Los Angeles Hospital Attack Concerns Cyber-Security Experts

Advertisement
By Associated Press | Updated: 19 February 2016 12:39 IST
Cyber-security experts worry that the $17,000 a Los Angeles hospital paid hackers to regain control of its computers could signal a troubling escalation of the growing "ransomware" threat.

Though patient care was not "compromised in any way," Hollywood Presbyterian Medical Center paid the bounty "in the best interest of restoring normal operations," President Allen Stefanek said in a written statement.

A typical attack starts when a person opens an emailed link or attachment. Malicious code locks the computer - or, worse, an entire network. Victims pay hackers for a "key" to unlock their machines - and may be desperate to do so if they have not diligently backed up their data and networks.

Advertisement

Many ransomware victims pay quietly, or abandon infected machines. It was unusual that Hollywood Presbyterian, which has more than 400 beds and is owned by CHA Medical Center of South Korea, both revealed the attack publicly and disclosed its cost.

Computer security experts said hospitals are particularly vulnerable because some medical equipment runs on old operating systems that cannot easily be safeguarded. If an employee opens an infected file from a computer that also connects with a patient monitoring station or insulin pump, those devices also could be locked.

Advertisement

Hospitals have not been as diligent in combating cyber threats such as ransomware as other sectors, according to several experts, despite the life-and-death nature of their operations, their tight control over patient information and mandates that they move toward electronic record keeping.

Hospitals are "about 10 to 15 years behind the banking industry" in combatting cyber threats, said Lysa Myers, a researcher with the computer security firm ESET.

Advertisement

The math behind whether to pay a ransom demand can be simple.

Paying thousands of dollars to resolve a serious attack that has penetrated a multimillion dollar business such as a large hospital would be "a no brainer," said James Carder, chief information security officer of LogRhythm, a security intelligence and analytics firm.

Advertisement

Several companies have told Carder that the FBI suggested they pay ransom, he said. Jason Haddix, the director of technical operations at the information security firm Bugcrowd, said companies also have told him the same.

"If you're at a point where you can't do anything," said Haddix, "sometimes the only option is to pay."

An FBI spokeswoman did not immediately respond when asked whether the FBI has in some cases suggested that a company pay. The agency said it is investigating the Hollywood Presbyterian case.

"Ransomware has been around for several years, but there's been a definite uptick lately in its use by cybercriminals," the FBI wrote in a 2015 post on its website. The agency said that it is "targeting these offenders and their scams."

Hollywood Presbyterian paid 40 bitcoins, a digital currency of floating value that on Thursday was worth about $420 each. The problem was first noticed Feb. 5, hospital president Stefanek said, and its system was fully functioning 10 days later.

One reason hackers are attracted to ransomware is that it can be created with relative ease - do-it-yourself ransomware kits are available - and the return on investment can be strong.

To launch a ransomware campaign that lasts one month might cost $5,900, and generate about $90,000 in revenue, according to projections by the cyber-security firm Trustwave.

A report from Intel Corp.'s McAfee Labs released in November said the number of ransomware attacks is expected to grow in 2016 because of increased sophistication in the software used to do it. The company estimates that on average, 3 percent of users with infected machines pay a ransom.

While a hacker may get several hundred dollars to unlock many individual computers, getting $17,000 is a decent payday. Based on the public confirmation of that figure, hackers are "going to begin to test the price," said Jack Danahy, chief technology officer at cyber-security firm Barkly.

The best defense against a ransomware attack is not to click on unknown links and attachments. Intrusion detection systems and firewalls can help if a person does click - but once the ransomware is entrenched, if the system does not have good system backup practices, the choices boil down to paying or never regaining control.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Motorola Edge 70 Pro Arrives With a 6,500mAh Battery at This Price in India
  2. Vivo X300 FE Roundup: Expected Price in India, Specifications
  3. Honor 600 Pro, Honor 600 Finally Debut With 7,000mAh Batteries: See Prices
  4. Sennheiser CX 80U, HD 400U With USB Type-C Connectivity Launched in India
  5. Boat Aavante Prime X Soundbar With Dolby Atmos Debuts in India
  6. GeForce Now Review:  Is Nvidia's High-End Cloud Gaming Service For You?
  1. Boat Aavante Prime X Soundbar Launched in India With Dolby Atmos, Wireless Satellite Speakers: Price, Features
  2. Qualcomm CEO Reportedly Visits Samsung Foundry in Korea to Discuss Producing 2nm Chips
  3. Coinbase Announces USDC-INR Trading Services for Users in India
  4. Redmi K Pad 2 Launched With 8.8-Inch 3K Display, Dimensity 9500 Chip: Price, Specifications
  5. OnePlus Watch 4 Launch Appears Imminent as Listing Confirms Snapdragon W5 Chip, OxygenOS Watch 8
  6. Sennheiser CX 80U, Sennheiser HD 400U With USB Type-C Connectivity Launched in India: Price, Features
  7. Elden Ring Film Adaptation Sets 2028 Release Date; Full Cast Revealed as Production Begins
  8. Honor 600 Pro and Honor 600 Launched With 7,000mAh Batteries, 200-Megapixel Cameras: Price, Specifications
  9. Scammers Offer Passage to Ships Stranded Near Strait of Hormuz in Exchange for Crypto: Report
  10. Apple's iOS 27, macOS 27 and iPadOS 27 Updates Will Introduce Stricter Network Security Settings
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.