Health Service Executive ransomware attack: Difference between revisions
→Hospital disruptions: Added wikilink to new article. |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
||
(33 intermediate revisions by 12 users not shown) | |||
Line 1: | Line 1: | ||
{{Short description|2021 cyber attack on the Health Service Executive in Ireland}} |
{{Short description|2021 cyber attack on the Health Service Executive in Ireland}} |
||
{{Infobox event |
{{Infobox event |
||
| title |
| title = Health Service Executive ransomware attack |
||
| image |
| image = Coat of arms of Ireland.svg |
||
| image_upright |
| image_upright = |
||
| image_alt = |
|||
⚫ | |||
| image_alt = |
|||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
| time = |
|||
⚫ | |||
⚫ | |||
| time = |
|||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
| venue = |
|||
⚫ | |||
⚫ | |||
| venue = |
|||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
| theme = |
|||
⚫ | |||
| cause = |
|||
| theme = |
|||
| motive = |
|||
| cause = |
|||
⚫ | |||
| motive = |
|||
⚫ | |||
|[[Health Service Executive]] (HSE) |
|[[Health Service Executive]] (HSE) |
||
|[[Department of Health (Ireland)|Department of Health]] |
|[[Department of Health (Ireland)|Department of Health]] |
||
}} |
}} |
||
| first_reporter |
| first_reporter = |
||
| budget = |
|||
| patron = <!-- or |patrons= --> |
|||
| budget = |
|||
| |
| organisers = <!-- or |organizers= --> |
||
⚫ | |||
| organisers = <!-- or |organizers= --> |
|||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
|All HSE IT systems shutdown |
|All HSE IT systems shutdown |
||
|Hospital disruptions and appointment cancellations |
|Hospital disruptions and appointment cancellations |
||
Line 38: | Line 38: | ||
|Employee record data breach |
|Employee record data breach |
||
}} |
}} |
||
| casualties1 |
| casualties1 = |
||
| casualties2 |
| casualties2 = |
||
| casualties3 |
| casualties3 = |
||
| reported deaths |
| reported deaths = |
||
| reported injuries |
| reported injuries = |
||
| reported missing |
| reported missing = |
||
| reported property damage = |
| reported property damage = |
||
| burial |
| burial = |
||
| displaced |
| displaced = |
||
| inquiries |
| inquiries = |
||
| inquest |
| inquest = |
||
| coroner |
| coroner = |
||
| arrests |
| arrests = |
||
| suspects |
| suspects = [[Wizard Spider]], ContiLocker Team |
||
| accused |
| accused = |
||
| convicted |
| convicted = |
||
| charges |
| charges = |
||
| trial |
| trial = |
||
| verdict |
| verdict = |
||
| convictions |
| convictions = |
||
| sentence |
| sentence = |
||
| publication_bans |
| publication_bans = |
||
| litigation |
| litigation = |
||
| awards |
| awards = |
||
| url |
| url = |
||
| blank_label |
| blank_label = <!-- or |blank_data= --> |
||
| blank1_label |
| blank1_label = <!-- or |blank1_data= --> |
||
| blank2_label |
| blank2_label = <!-- or |blank2_data= --> |
||
| website |
| website = <!-- {{URL|example.com}} --> |
||
| notes |
| notes = |
||
}} |
}} |
||
On 14 May 2021, the [[Health Service Executive]] (HSE) of Ireland suffered a major [[ransomware]] [[cyberattack]] which caused all of its [[Information technology|IT systems]] nationwide to be shut down.<ref name=rte-hospital-it-problem>{{cite news |title=Some health service disruption after HSE cyber attack |url=https://www.rte.ie/news/health/2021/0514/1221519-hospital-it-problem/ |publisher=[[RTÉ News and Current Affairs]] |access-date=14 May 2021}}</ref><ref>{{cite news |title=Irish health service hit by 'very sophisticated' ransomware attack |url=https://www.reuters.com/technology/irish-health-service-hit-by-ransomware-attack-vaccine-rollout-unaffected-2021-05-14/ |publisher=[[Reuters]] |access-date=14 May 2021}}</ref><ref>{{cite news |title=Irish health service hit by cyber attack |url=https://www.bbc.co.uk/news/world-europe-57111615 |publisher=[[BBC News]] |access-date=14 May 2021}}</ref><ref>{{cite news |title=Ransomware attack disrupts Irish health services |url=https://www.theguardian.com/world/2021/may/14/ransomware-attack-disrupts-irish-health-services |work=[[The Guardian]] |access-date=14 May 2021}}</ref> |
