Negotiating with criminals doesn’t always work out, as Kansas Heart Hospital in Wichita learned last week. The hospital paid to get files back after falling victim to ransomware, but only got “partial access” and a demand for more money, Techspot is reporting.
That’s right: the criminals got their ransom, and then decided they wanted more money. The hospital’s president, Dr. Greg Duick says the hospital is not paying up.
Duick won’t reveal which malware hit the hospital, or how much money was paid to the attackers.
“I’m not at liberty, because it’s an ongoing investigation, to say the actual exact amount,” said Duick. “A small amount was [paid].”
The hospital had a plan for this sort of attack, and it’s not clear why it didn’t work. Without more details from Kansas Heart, it’s hard to say. But there’s at least one bright side.
“The patient information never was jeopardized, and we took measures to make sure it wouldn’t be,” said Duick.
Still, this sort of thing is becoming way too common in America’s hospitals, and any money paid to criminals is money not spent on providing healthcare.
Ransomware encrypts files on the victim’s computers, then demands a payment for access. Typically users get access to the files after paying up, but in this case it seems like the attackers thought they could exploit the situation and get more money.
There’s been a rash of ransomware infections in the U.S. healthcare market for a while now, including hospitals in Kentucky and California. Some combination of high-value, irreplaceable information and lagging IT infrastructure makes hospitals a ripe target.
Regular, air-gapped backups could seriously dull the power of such software. If you’ve got another copy of your data, there’s no need to pay off ransomware. For our money, that’s the solution hospitals, and every organization, should be looking at.