London NHS Crippled by Ransomware, Several Hospitals Targeted


London hospitals crippled by cyberattack! This incident highlights the growing threat of ransomware on healthcare systems worldwide.

London’s healthcare system, NHS (National Health Service), has been thrown into chaos after a crippling cyberattack disrupted operations and diverted emergency patients, affecting tens of thousands of patients.

According to reports, two London hospital trusts, Kings College Hospital Foundation Trust and Guy’s and St Thomas’ Hospitals Foundation Trusts have been forced to cancel all non-emergency operations and blood tests due to a “major” cyberattack occurring on 3rd June 2024.

The attackers targeted Synnovis, an outsourced lab service provider to NHS hospitals in South-East London, in what is believed to be a ransomware attack targeting its ICT systems. Synnovis supplies blood tests, swabs, and bowel tests for London NHS, serving patients across six London boroughs. 

Additionally, impacted hospitals include Guy’s Hospital, Evelina, Harefield Hospital, King’s College Hospital, Princess Royal University Hospital, Royal Brompton Hospital, St Thomas’ Hospital, and primary care services across South-East London.

The incident has significantly impacted the delivery of services, particularly blood transfusions and test results, and left hospitals unable to connect to the servers of the private firm providing their pathology services. GPs are advised to cancel non-emergency pathology appointments, while hospital staff are instructed to request emergency blood samples only for patients requiring transfusions.

Major London hospitals experienced significant disruptions, including postponed procedures and diverted emergencies. These disruptions put patients at risk, increased stress, and added strain on already stretched healthcare resources. The National Cyber Security Center is investigating the incident whereas, NHS England has declared it a level three incident, the 2nd highest alert level.

Expert Comment

Gerasim Hovhannisyan, CEO & Co-Founder, of EasyDMARC, commented on the incident and stressed the unfortunate and vulnerable state of the healthcare industry.

“Unfortunately, attacks against healthcare facilities are continuing to increase. Today’s outage in London is yet another reminder of the challenges healthcare systems face around the globe. As critical services stall, the impact on patient care and safety is clear, underlining the necessity for robust cybersecurity measures and detailed incident response plans,” said Gerasim.

“As healthcare systems become increasingly digitised, the risk of cyber attacks escalates, and their impact can be more significant. Aside from the need for more investment, the inevitability of cyber threats requires a proactive approach. It is no longer a matter of if, but when, a cyber attack will occur. As a result, healthcare providers must be prepared to maintain operations and protect patient safety even in the absence of digital systems. This level of preparedness is essential to safeguarding patients in the case of future attacks,” he concluded.

Sophos’ State of Ransomware 2024 and Healthcare

The attack has indeed highlighted the vulnerability of hospitals to ransomware attacks, which is a growing cause of concern within the UK. According to Sophos’ State of Ransomware 2024 report, around 63% of UK healthcare organizations experienced ransomware attacks in 2023, with secure access for remote users being the top perceived cybersecurity risk.

The report revealed that the average ransom payment increased 500%, with organizations paying an average of $2 million, up from $400,000 in 2023. 63% of ransom demands were for $1 million or more, with 30% for over $5 million with exploited vulnerabilities being the most commonly identified root cause for these attacks.

The findings and the recent ransomware attack on London NHS highlight the need for robust cybersecurity measures in healthcare institutions. Hospitals should prioritize cybersecurity investments, implement advanced security solutions, and train staff on best practices to prevent such attacks.





Source link