Boardman, OH-based N.E.O Urology has experienced a severe ransomware attack that has impacted its entire IT system. The ransomware caused widespread file encryption and locked the healthcare provider out of its computers and patient records.
While the attack was sophisticated, the notification was not. The healthcare provider was sent a fax from the attackers which demanded a $75,000 ransom payment for the keys to unlock the encryption.
N.E.O Urology contacted its IT service provider and after assessing options and the risks, the decision was taken to pay the ransom. The IT service provider made contact with the attackers through a third party and the ransom was paid to obtain the keys to unlock the encryption. Even with the decryption keys, it took the medical practice three days to restore its computer systems due to the severity of the attack and extent of the encryption. The initial investigation suggests the attackers were based in Russia.
Payment of a ransom is not without risk. The attackers may not be able to unlock files or may choose not to do so even after the ransom is paid. The FBI’s advice is never to pay the ransom as it just encourages further attacks. However, when data cannot be recovered by any other means, there may be little choice other than payment of the ransom. N.E.O Urology informed the police department that as a result of the lack of access to its computers it was losing between $30,000 and $50,000 per day.
Ransomware attacks significantly declined throughout 2018, but in Q1, 2019 there was a major uptick in attacks. Ransomware attacks increased 195% in Q1, 2019, according to Malwarebytes. More than 70% of those attacks were on small businesses. Healthcare organizations are an attractive target due to their need to have constant access to databases and patient records and are commonly attacked, much more than other industry sectors.
The inability to restore files from backups and the refusal to pay a ransom can have severe consequences. Earlier this year, Brookside ENT and Hearing Center was attacked and patient records were encrypted. After refusing to pay the ransom, the attackers deleted all the encrypted files. Faced with having to rebuild the practice from scratch, the owners chose early retirement and closed the practice.
To ensure you are not left at the mercy of cybercriminals, it is essential to adopt a robust backup strategy that sees multiple backup copies created, with one copy stored off-site in a secure location on a non-networked device and to test your backups to make sure that file recovery is possible in the event of an attack.
The post Urology Practice Pays $75,000 Ransom to Regain Access to Computer Systems appeared first on HIPAA Journal.