NHS cyber-attack: GPs and hospitals hit by ransomware

Anything not relating to the X-Universe games (general tech talk, other games...) belongs here. Please read the rules before posting.

Moderator: Moderators for English X Forum

greypanther
Posts: 7307
Joined: Wed, 24. Nov 10, 20:54
x3ap

NHS cyber-attack: GPs and hospitals hit by ransomware

Post by greypanther » Fri, 12. May 17, 21:53

I think this needs its own thread, avoid accident and emergency, at the moment. Maybe avoid hospitals altogether?

Link.
NHS services across England and Scotland have been hit by a large-scale cyber-attack, which is being treated as a major incident.

The prime minister said the incident was part of a wider attack affecting organisations around the world.

Some hospitals and GPs cannot access patient data, after their computers were locked by a malicious program demanding a payment worth £230.
Worldwide.
A massive ransomware campaign appears to have infected a number of organisations around the world.

Computers in thousands of locations have apparently been locked by a program that demands $300 (£230) in Bitcoin.

There have been reports of infections in more than 70 countries, including the UK, US, China, Russia, Spain, Italy and Taiwan.

Many security researchers are linking the incidents together.
A seemingly concerted, coordinated attack, but by whom?

At least it has not affected the resource distribution network. How many meals are we away from anarchy again? :roll:

How long will it take to sort this out I wonder...
Pray that there's intelligent life somewhere up in space
'Cause there's bugger all down here on Earth

Dantrithor
Posts: 1752
Joined: Mon, 3. Jul 06, 19:29
x3tc

Post by Dantrithor » Fri, 12. May 17, 22:04

It is worldwide and severe. In my company (Software development, consulting) we are in lockdown. Our VPN's have been disabled, and we are forbidden from working due to risk from infection from outside sources and from clients.

User avatar
Morkonan
Posts: 10113
Joined: Sun, 25. Sep 11, 04:33
x3tc

Post by Morkonan » Fri, 12. May 17, 22:07

There's a huge influx of ransomeware attacks going on right this moment, many derived from NSA leaked documents describing vulnerabilities and strategies used to exploit them. Many are due to networks that have systems which have not been patched and included network snoop additions to these viruses actively hunt out connected, local, networked systems to exploit. (Admins can sometimes be slow to update, often due to legitimate reasons or underfunded/understaffed IT departments and partners charged with keeping this and their other, mission critical, software working together well.)

Consider these recent issues a hand-grenade going off in the network - As soon as one system gets infected, it exposes the entire network to an attack that examines all connected machines for vulnerabilities and then installs the payload on them, no matter if they have permission to connect to the internetz or not. (ie: As long as the machine is networked, it can be held for ransom, even if it, currently, doesn't have access to an internet gateway. It can't hide...)

korio
Moderator (Español)
Moderator (Español)
Posts: 891
Joined: Sat, 29. Sep 07, 18:25
x4

Post by korio » Fri, 12. May 17, 22:23

On Spain the biggest telecom company (Movistar) was hit today with the ransomware.

I have a cousin working there and at 10:00 AM over the company speakers they told to people to directly shut down all the computers.

I have other mails that the other big company's are shutting down all their public stuff like helpdesk mail addresses and such.

I am IT staff where i work, and we are only 3 people to cover all the spain division of the company, around 200 computers, laptops and servers.

All i could do today was to push the lastest updates in our WSUS server and hope to find everything fine this monday, fingers crossed.

Alan Phipps
Moderator (English)
Moderator (English)
Posts: 30435
Joined: Fri, 16. Apr 04, 19:21
x4

Post by Alan Phipps » Fri, 12. May 17, 22:25

@ greypanther: It cannot be such a coordinated and sophisticated attack after all if it deliberately targets an NHS that is already underfunded. There is no way that government assistance would subsidise or accede to such things and I am sure that the people behind the attacks would know that.

I suspect this is just an opportunist widespread assault that just targets and exploits security weaknesses and poor user practices wherever it can find them.
A dog has a master; a cat has domestic staff.

greypanther
Posts: 7307
Joined: Wed, 24. Nov 10, 20:54
x3ap

Post by greypanther » Fri, 12. May 17, 22:32

You are probably right Alan, I can see your logic, but wonder at the motives anyway. :P

The NHS may have just been collateral damage too and not the actual target. I have read that Australia has not been attacked, so maybe it is some Aussie network attack thing. After all, the rest of Australia is out to kill, so why not their section of the internet? :roll:

As I tried to imply, this should be a heads up as to just how vulnerable our societies systems really are. How many days will it take to sort this out? It is lucky other systems have not been affected.

Edit: There is also this, from the BBC, which shows how serious things are, intent or not:
An anonymous NHS staffer tells us:

"Absolute carnage in the NHS today. Two Hyperacute stroke centres (the field I work in) in London have closed as of this afternoon. Patients will almost certainly suffer and die because of this.