On 14 May 2021, the [[Health Service Executive]] (HSE) of Ireland suffered a major [[ransomware]] [[cyberattack]] which caused all of its [[Information technology|IT systems]] nationwide to be shut down.<ref name=rte-hospital-it-problem>{{cite news |title=Some health service disruption after HSE cyber attack |url=https://www.rte.ie/news/health/2021/0514/1221519-hospital-it-problem/ |publisher=[[RTÉ News and Current Affairs]] |access-date=14 May 2021}}</ref><ref>{{cite news |title=Irish health service hit by 'very sophisticated' ransomware attack |url=https://www.reuters.com/technology/irish-health-service-hit-by-ransomware-attack-vaccine-rollout-unaffected-2021-05-14/ |publisher=[[Reuters]] |access-date=14 May 2021}}</ref><ref>{{cite news |title=Irish health service hit by cyber attack |url=https://www.bbc.co.uk/news/world-europe-57111615 |publisher=[[BBC News]] |access-date=14 May 2021}}</ref><ref>{{cite news |title=Ransomware attack disrupts Irish health services |url=https://www.theguardian.com/world/2021/may/14/ransomware-attack-disrupts-irish-health-services |work=[[The Guardian]] |access-date=14 May 2021}}</ref> |
||
It was the most significant [[Cybercrime|cybercrime attack]] on an [[State Agencies of the Republic of Ireland|Irish state agency]] and the largest known attack against a health service computer system.<ref>{{cite news|date=15 May 2021|title=Cyber attack 'most significant on Irish state'|work=[[BBC News]]|url=https://www.bbc.com/news/world-europe-57111615|access-date=18 May 2021}}</ref><ref>{{cite news|title=Wizard Spider profile: Suspected gang behind HSE attack is part of |
It was the most significant [[Cybercrime|cybercrime attack]] on an [[State Agencies of the Republic of Ireland|Irish state agency]] and the largest known attack against a health service computer system.<ref>{{cite news|date=15 May 2021|title=Cyber attack 'most significant on Irish state'|work=[[BBC News]]|url=https://www.bbc.com/news/world-europe-57111615|access-date=18 May 2021}}</ref><ref>{{cite news|title=Wizard Spider profile: Suspected gang behind HSE attack is part of world's first cyber-cartel|url=https://www.irishtimes.com/news/crime-and-law/wizard-spider-profile-suspected-gang-behind-hse-attack-is-part-of-world-s-first-cyber-cartel-1.4568806|last=Lally|first=Conor|date=18 May 2021|access-date=5 September 2021|publisher=[[The Irish Times]]}}</ref> [[Bloomberg News]] reported that the attackers used the [[Conti (ransomware)|Conti ransomware]].<ref name=":0" /> The group responsible was identified as a criminal gang known as [[Wizard Spider]], believed to be operating from Russia.<ref name="ws1">{{Cite news|last=Reynolds|first=Paul|date=18 May 2021|title=Wizard spider: Who are they and how do they operate?|publisher=[[RTÉ News and Current Affairs]]|url=https://www.rte.ie/news/crime/2021/0518/1222349-ransomware-crime-group/|access-date=18 May 2021}}</ref><ref name="ws2">{{Cite news|last1=Gallagher|first1=Conor|last2=McQuinn|first2=Cormac|title=Dark web 'dump sites' being monitored for HSE data after hack|url=https://www.irishtimes.com/news/crime-and-law/dark-web-dump-sites-being-monitored-for-hse-data-after-hack-1.4567731|access-date=18 May 2021|publisher=[[The Irish Times]]|language=en}}</ref><ref name="ws3">{{Cite news|last1=Horgan-Jones|first1=Jack|last2=Lally|first2=Conor|title=Scale of damage from cyberattack on HSE systems will not be known for days|url=https://www.irishtimes.com/news/health/scale-of-damage-from-cyberattack-on-hse-systems-will-not-be-known-for-days-1.4565621|access-date=2021-05-15|publisher=[[The Irish Times]]|language=en}}</ref> The same group is believed to have attacked the [[Department of Health (Ireland)|Department of Health]] with a similar cyberattack. |
||
On 19 May, the ''[[Financial Times]]'' reviewed private data for twelve individuals which had appeared online as a result of the breach.<ref name=":4" /> On 28 May, the HSE confirmed confidential medical information for 520 patients, as well as corporate documents were published online.<ref name=":6">{{Cite news|last=Gallagher|first=Conor|title=Data of 520 patients published online, HSE confirms|url=https://www.irishtimes.com/news/crime-and-law/data-of-520-patients-published-online-hse-confirms-1.4578136|date=28 May 2021|access-date=28 May 2021|publisher=[[The Irish Times]]}}</ref> |
On 19 May, the ''[[Financial Times]]'' reviewed private data for twelve individuals which had appeared online as a result of the breach.<ref name=":4" /> On 28 May, the HSE confirmed confidential medical information for 520 patients, as well as corporate documents were published online.<ref name=":6">{{Cite news|last=Gallagher|first=Conor|title=Data of 520 patients published online, HSE confirms|url=https://www.irishtimes.com/news/crime-and-law/data-of-520-patients-published-online-hse-confirms-1.4578136|date=28 May 2021|access-date=28 May 2021|publisher=[[The Irish Times]]}}</ref> |
