Forum menu
NHS in large scale ...
 

[Closed] NHS in large scale IT shutdown

Posts: 251
Full Member
Topic starter
 
[#9323246]

Looks like they've taken the decision to shut down a large part of the NHS IT infrastructure to protect it from attack.

[url= https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack ]https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack[/url]

Try not to get sick for a few hours people 🙁


 
Posted : 12/05/2017 3:25 pm
Posts: 54
Free Member
 

beggars belief sometimes... what are the hackers trying to prove. !?^"%£^**


 
Posted : 12/05/2017 3:28 pm
Posts: 621
Free Member
 

tuskaloosa - Member
beggars belief sometimes... what are the hackers trying to prove. !?^"%£^**

Nothing, it's just the usual ransomware by the sound of it. Bloody annoying but it is fairly indiscriminate when it comes to targets. Some of it is very advanced in terms of avoiding detection as well.


 
Posted : 12/05/2017 3:32 pm
 DrP
Posts: 12116
Free Member
 

I hear from (cough) facebook GP groups (/cough) that some GP software servers are down too.

Not mine however. Singletrackworld and the Poke are what leads to naff productivity at my end...

DrP


 
Posted : 12/05/2017 3:33 pm
Posts: 251
Full Member
Topic starter
 

[img] [/img]

[img] [/img]


 
Posted : 12/05/2017 3:36 pm
Posts: 16175
Free Member
 

Yep all our systems have gone down

Just hope contingency allows clinical things to keep going. Major incident plans in action

Attack a bank etc is one thing, this could affect people's lives 🙁


 
Posted : 12/05/2017 3:36 pm
Posts: 35058
Full Member
 

bits of Blackpool and Blackburn effected AFAIK


 
Posted : 12/05/2017 3:36 pm
Posts: 7124
Full Member
 

Should have used Linux.


 
Posted : 12/05/2017 3:42 pm
Posts: 3608
Free Member
 

Ugh. I work in the IT dept of a local authority.
We had exactly the same last year. It was a massive pain in the arse, ended up using a similar strategy to that which it looks like they're using. Minimise attack surface, repair, slowly bring stuff back up in conjunction with AV supplier. Painful enough for a small authority, going to be hideous for the NHS 🙁


 
Posted : 12/05/2017 3:47 pm
Posts: 0
Free Member
 

The attackers probably aren't targeting the NHS specifically, there'll just be a script that goes around probing ports and then seeing if it can install the ransomware. The other possibility is that it was on a memory stick and only became activated if it found it was on a large network or similar trigger.


 
Posted : 12/05/2017 3:50 pm
Posts: 251
Full Member
Topic starter
 

BBC reporting:

[i]GPs are resorting to using pen and paper[/i]

read into that what you want.


 
Posted : 12/05/2017 3:51 pm
Posts: 28593
Free Member
 

GPs are resorting to using pen and paper

'Uh Oh! Your files have been encrypted. By indecipherable handwriting!

The other possibility is that it was on a memory stick and only became activated if it found it was on a large network or similar trigger.

The non joined-up nature of NHS IT is our greatest defence. 🙂


 
Posted : 12/05/2017 4:01 pm
Posts: 0
Free Member
 

Kind of the hackers to offer payment terms for the poor!


 
Posted : 12/05/2017 4:01 pm
Posts: 3608
Free Member
 

The attackers probably aren't targeting the NHS specifically, there'll just be a script that goes around probing ports and then seeing if it can install the ransomware. The other possibility is that it was on a memory stick and only became activated if it found it was on a large network or similar trigger.

As you say, I'd be very, very surprised if it was targeted. It's 'just' run of the mill, indiscriminate malware 🙁
I know if one that came in via email, was blocked, and then subsequently released, upon which the recipient opened it. At which point it identified attack surface, which are usually open file shares on servers, hops on to them, and propagates from there.

I await the Russian conspiracy theorists though. (And to be fair it's almost certainly of Russian origin)

There was a really interesting RadioLab about this last year as well.


