Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy Security United States

Healthcare Giant UHS Hit By Ransomware Attack, Sources Say (techcrunch.com) 19

Universal Health Services, one of the largest healthcare providers in the U.S., has been hit by a ransomware attack. "Looks like another case of ransomware at over 400 hospital locations," writes Slashdot reader nickwinlund77. "They've had to go back to pen & paper for handling forms." TechCrunch reports: The attack hit UHS systems early on Sunday morning, according to two people with direct knowledge of the incident, locking computers and phone systems at several UHS facilities across the country, including in California and Florida. One of the people said the computer screens changed with text that referenced the "shadow universe," consistent with the Ryuk ransomware. "Everyone was told to turn off all the computers and not to turn them on again," the person said. "We were told it will be days before the computers are up again."

It's not immediately known what impact the ransomware attack is having on patient care, or how widespread the issue is. UHS published a statement on Monday, saying its IT network "is currently offline, due to an IT security issue." "We implement extensive IT security protocols and are working diligently with our IT security partners to restore IT operations as quickly as possible. In the meantime, our facilities are using their established back-up processes including offline documentation methods. Patient care continues to be delivered safely and effectively," the statement said. "No patient or employee data appears to have been accessed, copied or otherwise compromised," it added.

This discussion has been archived. No new comments can be posted.

Healthcare Giant UHS Hit By Ransomware Attack, Sources Say

Comments Filter:
  • by fahrbot-bot ( 874524 ) on Monday September 28, 2020 @04:10PM (#60551764)

    They've had to go back to pen & paper for handling forms."

    It's not that difficult to hand-stamp "Denied" on everything, just (even) slower than having their computers do it automatically.

    • It is better for morale when they can just claim the 'computer denied you' and give you a blank stare.

      Now they sort of have to empathize with you and give you a sad look.
    • Re:Ya, but (Score:5, Interesting)

      by thecombatwombat ( 571826 ) on Monday September 28, 2020 @06:13PM (#60552044)

      UHS is not an insurance company. UHS runs hospitals and provides services. They don't get paid when things get denied, their motivations are exactly the opposite.

      You might be confusing them with UnitedHealth Group, or UHG.

      Ironically, the evils UHS might do are things like prescribing unnecessary treatment, committing the mentally ill as dangerous when they are not, and billing for procedures they did not do. If anything, the big insurance companies not wanting to pay them, are one of the best defences their would be victims have.

  • by JeffOwl ( 2858633 ) on Monday September 28, 2020 @04:39PM (#60551826)
    You dumb MF-ers who keep paying these bastards. Stop it. Recover best as you can without paying the criminals, learn your lessons, invest in security, training, and backup infrastructure, and move on.
    • You dumb MF-ers who keep paying these bastards. Stop it. Recover best as you can without paying the criminals, learn your lessons, invest in security, training, and backup infrastructure, and move on.

      Ain't no stakeholder at UHS going to allow their quarterly profits to be wasted on training and infrastructure.

  • This company deserves to be held hostage. They have a horrific pay scale and outsource as much as possible to India. They arent supposed to be outsourcing PHI/PII data to India and have been fined for doing so but they continue the practice. I hope more of the companies data is encrypted and that they stop hiring substandard IT people to do the work for them. Crap company and they deserve every bit of damage.
  • Are you paid to silence which operating system was impacted by the attack?

  • How can huge numbers of systems get rooted while concurrently statements like "No patient or employee data appears to have been accessed, copied or misused." always seem to make their way into these sorts of public announcements?

    How would they know?

    • I don't know how they know for sure because I do not know their systems. However, it is not a big stretch to imagine that the compromise was the result of an "unintentional insider." That is someone clicked a link in an email, downloaded a file, plugged in a USB drive they found in the parking lot, whatever. So it may be the internal systems were pwned but the perimeter security was more bypassed than broken so they may actually have traffic logs and some idea that no massive quantities of data were pushed
      • I'm pretty sure encrypting files on a system containing patient data would be considered "compromised" by most people, whether or not the data has been moved out of their network or not. So, their statement seems duplicitous at best.
  • I mean it. One woman has already died in hospital due to these bastards. Why can't anyone figure out how to apprehend these scum? If they are found to have ransomwared a hospital, the penalty is death. It's not funny.

    • When Fancy Bear does their job, working with GRU (Russian intelligence), who exactly is going to arrest them? Is their boss going to arrest them for doing their job?

      Several countries have no effective government at all, and other places the government ranges from pure warlords to former warlords who have matured into perfectly corrupt governments, where "aw enforcement doesn't really exist in the way it does in the US - government workers are just the people you bribe for whatever you need.

      In the US you mi

    • Comment removed based on user account deletion
  • by Cyberax ( 705495 ) on Monday September 28, 2020 @06:28PM (#60552086)
    Bitcoin - the gift that keeps on giving. It enables so many new business models! Who wouldn't want to have an untraceable way to transfer large amounts of money internationally. Down with the regulations!
    • by Tablizer ( 95088 )

      Bitcoin = eSwissBankAccount

      • by Cyberax ( 705495 )
        Swiss bank accounts can be traced these days. And the impenetrability of Swiss bank accounts has always been exaggerated. It was not possible to investigate them, but if you had an example of a fraudulent bank transfer coming into a Swiss account, the Swiss police has always been glad to look it up.
  • Any single entity with 400 hospitals need more than a ransomware attack, That's too many under one roof IMO

Some people manage by the book, even though they don't know who wrote the book or even what book.

Working...