||
On 23 June, it was confirmed that at least three quarters of the HSE's IT servers had been decrypted and 70% of computer devices were back in use.<ref>{{cite news|url=https://www.newstalk.com/news/hse-cyber-attack-around-75-of-systems-now-unlocked-but-weeks-of-disruption-still-ahead-1214684|title=HSE cyberattack: 'Many more weeks' before health services return to normal|publisher=[[Newstalk]]|first=Eoghan|last=Murphy|date=23 June 2021|accessdate=23 June 2021}}</ref> By September, over 95% of all servers and devices had been restored.<ref name="bbc"/> |
|||
==Background== |
==Background== |
||
Line 83: | Line 81: | ||
On 13 May the cybersecurity provider for the HSE emailed the Security Operations team that there had been unhandled threats on at least 16 systems since 7 May.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> The Security Operations team had the server team restart servers.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> |
On 13 May the cybersecurity provider for the HSE emailed the Security Operations team that there had been unhandled threats on at least 16 systems since 7 May.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> The Security Operations team had the server team restart servers.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> |
||
The HSE was alerted to the attack at 4am on 14 May 2021.<ref name=rte-hse-cyber-attack>{{Cite news|title=What we know so far about the HSE cyber attack|url=https://www.rte.ie/news/health/2021/0514/1221537-hse-cyber-attack/|date=14 May 2021|access-date=14 May 2021|publisher=[[RTÉ News and Current Affairs]]}}</ref> The attack affected both national and local systems, involved in all core services, with the HSE taking down their IT system in order to protect it from the attack and to give the HSE time to consider options.<ref>{{cite news|url=https://www.independent.ie/irish-news/serious-and-sophisticated-hse-confirms-ransomware-cyber-attack-has-hit-all-hospital-it-systems-40425737.html|title='Serious and sophisticated' - HSE confirms ransomware cyber attack has hit all hospital IT systems|publisher=[[Irish Independent]]|first=Eoghan|last=Moloney|date=14 May 2021| |
The HSE was alerted to the attack at 4am on 14 May 2021.<ref name=rte-hse-cyber-attack>{{Cite news|title=What we know so far about the HSE cyber attack|url=https://www.rte.ie/news/health/2021/0514/1221537-hse-cyber-attack/|date=14 May 2021|access-date=14 May 2021|publisher=[[RTÉ News and Current Affairs]]}}</ref> The attack affected both national and local systems, involved in all core services, with the HSE taking down their IT system in order to protect it from the attack and to give the HSE time to consider options.<ref>{{cite news|url=https://www.independent.ie/irish-news/serious-and-sophisticated-hse-confirms-ransomware-cyber-attack-has-hit-all-hospital-it-systems-40425737.html|title='Serious and sophisticated' - HSE confirms ransomware cyber attack has hit all hospital IT systems|publisher=[[Irish Independent]]|first=Eoghan|last=Moloney|date=14 May 2021|access-date=15 May 2021}}</ref> |
||
The attack occurred during the [[COVID-19 pandemic in the Republic of Ireland|COVID-19 pandemic]]. Ireland's [[COVID-19 vaccination in the Republic of Ireland|COVID-19 vaccination programme]] was not affected by the attack and proceeded as planned;<ref name=":0">{{Cite |
The attack occurred during the [[COVID-19 pandemic in the Republic of Ireland|COVID-19 pandemic]]. Ireland's [[COVID-19 vaccination in the Republic of Ireland|COVID-19 vaccination programme]] was not affected by the attack and proceeded as planned;<ref name=":0">{{Cite news|title=Irish Health Service Shuts Down IT System Amid Cyber Attack|url=https://www.bloomberg.com/news/articles/2021-05-14/irish-health-service-shuts-down-it-system-amid-cyber-attack|access-date=2021-05-14|website=[[Bloomberg News]]|date=14 May 2021 }}</ref> however, the COVID-19 general practitioner and close contact referral system was down, requiring these individuals to attend [[COVID-19 testing in the Republic of Ireland#Testing centres|walk-in sites]] rather than attend an appointment.<ref name=":2">{{Cite web|last=Thomas|first=Cónal|title=Covid-19: GP and close contact referral system down, patients advised to attend walk-in centres|date=14 May 2021 |url=https://www.thejournal.ie/covid-19-gp-and-close-contact-referral-system-down-patients-advised-to-attend-walk-in-centres-5437186-May2021/|access-date=2021-05-14|publisher=[[TheJournal.ie]]|language=en}}</ref><ref name=rte-hospital-it-problem/> |
