Security challenges

Why is healthcare such a big target for ransomware?

Published on 16th Aug 2021

There has been a surge of new technology and applications into the healthcare industry. More data is being generated and shared than ever, creating opportunities to advance patient care through analytics and better access to vital information. With the rise of AI, cloud computing, robotics and connected devices, this trend won’t be slowing down.

However, technology isn’t safe unless it’s secure, and IT advances come with fresh cybersecurity risk. Huge amounts of sensitive and valuable healthcare data is stored in sometimes vulnerable systems, with vital equipment increasingly linked across the same networks. This makes healthcare organisations prime targets for one of the most dangerous cyber threats: ransomware.

How does ransomware work?

In a nutshell, ransomware works by locking users out of their systems and encrypting files, making them inaccessible. IT systems can be hacked, or as in over 90% of cases, the ransomware will be delivered via email phishing and set in motion by an innocent click from an insider. The hackers will provide a decryption key once a ransom has been paid.

This leaves affected healthcare organisations with a dilemma: they can pay the ransom (with no guarantee the criminals won’t steal data to blackmail them further) or spend time and resources rebuilding their IT system from scratch. Of course, any business can be hit by ransomware, but there are circumstances unique to the healthcare industry that makes it a major target.

What makes healthcare a target?

A cybercriminal’s goal is clear: they want the ransom to be paid. And the more important an organisation’s data is, the more leverage a hacker has. Healthcare data is highly sensitive, with a patient’s file containing everything needed for identity theft. Health records sell for a lot on the dark web – even more than financial data.

Cybercriminals are well-aware of the impact of locking down IT systems in healthcare organisations; they know that locking healthcare workers out of these vital systems can literally be a matter of life or death for patients. Public pressure is high for healthcare organisations to get sensitive records and systems safely under control. Criminal groups know there will be significant pressure for organisations to pay ransoms and get things back up and running as soon as possible.

The nature of healthcare organisations also plays into the hands of ransomware attacks. Typically, healthcare providers have older systems that are less able to deal with attacks than those in other industries. Technology and systems are more geared towards clinical safety and patient care than cybersecurity. For example, a state-of-the-art medical device may be incredibly safe and effective for use in surgery – but how secure is it from being hacked? Every pound that’s allocated to the cybersecurity budget means less money can be allocated to direct patient care.

Healthcare staff need to communicate often and quickly. Employees at all levels need to access and share sensitive data, often with temporary and contracted staff. Their first concern is always patient welfare, so cybersecurity is likely not top of mind for them. The personality type of most healthcare workers is caring and hardworking, so they can be tricked into clicking links/opening attachments that play on this psychology. All of this makes them prime targets for ransomware via email phishing.

Recent ransomware attacks

In 2017, the healthcare industry was given a stark warning about the risks of cybercrime. The NHS was hit by the WannaCry ransomware attack, compromising IT systems across the entire organisation. Vital systems were blocked, data was encrypted and made inaccessible, plus many appointments and surgeries had to be cancelled. The attack showcased just how vulnerable healthcare is to cybercrime. 

More recently in May 2021, the Health Service Executive (HSE) of Ireland was hit by a sophisticated ransomware attack. It was a zero-day attack, exploiting a previously unknown vulnerability and forcing HSE’s nationwide IT services to shut down. The attack had a significant impact on hospital appointments across Ireland, with many cancelled including all outpatient and radiology services. By June 2021, one-quarter of HSE’s IT servers had still not been decrypted, and 30% of its computers remained out of use.

The complex structures of healthcare organisations can make it hard to respond quickly and efficiently in the face of an attack. Technologies and attacks used by cybercriminals are always evolving, with new threats constantly emerging. This means the most effective defence is to stop ransomware at the point of entry.

How can healthcare organisations protect themselves?

With over 90% of ransomware delivered via email phishing, this is the stage where it’s so important to have effective defences. By preventing phishing emails from getting in front of healthcare workers, we can stop that all-important instance of insider error that brings an attack to fruition. We call this ‘killing the kill chain.’

Cybercriminals send phishing emails in the hope that healthcare employees will be too tired, stressed, or rushed off their feet to closely analyse them and spot social engineering tactics. Organisations therefore need technology that protects their human layer and lets healthcare workers concentrate on doing what they’re best at. Only truly intelligent anti-phishing solutions such as Egress Defend can even up the odds against cybercriminals.

Egress Defend uses natural language processing (NLP) and machine learning technologies to detect even the most sophisticated phishing attacks. It works unobtrusively in the background, detecting phishing attacks in real time and alerting users with a traffic-light based warning system. You can find out more about Egress Defend here, or see it in action for yourself with a no-strings-attached demo.

You might also be interested in ...

Security challenges
How to stop phishing becoming business email compromise

Don't let a phishing attack turn into business email compromise. Follow our guide on the actions to take if you ever find yourself the victim of phishing. 

Security challenges
5 Best Defenses Against Phishing Attacks

In this article, we'll explore what phishing is and the methods cybercriminals use to get their hands on sensitive data. Sharing our top tips to help prevent

Smishing Quishing Vishing Scams 555X300
Security challenges
What are smishing, vishing, and quishing scams?

You've heard of phishing - now learn about the scams that arrive via SMS, voice call, and QR code.