logo

NHS Hacking - Comments from the experts

By rotide
Created 15/05/2017 - 20:45
NHS Logo.jpg

Hackers exploit weak links and don't care about the consequences. Severely interfering with any  country's health system and creating situations that can cause fatalities through delayed operations, or ambulances failing to arrive in time in emergency situations.

Here the experts in Cyber Security matters discuss the recent  high profile attack on the NHS system, part of a global hacking exercise, caused through a known weakness in Microsoft Windows XP, that had been  found and a patch issued some time ago.

Andrew Henwood  CEO at Foregenix [1], an information security consultancy said

 "This extensive ransomware attack is non-targeted and global, so any computer system that's accessible and lacking recent Microsoft patches will be completely vulnerable and could be infected right now."The WanaCry ransomware infestation is a wake-up call for all entities connected to public networks,such as the Internet, to recognise cybersecurity is a necessity and not a nice-to-have.   "Organisations only implement robust cyber security programs if mandated or legislated. Yet, maintaining a robust patch management and network segmentation policy would have almost completely mitigated the threat of this ransomware infection."

In order to reduce the risk of infection, Andrew Henwood recommends the following steps; he says businesses must:

According to CTERA [2]'s CEO and co-founder Liran Eshel:

"The attack shows how sophisticated ransomware has become, forcing even unaffected organizations rethink strategies for countering ransomware. Organizations need to combat ransomware by minimizing attack exposures and enabling the rapid recovery attacked data and files. The onus is on organizations to stop the ransomware epidemic by building the right safeguards that eliminate enterprise vulnerabilities. Until that day comes, organizations need to be ready to catch and recover from some serious ransomware crypto-lock events. With the right file sync and backup procedures, even attacked organizations can minimize their recovery points to as little as five minutes while making a full recovery of encrypted data."  

Phil Bridge, Managing Director, Western Europe, Data & Storage Technologies, Kroll Ontrack said:

The international ransomware attack that affected the NHS and other organisations on Friday and over the weekend highlighted the severe risks posed by the growing ransomware phenomenon.

Kroll Ontrack has identified over 225 different strains of ransomware, which is a type of malware that blocks access to data on a device or server by encrypting it and has issued the following guidance to reduce risk and mitigate the effects of an attack:

Mishcon de Reya law firm : Joe Hancock, cyber security expert said

 "The malicious software used in the attack infects systems and encrypts their contents - often known as ransomware. These types of attacks have been growing in recent years, but have not been seen at this scale before. The attack can move from system to system laterally, as well as being delivered via malicious e-mails.

"Much of the blame for this week's specific problem has been laid on organisations using Windows XP, an operating system that is 16 years old and has not been supported by Microsoft for three years. Whilst people are strongly advised to move away from the platform, Windows XP is here to stay - it is embedded within many devices, from MRI machines in the health service to Point of Sale systems in large retailers which cannot be easily or cheaply upgraded.

"There will be a large global investigation into these attacks, and it is probable that some of the perpetrators will be identified. It is unlikely however that all those responsible will be held to account.

"As well as an in-depth investigation, we are now likely to see a strong reaction from governments, speeding up the regulation of crypto currencies such as Bitcoin and anonymous payment mechanisms that allow criminals to profit from such attacks. Somewhat conversely, such mechanisms are often the very thing that also allows new digital businesses to thrive.

"More broadly, a debate is emerging between large tech vendors and the government, as to where responsibility lies for the disclosure of vulnerabilities. It is likely that the National Security Agency (NSA) had previously identified this issue, but for intelligence purposes, chose not to disclose publicly. The damage caused by it being leaked into the wild is now, unfortunately, all too clear."


Source URL:
https://www.newbusiness.co.uk/articles/business-continuity/nhs-hacking-comments-experts