||
The independent [[Teachta Dála|TD]] (Member of Parliament) [[Cathal Berry]] stated that the [[National Cyber Security Centre (Ireland)|National Cyber Security Centre]] which is responsible for the state's cyber security, had only 25 members of staff, a budget of €5 million a year, no dedicated premises, and that its position of Director had been vacant for a year due to its salary of €89,000 a year.<ref>{{Cite news|title=Ransomware attack defence upgrade urged by TD for part of Laois and Offaly|url=https://www.leinsterexpress.ie/news/crime-and-courts/633660/ransomware-attack-defence-upgrade-urged-by-td-for-part-of-laois-and-offaly.html|access-date=17 May 2021|publisher=[[Leinster Express]]}}</ref><ref>{{Cite news|last=O'Halloran|first=Marie|title=Cyber security role is vacant because of low salary, TD says|url=https://www.irishtimes.com/news/ireland/irish-news/cyber-security-role-is-vacant-because-of-low-salary-td-says-1.4566803|access-date=17 May 2021|publisher=[[The Irish Times]]|language=en}}</ref> The National Cyber Security Centre is under the remit of the [[Department of the Environment, Climate and Communications]].<ref>{{Cite web|title=NCSC: Contact Page|url=https://www.ncsc.gov.ie/contact/|access-date=2021-05-19|website=www.ncsc.gov.ie}}</ref> |
The independent [[Teachta Dála|TD]] (Member of Parliament) [[Cathal Berry]] stated that the [[National Cyber Security Centre (Ireland)|National Cyber Security Centre]] which is responsible for the state's cyber security, had only 25 members of staff, a budget of €5 million a year, no dedicated premises, and that its position of Director had been vacant for a year due to its salary of €89,000 a year.<ref>{{Cite news|title=Ransomware attack defence upgrade urged by TD for part of Laois and Offaly|url=https://www.leinsterexpress.ie/news/crime-and-courts/633660/ransomware-attack-defence-upgrade-urged-by-td-for-part-of-laois-and-offaly.html|access-date=17 May 2021|publisher=[[Leinster Express]]}}</ref><ref>{{Cite news|last=O'Halloran|first=Marie|title=Cyber security role is vacant because of low salary, TD says|url=https://www.irishtimes.com/news/ireland/irish-news/cyber-security-role-is-vacant-because-of-low-salary-td-says-1.4566803|access-date=17 May 2021|publisher=[[The Irish Times]]|language=en}}</ref> The National Cyber Security Centre is under the remit of the [[Department of the Environment, Climate and Communications]].<ref>{{Cite web|title=NCSC: Contact Page|url=https://www.ncsc.gov.ie/contact/|access-date=2021-05-19|website=www.ncsc.gov.ie}}</ref> |
||
== Perpetrator & methodology == |
== Perpetrator & methodology == |
||
The [[National Cyber Security Centre (Ireland)|National Cyber Security Centre]] identified the [[penetration testing]] tool |
The [[National Cyber Security Centre (Ireland)|National Cyber Security Centre]] identified the [[penetration testing]] tool Cobalt Strike, sold by American IT company HelpSystems, as being used to move through and infect [[Health Service Executive|HSE]] and [[Department of Health (Ireland)|Department of Health]] systems, to run executable files, and to deploy a variant of the [[Conti (ransomware)|Conti ransomware]].<ref name="rte-hse-cyber-attack" /><ref name=":5" /> Cobalt Strike ''Beacon'' was detected on infected systems, which allowed them to be controlled and for software to be deployed remotely.<ref name=":5" /> |
||
The group responsible was identified as a criminal gang known as [[Wizard Spider]], believed to be operating from [[Saint Petersburg]], Russia.<ref name="ws1"/><ref name="ws2"/><ref name="ws3"/> |
The group responsible was identified as a criminal gang known as [[Wizard Spider]], believed to be operating from [[Saint Petersburg]], Russia.<ref name="ws1"/><ref name="ws2"/><ref name="ws3"/> |
||
==Impact== |
==Impact== |
||
The ransomware cyber attack had a significant impact on hospital appointments across the country, with many appointments cancelled including all outpatient and radiology services.<ref>{{cite web|url=https://www.hse.ie/eng/services/news/media/pressrel/hse-cyber-security-incident.html|title=HSE Cyber Security Incident|website=[[Health Service Executive]] (HSE)|date=19 May 2021| |
The ransomware cyber attack had a significant impact on hospital appointments across the country, with many appointments cancelled including all outpatient and radiology services.<ref>{{cite web|url=https://www.hse.ie/eng/services/news/media/pressrel/hse-cyber-security-incident.html|title=HSE Cyber Security Incident|website=[[Health Service Executive]] (HSE)|date=19 May 2021|access-date=19 May 2021|archive-date=18 May 2021|archive-url=https://web.archive.org/web/20210518165511/https://www.hse.ie/eng/services/news/media/pressrel/hse-cyber-security-incident.html|url-status=dead}}</ref> |