 
Posted : 12/05/2017 4:04 pm
Posts: 23596
Full Member
 


 
Posted : 12/05/2017 4:07 pm
Posts: 0
Full Member
 

#nhsspendingonITendsinfailureshocker


 
Posted : 12/05/2017 4:09 pm
Posts: 0
Free Member
 

Re: memory sticks. Read up on [url= https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ ]Stuxnet[/url] which was the virus that attempted to destroy Iran's nuclear fuel enrichment program. Really, really targeted: it would only deploy if it found a particular version of certain firmware in a certain configuration. Basically they knew exactly what they were after. The above link is quite a long article but well worth reading.


 
Posted : 12/05/2017 4:09 pm
 MSP
Posts: 15842
Free Member
 

We have also been targeted today by ransomware affected emails, not NHS, so this could be part of a much larger ransomware attack.


 
Posted : 12/05/2017 4:10 pm
 TomB
Posts: 1659
Full Member
 

Affecting our local Dgh. No reporting on CT/xray/bloods. Handwritten triage and wristbands. It's distinctly possible that real patient harm will come from this attack due to the delays in diagnosis and treatment.


 
Posted : 12/05/2017 4:10 pm
Posts: 14110
Full Member
 

BBC reporting:

[b]GPs are resorting to using pen and paper[/b]

read into that what you want.

...then sent on to Bletchley Park to be decoded! 😀


 
Posted : 12/05/2017 4:11 pm
Posts: 251
Full Member
Topic starter
 

[i]#nhsspendingonITendsinfailureshocker[/i]

although for the most part they'll just be using commercial software the same as everyone else.

The issue with the NHS is that there's so much linked infrastructure that malware can propogate itself very quickly across a large number of sites.

It'll probably end up beign someone who brought a memory stick from home or went to dropbox to pick a file up.


 
Posted : 12/05/2017 4:15 pm
Posts: 251
Full Member
Topic starter
 

[img] [/img]


 
Posted : 12/05/2017 4:19 pm
Posts: 1048
Free Member
 

It'll probably end up being [strike]someone[/strike] a domain admin who brought a memory stick from home or went to dropbox to pick a file up.
Fixed.


 
Posted : 12/05/2017 4:21 pm
Posts: 251
Full Member
Topic starter
 

Telefonica telling employees to disconnect 'puters from networks.

[url= https://teiss.co.uk/2017/05/12/telefonica-ransomware-attack-employees-asked-pull-plug-computers/ ]https://teiss.co.uk/2017/05/12/telefonica-ransomware-attack-employees-asked-pull-plug-computers/[/url]


 
Posted : 12/05/2017 4:26 pm
Posts: 0
Free Member
 

The worst thing about all of this is that the banks could if they wished trace the route of the money.. but banking secrecy wins.


 
Posted : 12/05/2017 4:27 pm
Posts: 0
Free Member
 

GP software servers

Is that some sort of slave labour that GPs can afford on their £1,000,000 p.a. salaries?


 
Posted : 12/05/2017 4:30 pm
Posts: 2034
Full Member
 

Does anybody actually pay to this sort of demand?


 
Posted : 12/05/2017 4:31 pm
Posts: 0
Free Member
 

Yes.. in my experience.. lots do pay.


 
Posted : 12/05/2017 4:31 pm
Posts: 78487
Full Member
 

Does anybody actually pay to this sort of demand?

People with valuable data and no backups. It's the only way to get the data back. Think of it as an idiot tax.


 
Posted : 12/05/2017 4:39 pm
Posts: 45
Free Member
 

The worst thing about all of this is that the banks could if they wished trace the route of the money.. but banking secrecy wins.

Bitcoins?


 
Posted : 12/05/2017 4:40 pm
Posts: 3608
Free Member
 

Yes. Everyone from private businesses to local authorities to private individuals have paid.

Is be very surprised if the money could be traced, as the ransom demand will almost certainly be payable only via bitcoin.

Edit: beaten to it!


 
Posted : 12/05/2017 4:40 pm
Posts: 15555
Free Member
 

I don't know much about cyber security, but presumably this software is constantly prowling the net looking for vulnerable ports or whatever, so you'd expect the problem to be much more widespread unless they were slack with thier firewalls etc?

I suppose it's more likely a user with too many account privelidges unwittingly caused it?


 
Posted : 12/05/2017 5:09 pm
Posts: 23596
Full Member
 

Think of it as an idiot tax.

