As hospitals face COVID-19 surge, cyber threats loom



[ad_1]

BURLINGTON, Vermont (AP) – Late in the morning on October 28, staff at the University of Vermont Medical Center noticed that the hospital’s phone system was not working.

Then the Internet went down, and the technical infrastructure of the Burlington-based center with it. Employees have lost access to databases, digital medical records, scheduling systems and other online tools they rely on for patient care.

Administrators have struggled to keep the hospital operational – canceling non-urgent appointments, reverting to paper-and-paper record keeping and redirecting some intensive care patients to nearby hospitals.

In its main lab, which performs around 8,000 tests per day, employees printed or wrote down the results by hand and passed them on to specialists across the facility. Obsolete and Internet-less technologies have experienced a revival.

“We went around and got all the fax machines we could,” said Al Gobeille, director of operations at UVM Medical Center.

The Vermont hospital had fallen prey to a cyberattack, becoming one of the most recent and visible examples of a wave of digital assaults holding U.S. healthcare providers hostage as cases of COVID-19 were spreading across the country.

On the same day as the UVM attack, the FBI and two federal agencies warned cybercriminals were stepping up their efforts to steal data and disrupt services in the healthcare industry.

By targeting vendors with attacks that scramble and block data until victims pay a ransom, hackers can demand thousands or millions of dollars and wreak havoc until they get paid.

In September, for example, a ransomware attack crippled a chain of more than 250 American hospitals and clinics. The resulting blackouts delayed emergency room care and required staff to restore critical heart rate, blood pressure and oxygen level monitors with Ethernet cabling.

Weeks earlier in Germany, the death of a woman became the first presumed death from a ransomware attack. Earlier in October, facilities in Oregon, New York, Michigan, Wisconsin and California were also plagued by suspected ransomware attacks.

Ransomware is also partly responsible for some of the 700 or so private health information breaches, affecting approximately 46.6 million people and currently under investigation by the federal government. In the hands of a criminal, a single patient record – rich in details about a person’s finances, insurance, and medical history – can sell for up to $ 1,000 on the black market, experts say.

During 2020, many hospitals have postponed technology upgrades or cybersecurity training that would help protect them from the latest wave of attacks, said Nick Culbertson, healthcare security consultant.

“The amount of chaos that has just built up here is a real threat,” he said.

As COVID-19 infections and hospitalizations increase across the country, experts say healthcare providers are dangerously vulnerable to attacks on their ability to function effectively and manage limited resources.

Even a small technical disruption can quickly spill over to patient care when a center’s capacity is depleted, said Eric Johnson of Vanderbilt University, who studies. the effects of cyberattacks on health.

“November has been a month of increasing demands for hospitals,” he said. “There is no room for error. From a hacker’s point of view, that’s perfect. “

A CALL TO ARMS FOR HOSPITALS

The day after the October 28 cyberattack, Joel Bedard, 53, of Jericho, arrived for a scheduled appointment at Burlington Hospital.

He was able to get in, he said, because his fluid drainage treatment is not high-tech, and it’s something he receives regularly while waiting for a liver transplant.

“I did it, they took care of me, but man, everything is down,” said Bedard. He said he had not seen any other patients that day. Much of the medical staff remained inactive, doing crossword puzzles and explaining that they were forced to document everything by hand.

“All the students and interns are like, ‘How did it work back then? “, He said.

Since the attack, the Burlington-based hospital network has referred all questions regarding its technical details to the FBI, which has refused to release any further information, citing an ongoing criminal investigation. Officials do not believe that a patient suffered immediate harm or that the patient’s personal information was compromised.

But more than a month later, the hospital is still recovering.

Some employees have been put on leave for weeks until they can resume their normal duties.

Oncologists could not access scans of older patients, which could help them, for example, compare the size of the tumor over time.

And, until recently, emergency room clinicians could take x-rays of fractured bones, but could not electronically send the images to radiologists at other sites in the healthcare network.

“We didn’t even have the Internet,” said Dr. Kristen DeStigter, director of the radiology department at UVM Medical Center.

The technical outage also delayed the release of around 50 coronavirus test results to the state, prompting the hospital to revert to a fax system to report the results until its technology issues. the information be resolved, UVM Medical Center President Dr Stephen Leffler said Thursday.

Soldiers from the State National Guard’s cyber unit helped hospital IT professionals scan the programming code of hundreds of computers and other devices, line by line, to clear any remaining malicious code that could re-infect the system. system. Many have been brought back online, but others have been completely replaced.

Colonel Christopher Evans said this was the first time the unit, founded about 20 years ago, has been called upon to accomplish what the guard calls a “real world” mission. “We’ve been training for this day for a very long time,” he said.

It could be several weeks before all the related damage is repaired and the systems are functioning normally again, Gobeille said.

“I don’t want to spark people’s hope and be wrong,” he said. “Our people are working 24 hours a day, 7 days a week. They are getting closer and closer every day. “

It will be difficult for other healthcare providers to protect themselves against the growing threat of cyber attacks if they haven’t already, said data security expert Larry Ponemon.

“It’s not like hospital systems have to do something new,” he says. “They just need to do what they should be doing anyway.”

Current industry reports indicate healthcare systems spend only 4-7% of their IT budget on cybersecurity, while other sectors like banking or insurance spend three times as much.

Research by consulting firm Ponemon shows that only about 15% of healthcare organizations have adopted the technology, training and procedures necessary to manage and thwart the flow of cyber attacks that they regularly face.

“The others fly with their heads down. This number is unacceptable, ”Ponemon said. “It’s a pitiful rate.”

And that partly explains why cybercriminals have focused their attention on healthcare organizations – especially now, as hospitals across the country face an increase in the number of COVID-19 patients, he said. .

“We are seeing real clinical impact,” said Dan L. Dodson, cybersecurity consultant for healthcare. “It’s a call to arms.”

___

Renault reported from New York.

___

The Associated Press’s Department of Health and Science receives support from the Department of Science Education at the Howard Hughes Medical Institute. The AP is solely responsible for all content.

[ad_2]

Source link