||
Several hospitals described situations where they could not access electronic systems and records and had to rely on paper records.<ref>{{cite news|url=https://www.irishmirror.ie/news/irish-news/hse-cyber-attack-updates-live-24107129|title=HSE issues defiant statement after 'significant ransomware attack'|publisher=[[Irish Mirror]]|first=Colin|last=Brennan|date=14 May 2021| |
Several hospitals described situations where they could not access electronic systems and records and had to rely on paper records.<ref>{{cite news|url=https://www.irishmirror.ie/news/irish-news/hse-cyber-attack-updates-live-24107129|title=HSE issues defiant statement after 'significant ransomware attack'|publisher=[[Irish Mirror]]|first=Colin|last=Brennan|date=14 May 2021|access-date=15 May 2021}}</ref> Some have warned of significant disruption with routine appointments being cancelled, including maternity checkups and scans.<ref>{{cite news|url=https://www.breakingnews.ie/ireland/rotunda-patients-asked-not-to-attend-appointments-amid-system-cyberattack-1127022.html|title=Taoiseach insists Ireland will not pay ransom after HSE cyber attack|publisher=BreakingNews.ie|first=Vivienne|last=Clarke|date=14 May 2021|access-date=15 May 2021}}</ref> |
||
The COVID-19 testing referral system was made offline, requiring individuals with suspected cases to attend [[COVID-19 testing in the Republic of Ireland#Testing centres|walk-in COVID-19 testing centres]], rather than attend an appointment.<ref name=":2" /> The COVID-19 vaccination registration portal was also made offline, but was later back online in the evening.<ref>{{cite news|url=https://www.irishexaminer.com/news/arid-40289090.html|title=Ransom will not be paid to perpetrators of HSE cyber attack|publisher=[[Irish Examiner]]|first1=Steven|last1=Heaney|first2=Vivienne|last2=Clarke|first3=Nicole|last3=Glennon|date=14 May 2021| |
The COVID-19 testing referral system was made offline, requiring individuals with suspected cases to attend [[COVID-19 testing in the Republic of Ireland#Testing centres|walk-in COVID-19 testing centres]], rather than attend an appointment.<ref name=":2" /> The COVID-19 vaccination registration portal was also made offline, but was later back online in the evening.<ref>{{cite news|url=https://www.irishexaminer.com/news/arid-40289090.html|title=Ransom will not be paid to perpetrators of HSE cyber attack|publisher=[[Irish Examiner]]|first1=Steven|last1=Heaney|first2=Vivienne|last2=Clarke|first3=Nicole|last3=Glennon|date=14 May 2021|access-date=15 May 2021}}</ref> |
||
The Chief Operations Officer of the HSE – Anne O'Connor – said on 14 May that some cancer and stroke services had been affected and that "the situation will be very serious if it continues into Monday [17 May]". She said that the most serious concerns were with diagnostics, with radiology systems having gone down, affecting [[CT scan|CT]] and other scans from going ahead.<ref>{{cite news|url=https://www.independent.ie/irish-news/warning-of-widespread-cancellations-for-hse-patientsif-ransomware-attack-not-resolved-by-monday-40427449.html|title=Warning of widespread cancellations for HSE patients if ransomware attack not resolved by Monday|publisher=[[Irish Independent]]|first=Eoghan|last=Moloney|date=14 May 2021| |
The Chief Operations Officer of the HSE – Anne O'Connor – said on 14 May that some cancer and stroke services had been affected and that "the situation will be very serious if it continues into Monday [17 May]". She said that the most serious concerns were with diagnostics, with radiology systems having gone down, affecting [[CT scan|CT]] and other scans from going ahead.<ref>{{cite news|url=https://www.independent.ie/irish-news/warning-of-widespread-cancellations-for-hse-patientsif-ransomware-attack-not-resolved-by-monday-40427449.html|title=Warning of widespread cancellations for HSE patients if ransomware attack not resolved by Monday|publisher=[[Irish Independent]]|first=Eoghan|last=Moloney|date=14 May 2021|access-date=15 May 2021}}</ref> A large amount of out-patient appointments were also cancelled; most community health services are unaffected.<ref>{{Cite news|last=O'Halloran|first=Marie|title=HSE IT system will take "several weeks" to get back up and running – Donnelly|url=https://www.irishtimes.com/news/politics/hse-it-system-will-take-several-weeks-to-get-back-up-and-running-donnelly-1.4568804|access-date=2021-05-19|newspaper=The Irish Times|language=en}}</ref> O'Connor also reported that "we don't know what data has been taken", but "we know some data has been compromised", with the [[Data Protection Commissioner]] being alerted to the potential breach.<ref name=":3" /> |
