What We Do
How we do it
Resources
SECURITY ADVISORIES
Oct 18, 2021
Grief Ransomware Gang Claims 41 New Victims, Targeting Manufacturers; Municipalities; & Service Companies in U.K. & Europe
Grief Operators Earned an Estimated 8.5 Million British Pounds in Four Months Key Findings: The Grief Ransomware Gang (a rebrand of the DoppelPaymer Ransomware Group) claims to have infected 41 new victims between May 27, 2021—Oct. 1, 2021 with their ransomware.Over half the companies listed on Grief’s underground leak site are based in the U.K. and Europe. The Grief Ransomware Gang appears to…
Read More
View all Advisories →
Company
ABOUT eSENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Oct 12, 2021
eSentire Launches MDR with Microsoft Azure Sentinel Extending Response Capabilities Across Entire Microsoft Security Ecosystem
Waterloo, ON – Oct. 12, 2021 -- eSentire, recognized globally as the Authority in Managed Detection and Response (MDR), today announced the expansion of its award-winning MDR services with Microsoft Azure Sentinel, as part of its integration with the complete Microsoft 365 Defender and Azure Defender product suites supporting Microsoft SIEM, endpoint, identity, email and cloud security services.…
Read More
Partners
PARTNER PROGRAM
Partners
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
PARTNER RESOURCES
Apply today to partner with the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Search
Resources
Blog — Sep 21, 2017

Cybercriminals strike the NHS, again

On August 25, Scotland’s third-largest National Health Service (NHS) trust was hit by malware, again. This is the second time within just months, after being one of the worst-affected during the global WannaCry ransomware attack in May. As a result, the trust is (again) requesting that patients do not attend the hospital unless it is “essential.”

The virus – which was later announced to be ransomware – began on a Friday afternoon with IT experiencing difficulties that affected hospitals and GP practices. The trust is responsible for the care of more than 650,000 people living in North and South Lanarkshire in Scotland, including three general hospitals and numerous GP surgeries, dentists, pharmacists and other services.

“When it comes to finding out which networks are vulnerable to attack, media coverage is one of the best sources.”

In some ways, this second attack is not surprising. After cybercriminals were successful in their attacks on the NHS with WannaCry, it makes sense that they would want to try again. Of course, that’s not to say that these are the same attackers. When it comes to finding out which networks are vulnerable to attack, media coverage is one of the best sources. Cybercriminals that heard about WannaCry’s success against NHS in the news could have decided to pursue them again.

The healthcare industry faces two major threats: ransomware and fraud. While fraud is a much bigger threat to tackle—seeing as it’s not as widespread or financially impactful—ransomware is getting more attention from regulatory bodies because of the larger impact it can have on the economy. And yet, the healthcare industry does not face the same stringent cybersecurity regulations that other industries do, which can put them at a disadvantage.

“While businesses may experience a loss of revenue if they are breached, hospitals can experience a loss of life.”

That’s not to say that hospitals aren’t sometimes an attractive target. Many of them were built and developed without cybersecurity in mind, and have been unable to adapt quickly enough to a changing security landscape, despite the fact that they have become completely Internet-connected infrastructures. Furthermore, if the primary delivery method of these threats is phishing and nearly every employee has access to the same confidential data—without sufficient security awareness training, it’s not surprising cybercriminals can break in.

Of course, the consequences hospitals face under cyberattack are particularly devastating. While businesses may experience a loss of revenue if they are breached, hospitals can experience a loss of life. Unfortunately, improving cybersecurity practices within the healthcare industry isn’t that simple. It’s important to recognize that hospitals run a 24x7 operation, which can make it harder for their IT teams to implement a policy around patching and software updates. They’re also publicly funded in the UK, which means they may feel they don’t have the resources they need to develop their cybersecurity department.

Nonetheless, there is much that hospitals can and should be doing. A report by the NHS Digital’s head of security was recently leaked, which stated there was a “false sense of security” among staff over cyberthreats. The report highlighted a range of security failings and found that:

With hospitals, the focus on cybersecurity has to come from the top. It is a holistic problem that requires holistic solutions. If a hospital doesn’t already have a CISO, appointing one should be the top priority. These individuals can define and develop risk mitigation strategies, and be an advocate for cybersecurity to the board of directors.

Fortunately, this is what is happening for the NHS. The Labour party has told Jeremy Hunt, Health Secretary, to take “urgent” action to prevent another devastating cyberattack on the NHS, including ensuring passwords are strengthened, data protections are tightened, and a full, independent inquiry is launched into the WannaCry attack.[1] The NHS is learning first hand from this experience not to mess with inadequate cybersecurity practices, and so should you.

Learn more

Today’s cyber-attackers are increasingly innovating and the threat landscape is constantly changing. Many healthcare organizations lack the resources and security measures needed to protect themselves.

[1]https://ca.news.yahoo.com/labour-calls-jeremy-hunt-apos-204955746.html

Viktors Engelbrehts
Viktors Engelbrehts Director, Threat Intelligence

Viktors and his team of researchers and intelligence analysts are committed to providing timely, high-quality intelligence analysis and industry insights.