Dressed like that they were asking for it


 
Posted : 12/05/2017 5:19 pm
Posts: 621
Free Member
 

mattyfez - Member
I don't know much about cyber security, but presumably this software is constantly prowling the net looking for vulnerable ports or whatever, so you'd expect the problem to be much more widespread unless they were slack with thier firewalls etc?

I suppose it's more likely a user with too many account privelidges unwittingly caused it?

It is very widespread, there are a huge number of variants and there are new ones released constantly targeting new exploits.

I have seen the devastation ransomwhere caused at a biotech company, it was not pretty. And they were pretty shit hot on computer security. Unfortunately they also found out that day that some of their backups had been silently failing.


 
Posted : 12/05/2017 5:20 pm
Posts: 34535
Full Member
 

Strong and Stable eh?

May got a pasting from NHS staff calling in on LBC this morning too, she's lucky it wasn't after this...


 
Posted : 12/05/2017 5:22 pm
 MSP
Posts: 15842
Free Member
 

I think most ransomware comes from emails, not from hacking attacks. Humans are the weakest link in the security chain.


 
Posted : 12/05/2017 5:28 pm
Posts: 36
Free Member
 

I know of two companies affected by this.

1 reverted back to previous nights backup. Lost half a days work.

The other paid up and got a decryption key. It worked.

In one of the instances the culprit was a macro enabled word document e-mailed in. Downloaded and executed code from the internet on opening. It then encrypted every file on any share that was connected.

I feel for the NHS on this one. Going to be very painful to recover...


 
Posted : 12/05/2017 5:30 pm
Posts: 1048
Free Member
 

this software is constantly prowling the net
You make it sound so sinister.

MSP is correct. It (or they rather) just relies on the easiest attack vector. Dopey humans and their inbox. Someone runs the program they have been sent (cutest_kitten_EVER.jpg), and then it runs in the background encrypting any drives on your computer. Which in this case looks like someone with a high level of access to write to network shares.
.


 
Posted : 12/05/2017 5:32 pm
Posts: 7124
Full Member
 

Why aren't email clients sandboxed?

An email client needs to be able to [i]read[/i] files, and create [i]new[/i] files, but not [i]modify[/i] existing files. Along with any child processes.


 
Posted : 12/05/2017 5:40 pm
Posts: 78487
Full Member
 

Dressed like that they were asking for it

I didn't say they deserved it. Rather it's an eggs-and-baskets disaster waiting to happen.


 
Posted : 12/05/2017 5:42 pm
Posts: 1048
Free Member
 

Because it's not the email client executing the program. It's the user.

Which is why ransomware like this is hard to stop. People (and computers if we want to get technical) need to read, write and execute files to do their job.


 
Posted : 12/05/2017 5:46 pm
Posts: 78487
Full Member
 

Because it's not the email client executing the program. It's the user.

Quite. Sandbox emails - then what happens when a user gets an emailed spreadsheet, opens it, edits it and wants to save it to their Documents folder?

Which is why ransomware like this is hard to stop.

It's trivial to stop. Remove "execute" privileges from temp directories. You can do it organisation-wide via Group Policy in a few mouse clicks. (Ok, users can bypass this by saving the attachments elsewhere, but it'll stop most if not all double-click-oh-shit infections.)

Also effective but slightly more difficult: Remove rights to run unsigned code, and / or whitelist allowed apps for regular users.


 
Posted : 12/05/2017 6:21 pm
 MSP
Posts: 15842
Free Member
 

I think this may be using a SMB vulnerability rather than just a standard easily stopped executable.


 
Posted : 12/05/2017 6:26 pm
Posts: 0
Free Member
 

Meh - they have business continuity procedures, don’t they? Just use them. That’s what they are for.

Oh, they don’t you say? Well, somebody’s head should be on the block after this, then...

edit - for context, I used to work for a Pharma company, supplying the NHS. We were *required* to have business continuity procedures, and test them, before the NHS would even deal with us.

Rachel


 
Posted : 12/05/2017 6:28 pm
Posts: 78487
Full Member
 

It's still got to get in in the first place though.


 
Posted : 12/05/2017 6:29 pm
Page 1 / 7