Hacked: Hacking Finance

German Hospitals Targeted in Ransomware Cybercrime

Introduction

Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.


LATEST POSTS

Alleged FBI Hacker Lauri Love Ordered to US Extradition by UK Home Secretary 15th November, 2016

The Largest Breach of 2016: 412 Million FriendFinder Accounts Exposed 14th November, 2016

Bugs

German Hospitals Targeted in Ransomware Cybercrime

Posted on .

 

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

 Following the recent high-profile case of a Hollywood hospital falling prey to ransomware, several German hospitals are under siege with computer systems offline due to the actions of ransomware cybercriminals.

Ransomware is easily among the most widespread, high-profile strains of malware lately which can be particularly nasty and disruptive. When a targeted machine or network of computers are infected, the malicious code encrypts files into lockdown, rendering them inaccessible. Data files and more are encrypted to the point where a decryption key – in exchange for a ransom demand – is required to gain access to the files again.

The most recent publicized case of ransomware saw Hollywood Presbyterian hospital pay a ransom of $17,000 in bitcoin, following weeks of downtime, to gain access to their computers again.

Similarly, hospitals in Germany are now seeing cryptographically coded ransomware affecting their computer networks.

As reported by German Publication Deutsche Welle, several prominent German hospitals are now suffering due to ransomware attacks.

In the west of Germany, the Lukas Hospital in the city of Neuss had its hospital staff notice a sluggish computer system, with error messages popping up. A quick look-in from the IT department determined that it was a serving of malware, meant to encrypt data files.

Soon enough, the computers and the entire network was taken offline, by the hospital administration. The incident occurred two weeks ago. Patients are still advised to call the hospital via phone or send a fax as the email system is currently not functioning. Fundamentally, the ransomware has crippled the hospital’s computer infrastructure to a grinding halt.

Speaking to the publication, Dr. Andreas Kremer stated:

We pulled the plug on everything. Computers, servers, even the email server, and we went offline.

The hospital reported the attempt to spread malware to the authorities, who are investigating.

Another hospital in the German state of North Rhine-Westphalia, was attacked by a malware that was delivered through an email attachment.

A spokesperson for the Klinikum Arnsberg hospital told the publication:

Fortunately, it was only one server that was affected. The virus had started to encrypt files, but we could simply restore them from a backup.

As things stand, neither hospital has bowed in to pay the ransom demand. However, their operations continue to be disrupted.

Featured image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.

Comments
  • user

    AUTHOR Real Anti-Racist Action

    Posted on 10:00 pm February 29, 2016.

    So what this proves is that Federally-supported hospitals are free personal information. No real security measures, and IT teams that should not even have middle school diplomas. Hmm, seems like the fault of hospitals.
    If i left my home, left the door unlocked and open. Left a sign on the door that says i have valuables inside. Someone will eventually go in. This is what these hospitals are doing.
    My hat is off to those exposing how the hospital-corporations have wronged us.
    And once against just goes to show that a good ol fashion country doctor is always the safest and most efficient. http://ihr.org/

  • View Comments (1) ...
    Navigation
    The IRS for the second time has revised the estimated…