samsam, although some may be additionally protected by other layers of security. It described the ransomware campaign as "proving to be a profitable affair."

"If you haven't patched your server, you're vulnerable, and it can compromise your server at 3 a.m. in the morning when no one's watching," said Craig Williams, a senior technical leader at Talos, Cisco's security research organization. "This is simply a case of people not following best practices and not applying patches for people to correct their systems."

Identifying the hackers and arresting them can be difficult. Tracing the scanning activity preceding an attack typically leads to other hacked computers; logs that might yield identifying clues can be manipulated or deleted and the samsam software is unusually self-sufficient and doesn't require hackers to control it after an infection. Ransoms are paid using hard-to-trace digital currency.

 

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. JioHotstar Announces Monthly Subscription Plans Across All Tiers
  2. Oakley Meta HSTN Smart Glasses Review
  3. Lava Blaze Duo 3 With a 1.6-Inch Rear Display Launched in India: See Price
  4. Arc Raiders Will Get Multiple New Maps This Year, Says Embark
  5. Here's How Much the Realme P4 Power Could Cost in India
  6. Infinix Note Edge Debuts With MediaTek Dimensity 7100 , 6,500mAh Battery
  7. Top Deals on iQOO 15, iPhone Air During Amazon Great Republic Day Sale
  8. Here's Why Asus is Reportedly Halting Its Smartphone Launches
  9. Samsung Galaxy S26 Ultra Colourways Spotted in Leaked SIM Tray Images
  10. Realme Neo 8 Key Specifications Confirmed Ahead of January 22 Launch
  1. Global RAM Shortage Is Reportedly Causing GPU, Storage Drive Prices to Skyrocket
  2. Viruses and Bacteria Evolve Differently in Space, ISS Study Finds
  3. Rockstar Games Said to Have Granted a Terminally Ill Fan's Wish to Play GTA 6
  4. Oppo K15 Turbo Series Tipped to Feature Built-in Cooling Fans; Oppo K15 Pro Model Said to Get MediaTek Chipset
  5. Samsung Galaxy Z Fold 8 Said to Feature Dual Ultra-Thin Glass OLED Panel to Reduce Crease Visibility
  6. Honor Magic 8 Pro Air Launched Alongside Honor Magic 8 RSR Porsche Design: Price, Specifications
  7. Realme Neo 8 Key Specifications Including 8,000mAh Battery, Ultrasonic Fingerprint Sensor Confirmed
  8. Astronomers Find Massive Iron-Rich Feature Lurking Under the Ring Nebula
  9. Asus Reportedly Halts Smartphone Launches ‘Temporarily’ to Focus on AI Robots, Smart Glasses
  10. JioHotstar Announces Monthly Subscription Plans Across Mobile, Super, and Premium Tiers
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.