||
The HSE published a list of affected services on its website at lunchtime on 14 May 2021.<ref name="hse.ie"/><ref name=tj-hse-cyberattack-hospital-health-services-affected>{{Cite news|title=HSE cyber attack: what services are affected and which ones are still working?|url=https://www.thejournal.ie/hse-cyberattack-hospital-health-services-affected-5437328-May2021/|last=McDermott|first=Stephen|date=14 May 2021|access-date=14 May 2021|publisher=[[TheJournal.ie]]}}</ref> |
The HSE published a list of affected services on its website at lunchtime on 14 May 2021.<ref name="hse.ie"/><ref name=tj-hse-cyberattack-hospital-health-services-affected>{{Cite news|title=HSE cyber attack: what services are affected and which ones are still working?|url=https://www.thejournal.ie/hse-cyberattack-hospital-health-services-affected-5437328-May2021/|last=McDermott|first=Stephen|date=14 May 2021|access-date=14 May 2021|publisher=[[TheJournal.ie]]}}</ref> |
||
On 19 May, the ''[[Financial Times]]'' reviewed "samples" of private data of twelve individuals that was published online, including admission records and laboratory results for a man admitted to hospital for [[palliative care]]. In response, the [[National Cyber Security Centre (Ireland)|National Cyber Security Centre]] stated criminal gangs "habitually release stolen information as a means of pressurising organisations into paying a ransom". The ContiLocker Team claimed to also have staff employment contracts, payroll data and financial statements, patient addresses, and patient phone numbers.<ref name=":4">{{Cite web|last1=Noonan|first1=Laura|last2=Shotter|first2=James|date=19 May 2021|title=Irish patients' data stolen by hackers appears online|url=https://www.ft.com/content/13d33a08-ce83-4f8a-8d93-a60a5e097ed8 |
On 19 May, the ''[[Financial Times]]'' reviewed "samples" of private data of twelve individuals that was published online, including admission records and laboratory results for a man admitted to hospital for [[palliative care]]. In response, the [[National Cyber Security Centre (Ireland)|National Cyber Security Centre]] stated criminal gangs "habitually release stolen information as a means of pressurising organisations into paying a ransom". The ContiLocker Team claimed to also have staff employment contracts, payroll data and financial statements, patient addresses, and patient phone numbers.<ref name=":4">{{Cite web|last1=Noonan|first1=Laura|last2=Shotter|first2=James|date=19 May 2021|title=Irish patients' data stolen by hackers appears online|url=https://www.ft.com/content/13d33a08-ce83-4f8a-8d93-a60a5e097ed8|access-date=2021-05-19|website=www.ft.com}}</ref> |
||
On 28 May, the HSE confirmed that data relating to 520 patients, including sensitive information, was published online.<ref name=":6" /><ref>{{cite news|url=https://www.independent.ie/irish-news/sensitive-data-of-520-patients-has-been-put-online-by-hackers-hse-reveals-40480323.html|title=Sensitive data of 520 patients has been put online by hackers, HSE reveals|publisher=[[Irish Independent]]|first=Eilish|last=O'Regan|date=28 May 2021| |
On 28 May, the HSE confirmed that data relating to 520 patients, including sensitive information, was published online.<ref name=":6" /><ref>{{cite news|url=https://www.independent.ie/irish-news/sensitive-data-of-520-patients-has-been-put-online-by-hackers-hse-reveals-40480323.html|title=Sensitive data of 520 patients has been put online by hackers, HSE reveals|publisher=[[Irish Independent]]|first=Eilish|last=O'Regan|date=28 May 2021|access-date=28 May 2021}}</ref><ref>{{cite news|url=https://www.rte.ie/news/2021/0528/1224527-cyber-attack-hse/|title=HSE says stolen sensitive data of 520 patients on dark web|publisher=[[RTÉ News and Current Affairs]]|first=George|last=Lee|date=28 May 2021|access-date=28 May 2021}}</ref><ref name=tj-hse-hack-data-520-patients-May2021>{{Cite news|title=HSE hack: Sensitive data from 520 patients leaked online|url=https://www.thejournal.ie/hse-hack-data-5451581-May2021/|last=Duffy|first=Rónán|date=28 May 2021|access-date=3 June 2021|work=[[TheJournal.ie]]}}</ref> |
||
