Posted on 05/12/2017 9:58:36 AM PDT by DUMBGRUNT
Health workers reported being locked out of their systems and seeing messages demanding ransom payments to regain access. NHS England described the incident as a "ransomware" attack. At least 16 organizations connected to the National Health Service (NHS) in England reported being affected. "The investigation is at an early stage but we believe the malware variant is Wanna Decryptor," NHS Digital said in a statement
(Excerpt) Read more at cnn.com ...
?Question, if they can pinpoint Russian hackers? How do they pay the ransom, and no one knows nothing?
They can’t pinpoint Squat!
FBI Gives Hollywood Hacking Victims Surprising Advice: “Pay the Ransom”
6:30 AM PDT 5/12/2017 by Tatiana Siegel
They pay in bitcoin.
Cybersecurity people should treat NHS just like they treat their patients. Make an appointment for 6 months from now and we will diagnose the problem, then we will schedule you to fix the problem in 12-18 months.
Incompetence.
There is simply no excuse for a modern enterprise to be affected to the extent that they have to shut down their IT operations. More than likely they have not shut down, but disconnected from the outside world while trying to affect repairs.
Still, using the technologies that are built into my storage arrays I can roll back a crypto-locker infection in a matter of minutes.
It's a shame there's not a technological solution to stupid users.
LOL! Harsh... :-)
Seriously though, I hope their IT department has sufficient recovery plans, otherwise they are SOL.
This is a fix that truly falls under the 2/3 rule of software. You can have fast, cheap or correct -- pick two. Fast & cheap won't be correct, fast & correct won't be cheap, and cheap & correct won't be fast.
I believe that! My daughter is an ER nurse.
The company I worked for, had NO connection on anything that involved MONEY.
They had a web presence and the usual internal network.
They were maniacal.
Usb and other ports were filled with hot glue!
Some of the keycaps same.
A pure sneaker network.
They had a relative that was a heavy hitter in the anti malware bis, he supervised the set up.
That was years back, not sure if that works now.
They nailed the guy on the dark web , a bitcoin user.
And others.
Do not forget the slow ambulance to a far off hospital.
If they are fat or smokers, they go on the waitlist.
I am told that some of these ransomware exploits can infect and encrypt your backups.
It looks like this one is particularly bad, and being directed at health care operations specifically.
So far there’s not been any noticeable impact in the US, but leadership here is in borderline freakout mode.
It’s so easy to keep your data safe, just takes a bit of money spent in the right places.
This is easy to recover from.
-if you have good backups and a quick IT admin.
If not, you’re screwed.
These guys should have the best backup software and be able to roll back to before the encryption began.
If there is no DR plan, there should be something in place for this.
Shadow copies at least.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.