RANSOMWARE

Training Modules

Book a Demo

A REAL WORLD
RANSOMWARE ATTACK

ABOUT THE ATTACKAt 11 a.m. on July 9th, Cass Regional Medical Center became aware of a ransomware attack on its information technology infrastructure. Affected areas include internal communication systems and access to the organization’s Electronic Health Record (EHR). At the time of discovery there wasn’t any evidence that patient data had been breached, but as an extra precaution, Meditech, the hospital’s EHR vendor, opted to shut down the system until the attack was resolved.

1Cass Regional initiated its prepared incident response just 30 minutes after discovering the attack, which allowed the health system to maintain care for most patients. The health system chose to divert only trauma and stroke victims to make sure they received the best care.

On July 16th, eight days after the attack occurred, the medical center brought its EHR system back online.

 

VULNERABILITY & ATTACK METHOD

Vulnerability is a weakness that could be exploited to cause harm. In the case of Cass Regional, officials did not confirm the type of ransomware used; however, they did acknowledge that it was a brute force attack on their Remote Desktop Protocol (RDP).

RDP is widely used to give remote access for legitimate business purposes. However, a hacker can use the port to jam ransomware into a network. Commonly, hackers use the trial-and-error method in their attempts to decode encrypted passwords or other encryption keys, essentially using brute force

2A lack of robust RDP security, like when users have unsophisticated logins and passwords, can make even a legitimate port like RDP a vulnerability. In fact, a brute force attack is hard for hackers to execute when an organization has multi-factor authentication implemented on its system

TOP LESSONS LEARNED

While many believe ransomware attacks are declining, this is not true for the healthcare
sector. Given the confidential and sensitive patient data they work with and their likelihood
to pay ransoms to keep data loss from endangering the business operations that directly
affect patient care and well-being, healthcare facilities will remain prime targets for
ransomware attacks.

The medical center should be applauded for its response time and contingency planning:
Cass Regional initiated its incident response just 30 minutes after discovering the attack,
which allowed officials to maintain care. If the medical center had not been prepared all
services could have been shut down for eight days. An actionable incident response plan that
is tested could be the difference between an incident versus a disaster

» Learn from other incidents. Often bad actors use the same attack exploiting the same
vulnerability multiple times to target groups of similar organizations.

 

HOW TO PROTECT AGAINST RANSOMWARE

1. Make sure you’re regularly backing up: do three backups on two storage types with at least one
offsite backup.
2. Keep your systems updated and don’t delay in applying patches.
3. Use reliable anti-malware programs. While these applications are not full-proof they do add
necessary protection to your systems.4
4. Educate your employees so they can identify social engineering and spear-phishing attacks.
Many ransomware attacks are initiated by someone “clicking” on a link they should not.
5. Implement controlled folder access. It can stop ransomware from encrypting files and holding
the files for ransom

Download Your Copy!

Get the latest news for awareness Case Studies


Subscribe to Case Studies

Boost Engagement with delivering Communication Tools

Bootcamp Image

Increase employee engagement with a different suite of communication tools like:

Posters

Promote your training program with visuals you can customize to brand... more  

Newsletters

Send training updates and security best practice highlights directly... more  

Digital wallpapers and web banners

Increase program engagement with colorful thought-provoking messaging... more  

Training Videos/Animations

Strengthen key awareness concepts and skills through stylish visual... more  

Why Aspire Tech


Award-winning courses

Aspire's award-winning online courses and programs are created and delivered by a renowned Cyber Security specialist.

The perfect fit for business

Plans for small to large businesses that are flexible to match your budget. There is a volume discount available.

Cost effective training

For a fraction of the expense of traditional classroom training, train thousands of employees in numerous locations.

Speak with an expert