===Hospital disruptions=== |
===Hospital disruptions=== |
||
{| class="wikitable" |
{| class="wikitable" |
||
|+ Hospital disruptions by county<ref name="hse.ie">{{cite web|url=https://www2.hse.ie/services/hospital-service-disruptions/hse-it-system-cyber-attack.html|title=Appointment and service updates – HSE IT system cyber attack|website=[[Health Service Executive]] (HSE)| |
|+ Hospital disruptions by county<ref name="hse.ie">{{cite web|url=https://www2.hse.ie/services/hospital-service-disruptions/hse-it-system-cyber-attack.html|title=Appointment and service updates – HSE IT system cyber attack|website=[[Health Service Executive]] (HSE)|access-date=15 May 2021|url-status=dead |archive-url=https://web.archive.org/web/20210516223458/https://www2.hse.ie/services/hospital-service-disruptions/hse-it-system-cyber-attack.html |archive-date=2021-05-16}}</ref> |
||
!County!!Hospital |
!County!!Hospital |
||
|+ |
|+ |
||
|[[County |
|[[County Kilkenny|Kilkenny]] || [[St. Luke's General Hospital]] |
||
|- |
|- |
||
|[[County Cavan|Cavan]] || [[Cavan General Hospital]] |
|[[County Cavan|Cavan]] || [[Cavan General Hospital]] |
||
Line 164: | Line 162: | ||
==Response== |
==Response== |
||
The HSE |
The HSE worked with the [[National Cyber Security Centre (Ireland)|National Cyber Security Centre]], the [[Garda Síochána]], [[Communications & Information Services Corps|Irish Defence Forces]], as well as various partners domestically and internationally, including [[Europol]] and [[Interpol]].<ref name="rte-hse-cyber-attack" /><ref>{{cite news|url=https://extra.ie/2021/05/16/news/irish-news/ransomeware-health-department|title=New cyber attack carried out on Department of Health as HSE scrambles to get systems back online|publisher=Extra.ie|first=Dan|last=Grennan|date=16 May 2021|access-date=16 May 2021}}</ref> |
||
The Minister of State for Public Procurement and eGovernment – [[Ossian Smyth]] – said that the attack was international, not espionage, and that "this is a very significant attack, possibly the most significant cyber attack on the Irish State."<ref name="tj-hse-cyber-attack">{{Cite news|title=HSE ransomware attack is 'possibly the most significant cyber attack on the Irish State'|url=https://www.thejournal.ie/hse-cyber-attack-5436981-May2021/|last=Ní Aodha|first=Gráinne|publisher=[[TheJournal.ie]]}}</ref> |
The Minister of State for Public Procurement and eGovernment – [[Ossian Smyth]] – said that the attack was international, not espionage, and that "this is a very significant attack, possibly the most significant cyber attack on the Irish State."<ref name="tj-hse-cyber-attack">{{Cite news|title=HSE ransomware attack is 'possibly the most significant cyber attack on the Irish State'|url=https://www.thejournal.ie/hse-cyber-attack-5436981-May2021/|last=Ní Aodha|first=Gráinne|publisher=[[TheJournal.ie]]}}</ref> |
||
The HSE claimed that it was a [[Zero-day (computing)|zero-day-threat]] and that there was no experience in how to respond to the attack.<ref name=":1">{{Cite web|last1=Burns|first1=Sarah|last2=Clarke|first2=Vivienne|last3=Lally|first3=Conor|last4=Cullen|first4=Paul|title=HSE cyber attack 'possibly the most significant' ever on Irish State|url=https://www.irishtimes.com/news/health/hse-cyber-attack-possibly-the-most-significant-ever-on-irish-state-1.4564957|access-date=2021-05-14|publisher=[[The Irish Times]]|language=en}}</ref> The [[Minister for Health (Ireland)|Minister for Health]] – [[Stephen Donnelly]] – said that the attack had "a severe impact" on health and social care services.<ref name=":1" /> The Director-General of the HSE – [[Paul Reid (HSE)|Paul Reid]] – said that the attack will cost "tens of millions" to fix.<ref name=":3">{{Cite web|title=Paul Reid says it could cost 'tens of millions' to fix HSE IT systems|url=https://www.breakingnews.ie/ireland/paul-reid-says-it-could-cost-tens-of-millions-to-fix-hse-it-systems-1128172.html|access-date=2021-05-17|website=BreakingNews.ie|language=en}}</ref> |
