Ransomware and Healthcare Institutions
Ransomware is malware that, when downloaded and run on a computer, encrypts the victim’s files and then demands payment to restore access. Ransomware messages often claim that unlicensed software, child pornography or other illegal content has been detected on the computer and demand a fee in order to unlock the victim’s data. Other variants, like NotPetya, leverage Windows security holes to access and infect systems without user intervention.
Whether a victim’s data is encrypted or not, if a ransom is paid, the attackers are often uninterested in providing a decryption key that actually works. In fact, the criminals behind ransomware aren’t in the file recovery business; they are in the moneymaking business. They will take the ransom and then invest the funds in developing newer, more nefarious strains of ransomware to target new victims.
The ransom demand is typically in the form of cryptocurrency, most commonly Bitcoin. This makes it difficult to trace the payments and enables the cybercriminals to avoid detection. In addition, some ransomware will detect the country in which a computer is running and adjust the price to match the local economy.
Healthcare institutions are particularly vulnerable to ransomware attacks. Hackers know that these organizations contain sensitive information such as patient records, insurance information, research data and personal identification information. Attacks can disrupt operations and threaten a healthcare facility’s ability to provide care.
The FBI, Department of Homeland Security and other agencies help victims recover from ransomware attacks by providing decryption keys and other assistance. Unfortunately, the number of ransomware incidents is rising. The 2023 X-Force Threat Intelligence Index reports that the average attack timeline shrunk from 2 months to just 4 days, leaving defenders with little time to prevent an infection.