NHS ransomware attack: Pointing the finger of blame at UK government #WannaCry

By May 15, 2017Bitcoin Business
Click here to view original web page at www.biznews.com

EDINBURGH: The NHS ransomware cyber-attack was preventable, says a cyberwarfare researcher with the University of Birmingham. Conor Deane-McKenna argues that the government is to blame for allowing criminals to enter National Health Service computer systems through a Microsoft flaw. Patients have been urged to use the NHS “wisely” as it discovers the full impact of a global cyber-attack that started at the end of last week. The BBC has reported warnings from NHS England that there is a “complex emerging picture” amid concerns over thousands of computers being switched back on after the weekend. Seven trusts out of 47 that were hit are still facing serious issues, said the national broadcaster at the beginning of the week. The virus, known as Wanna Decryptor or WannaCry, hasn’t only hit NHS equipment in England and Scotland – it is believed to have infected at least 200,000 machines in 150 countries since Friday. Deane-McKenna highlights Freedom of Information research last year that indicated that 42 of 48 NHS trusts were using outdated technology. – Jackie Cameron

File 20170513 3675 1wlq6e4
DD Images/Shutterstock

By Conor Deane-McKenna*

In a matter of hours, the NHS was effectively placed on lockdown with computer systems being held ransom and further machines powered down to prevent the spread of malware. Critical patient information has been inaccessible and several hospitals urged people to avoid accident and emergency departments, except in cases of real emergencies.

Ransomware is the form of computer malware that has infected the NHS. Typically, it encrypts user information and then demands payment before unlocking the information. In this case the ransomware demands a fee of US$300 (£230) payable in the crypto-currency, bitcoin, allowing the perpetrators a degree of anonymity.

British law enforcement have called it a criminal attack rather than one orchestrated by a foreign state. The British public can take some small comfort in this; criminal organisations are not as well funded and the malware may be easier to remove without the loss of patient files. It is too early to say categorically who is responsible for the attack though it is certainly the most devastating cyber-attack on British infrastructure ever.

NHS Digital has told Sky News NHS England trusts were sent details of security patch last month that would have prevented ransomware attack

— Sky News Newsdesk (@SkyNewsBreak) May 15, 2017

But it is not just British infrastructure that has been affected by the ransomware. The Spanish telecommunications firm, Telefonica, was also attacked. There have also been a large number of other suspected attacks, notably in Germany, the Philippines, Russia, Turkey and Vietnam. A total of 99 countries have suffered from this attack so far. Whether this is as a result of a larger international criminal organisation is still unknown, however, the rapidity with which the infections are spreading is very concerning.

The attackers’ motive is perhaps clear: financial gain. Though if one looks beyond the relatively small demands of the ransomware, there is something larger at play here. Cyber-criminals will often boast of their exploits to others to gain a level of prestige among their peers. So, while we can often see money as the primary driver for this kind of attack, there may be other motives that will remain hidden.

People in the UK have been advised to avoid accident and emergency departments unless absolutely necessary.

Out-of-date systems and lack of training

The question of how this could have happened will be one that will produce several damaging reports outlining poor training and infrastructure. It has been clear for years that various NHS trusts have been lagging behind with upgrading their systems.

In 2016, Motherboard submitted Freedom of Information Act requests to 70 NHS hospitals, inquiring as to the number of machines owned that were still running Windows XP. An alarming 42 out of 48 respondents stated they still worked with machines using XP. This is made far more concerning by the official end of Microsoft support for Windows XP in April 2014. While funding to ease the changeover through extended support and eventual move to a more modern operating system was made available, there are still many NHS computers running Windows XP. This is putting the safety and privacy of patients at risk.

In a normal election, the revelation that the government could have prevented the NHS ransomware attack, would destroy Tory chances.

— Keith Kahn-Harris (@KeithKahnHarris) May 15, 2017

The UK government could improve this by providing better training. It is not immediately obvious to anyone that accessing personal information, such as emails, Facebook or Twitter, can have potentially damaging consequences. Opening a document from a friend, or a link through Facebook can be devastating if proper codes of conduct are not put in place. Something as simple as bringing in a USB (thumb drive) from your home to transfer large files from one computer to another could have the same effect, if the USB has been infected.

Modern anti-virus software and up-to-date operating systems can only do so much. It is therefore vital to invest more in cyber-security training for all staff working with sensitive information. This attack proves that the UK’s cybers-ecurity policy needs further work.

For a deeper understanding of the world of money and greater financial control, upgrade to BizNews Premium.

Leave a Reply

All Today's Crypto News In One Place