"Had a patient that needed urgent neurosurgery referred, but unable to look at scans - stroke care is absolutely dependent on IT systems and joined up systems."
Last edited by greypanther on Sat, 13. May 17, 15:21, edited 1 time in total.
Pray that there's intelligent life somewhere up in space
'Cause there's bugger all down here on Earth

User avatar
Terre
Moderator (English)
Moderator (English)
Posts: 10492
Joined: Mon, 19. Dec 05, 21:23
x4

Post by Terre » Fri, 12. May 17, 22:49

The UK government is looking to consolidate all of it's services and databases, where this kind of breach could wide spread damage.
Open Rights Group - Is your site being blocked
Electronic Frontier Foundation - Online Censorship
The Linux Foundation - Let’s Encrypt
Check if your Email account has been pwned

pjknibbs
Posts: 41359
Joined: Wed, 6. Nov 02, 20:31
x4

Post by pjknibbs » Sat, 13. May 17, 07:14

greypanther wrote:
An anonymous NHS staffer tells us:

"Absolute carnage in the NHS today. Two Hyperacute stroke centres (the field I work in) in London have closed as of this afternoon. Patients will almost certainly suffer and die because of this.

"Had a patient that needed urgent neurosurgery referred, but unable to look at scans - stroke care is absolutely dependent on IT systems and joined up systems."
Well, maybe they should consider upgrading from Windows XP, which I believe is still used in 70% of hospitals... :roll:

User avatar
red assassin
Posts: 4613
Joined: Sun, 15. Feb 04, 15:11
x3

Post by red assassin » Sat, 13. May 17, 11:47

pjknibbs wrote:Well, maybe they should consider upgrading from Windows XP, which I believe is still used in 70% of hospitals... :roll:
With what money? That's always been the problem. This has been inevitable for a while, but they're not exactly flush with cash at the moment. Without a kick in the pants like this, the budget was never going to get allocated - management and political bosses never see IT as anything other than a cost to be minimised. When finally confronted with the cost of not paying for IT, the immediate response is generally "well why didn't you tell me this was a problem".
A still more glorious dawn awaits, not a sunrise, but a galaxy rise, a morning filled with 400 billion suns - the rising of the Milky Way

Avis
Posts: 4400
Joined: Wed, 6. Nov 02, 20:31
x2

Post by Avis » Sat, 13. May 17, 16:12

pjknibbs wrote:Well, maybe they should consider upgrading from Windows XP, which I believe is still used in 70% of hospitals... :roll:
The problem really stems from public sectors (not just NHS) inability to negotiate a discount for bulk buying IT equipment. in fact it's alarming just how much of a markup everything seems to carry because the buyer is using the credit card from the bank of magic money.

Memnoch
Posts: 548
Joined: Wed, 6. Nov 02, 20:31

Post by Memnoch » Sun, 14. May 17, 01:37

I work in HE and we get very good discounts on Dell kit. However with the closure of SBS everything got thrown into the air. It used to be straightforward but it took us months to buy some Apple kit that I could wander in to town and buy immediately. Crown Commercial Services are who we have to go through now and its proving to be painful to say the least.

User avatar
philip_hughes
Posts: 7757
Joined: Tue, 29. Aug 06, 16:06
x3tc

Post by philip_hughes » Sun, 14. May 17, 16:12

I have software running pretty much all the time. Got an email from uni staying because of the latest problems my pc was patched and restarted over the weekend. This is a major nuisance.
Split now give me death? Nah. Just give me your ship.

User avatar
felter
Posts: 6981
Joined: Sat, 9. Nov 02, 18:13
xr

Post by felter » Sun, 14. May 17, 16:34

While this is a bad thing, it is also a good thing though some are still not taking their security seriously. Wannacry is a pretty bad thing that does not work like a conventional virus, as it does not require you to activate it instead it is prowling around the internet looking for vulnerable unpatched and unprotected computers, servers and networks. Once it finds one it infects it and moves on to finding its next victim.

To show just how serious this is being taking, Microsoft have reportedly even released a patch for win xp (can't confirm this) to protect against it, but it is no good if people do not patch their computers, which a lot of people do not do. So if you are running any window system other than win 10, you need to patch your computer right now using the update function, don't know how to do that just type update into the run box and it should give you the option to do a windows update.

I hate to scare monger, but even if you think you are safe as you don't visit any funny websites, or open any links in emails, or whatever makes you feel safe. It doesn't matter, just connecting to the internet can make you unsafe if you are reading this, then you are a potential victim. So make sure you are patched up and are running a good quality av and firewall, that are regularly updated at least once a day.
Florida Man Makes Announcement.
We live in a crazy world where winter heating has become a luxury item.

User avatar
OmegaKnight
Posts: 517
Joined: Mon, 7. Nov 05, 19:31
x3tc

Post by OmegaKnight » Sun, 14. May 17, 17:19

well windows update isn't going to work on older versions of windows,
so:
link to Microsoft Security Bulletin MS17-010

and the KB4012598 patch

you might also want to:
Filter all SMB (TCP/445), NetBIOS (TCP/139), and RDP (TCP/3389)

Memnoch
Posts: 548
Joined: Wed, 6. Nov 02, 20:31

Post by Memnoch » Sun, 14. May 17, 19:01

philip_hughes wrote:I have software running pretty much all the time. Got an email from uni staying because of the latest problems my pc was patched and restarted over the weekend. This is a major nuisance.
The alternative is worse though. Imagine if you were the one that caused an outbreak at your institution?

Besides, don't you have servers your can run your processes on instead?

User avatar
Morkonan
Posts: 10113
Joined: Sun, 25. Sep 11, 04:33
x3tc

Post by Morkonan » Sun, 14. May 17, 21:27

Just a note:

I hear that the currently distributed Wannacry ransomware needs to contact an unregistered domain. A young security researcher in the UK figured this bit out and then registered the domain for $11... aaaaand - Problem solved. :) It effectively shut down a large part of this problem, though sleepers may wake up on Monday, causing a short reignition of the issue on unpatched machines.

I wouldn't be surprised if it starts calling backup domains, irc channels or all the other standard bot reporting protocols. But, at least there is a small victory in this particular war.

On legacy systems: Plenty of government agencies, local, state, federal, still run outdated O.Ss and they either don't have the money to make the conversion to newer, more secure, O.S.s or, frankly, do not see a pressing need. Large institutions that see their networks and the services they provide as more of a "burden" on their standard infrastructure also seem to have a tendency to lag behind.

Nobody wants to orphan their favorite (or really expensive)... whatever, due to the "nuisance" of having to keep their systems secure from "chance" attack.

User avatar
red assassin
Posts: 4613
Joined: Sun, 15. Feb 04, 15:11
x3

Post by red assassin » Mon, 15. May 17, 01:14

There's been samples around for a few days that don't have the callback to that hardcoded domain. Sadly it's not as simple as "register domain, fix problem". This is going to carry on being an issue until people figure out how to patch.
A still more glorious dawn awaits, not a sunrise, but a galaxy rise, a morning filled with 400 billion suns - the rising of the Milky Way

User avatar
felter
Posts: 6981
Joined: Sat, 9. Nov 02, 18:13
xr

Post by felter » Mon, 15. May 17, 02:18

Morkonan wrote:Just a note:

I hear that the currently distributed Wannacry ransomware needs to contact an unregistered domain. A young security researcher in the UK figured this bit out and then registered the domain for $11... aaaaand - Problem solved. :) It effectively shut down a large part of this problem, though sleepers may wake up on Monday, causing a short reignition of the issue on unpatched machines.
And shortly after he did this, someone released version 2 that did not have that kill switch in it.

I originally thought it had to be a mistake, that someone had released it by accident, because of the amount of damage it was doing and the potential for it to kill people, but when someone releases it again after it was closed down, means it was not done by accident. Something tells me this is a terrorist attack and not some criminal organization that is behind it, either way they will be traced, there will be a massive digital fingerprint pointing right at them. If it is a crook, they will be going to jail over this.
Florida Man Makes Announcement.
We live in a crazy world where winter heating has become a luxury item.

User avatar
philip_hughes
Posts: 7757
Joined: Tue, 29. Aug 06, 16:06
x3tc

Post by philip_hughes » Mon, 15. May 17, 07:14

Memnoch wrote:
philip_hughes wrote:I have software running pretty much all the time. Got an email from uni staying because of the latest problems my pc was patched and restarted over the weekend. This is a major nuisance.
The alternative is worse though. Imagine if you were the one that caused an outbreak at your institution?

Besides, don't you have servers your can run your processes on instead?
99.9% of the time I don't need internet. I propose just doing stuff on an unconnected pc, periodically connecting it when I need to.

This reply was sent on the machine I propose to disconnect. :P
Split now give me death? Nah. Just give me your ship.

User avatar
Morkonan
Posts: 10113
Joined: Sun, 25. Sep 11, 04:33
x3tc

Post by Morkonan » Mon, 15. May 17, 07:34

On the subject of the re-release..

I heard the "fix" this morning. And, as several have said, it's back in the wild with a new set of legs... Things like this can change so fast that it's hard to keep up. :) Which is surely the intention. :(

If anyone makes enough noise, they likely to get caught. The successful ones prey in the shadows or pounce once and then lay low for awhile. Whoever is doing this isn't, in my opinion, too darn smart. A hand-grenade goes off in a field somewhere, nobody cares too much. But, if someone throws a hand-grenade into a nunnery.... for profit...

Stealing data, military secrets, commercial databases, etc, all those things are a little bit "removed" from most common, civilian, users. But, waking up in the morning to "Give me $300 or your computer files get shot in the head" is up-front-and-personal.

Conficker ransomware... :/

Depending upon how deep this hole goes on Monday+, we may start to see some "kneejerk legislation" get started. That sort of thing is almost worst than the darn ransomeware. :/

Post Reply

Return to “Off Topic English”