The HSE claimed that it was a [[Zero-day (computing)|zero-day-threat]] and that there was no experience in how to respond to the attack.<ref name=":1">{{Cite web|last1=Burns|first1=Sarah|last2=Clarke|first2=Vivienne|last3=Lally|first3=Conor|last4=Cullen|first4=Paul|title=HSE cyber attack 'possibly the most significant' ever on Irish State|url=https://www.irishtimes.com/news/health/hse-cyber-attack-possibly-the-most-significant-ever-on-irish-state-1.4564957|access-date=2021-05-14|publisher=[[The Irish Times]]|language=en}}</ref> The [[Minister for Health (Ireland)|Minister for Health]] – [[Stephen Donnelly]] – said that the attack had "a severe impact" on health and social care services.<ref name=":1" /> The Director-General of the HSE – [[Paul Reid (HSE)|Paul Reid]] – said that the attack will cost "tens of millions" to fix.<ref name=":3">{{Cite web|title=Paul Reid says it could cost 'tens of millions' to fix HSE IT systems|url=https://www.breakingnews.ie/ireland/paul-reid-says-it-could-cost-tens-of-millions-to-fix-hse-it-systems-1128172.html|access-date=2021-05-17|website=BreakingNews.ie|date=17 May 2021 |language=en}}</ref> |
||
A number of news outlets, including ''[[Bleeping Computer]]'', reported that a ransom |
A number of news outlets, including ''[[Bleeping Computer]]'', reported that a ransom demand of €16.5 million (about $20 million) was made, offering to decrypt data and to not publish "private data".<ref>{{cite web|url=https://www.bleepingcomputer.com/news/security/ireland-s-health-services-hit-with-20-million-ransomware-demand/|title=Ireland's Health Services hit with $20 million ransomware demand|website=[[Bleeping Computer]]|first=Lawrence|last=Abrams|date=15 May 2021|access-date=16 May 2021}}</ref><ref>{{cite news|url=https://www.sundayworld.com/news/irish-news/hse-working-torestoreit-systems-amidclaims-hackers-demand20m-for-stolen-data-40431150.html|title=HSE working to restore IT systems amid claims hackers demand $20m for stolen data|publisher=[[Sunday World]]|first=Adrian|last=Weckler|date=16 May 2021|access-date=16 May 2021}}</ref><ref name="thejournal16">{{cite news|url=https://www.thejournal.ie/hse-cyber-attack-cancelled-appointments-5438671-May2021/|title=HSE won't comment on ransom figure, as staff are told to 'protect urgent care'|publisher=[[TheJournal.ie]]|first1=Órla|last1=Ryan|first2=Garreth|last2=MacNamee|first3=Tadgh|last3=McNally|first4=Niall|last4=O'Connor|date=16 May 2021|access-date=16 May 2021}}</ref> Initially, the ''[[Business Post]]'' reported that a ransom demand of three [[bitcoin]] or €124,000 (about $150,000) was made.<ref>{{Cite news|last1=Woods|first1=Killian|last2=Ryan|first2=Emmet|last3=Rogan|first3=Aaron|title=Hackers of HSE computer system demanded bitcoin ransom worth $150,000|publisher=[[Business Post]]|url=https://www.businesspost.ie/technology/hackers-of-hse-computer-system-demanded-bitcoin-ransom-worth-150000-242b03ae|access-date=2021-05-16}}</ref> [[Taoiseach]] [[Micheál Martin]] stated the ransom would not be paid, with the attack instead being dealt with in a "methodical way".<ref>{{Cite news|last=Aodha|first=Gráinne Ní|title=HSE confirms ransom has been sought over cyber attack but says it will not be paid|url=https://www.thejournal.ie/hse-cyber-attack-5436981-May2021/|access-date=2021-05-14|publisher=[[TheJournal.ie]]|language=en}}</ref><ref>{{Cite news|last1=Horgan-Jones|first1=Jack|last2=Burns|first2=Sarah|last3=Lally|first3=Conor|last4=Cullen|first4=Paul|title=Bitcoin ransom will not be paid following cyber attack on HSE computer systems|url=https://www.irishtimes.com/news/health/bitcoin-ransom-will-not-be-paid-following-cyber-attack-on-hse-computer-systems-1.4564957|access-date=15 May 2021|publisher=[[The Irish Times]]|language=en}}</ref> |
||
American cybersecurity firms [[McAfee]] and [[FireEye]] were contracted by the HSE after the attack to mitigate the damage, and to monitor [[dark web]] sites for leaked data.<ref>{{Cite news|last1=Gallagher|first1=Conor|last2=McQuinn|first2=Cormac|title=Dark web 'dump sites' being monitored for HSE data after hack|url=https://www.irishtimes.com/news/crime-and-law/dark-web-dump-sites-being-monitored-for-hse-data-after-hack-1.4567731|access-date=20 May 2021|publisher=[[The Irish Times]]|language=en}}</ref> |
American cybersecurity firms [[McAfee]] and [[FireEye]] were contracted by the HSE after the attack to mitigate the damage, and to monitor [[dark web]] sites for leaked data.<ref>{{Cite news|last1=Gallagher|first1=Conor|last2=McQuinn|first2=Cormac|title=Dark web 'dump sites' being monitored for HSE data after hack|url=https://www.irishtimes.com/news/crime-and-law/dark-web-dump-sites-being-monitored-for-hse-data-after-hack-1.4567731|access-date=20 May 2021|publisher=[[The Irish Times]]|language=en}}</ref> |
||
On 16 May, it was reported that the [[Department of Social Protection]] came under "sustained and fierce attack" but the highly |
On 16 May, it was reported that the [[Department of Social Protection]] came under "sustained and fierce attack" but the highly organised criminal group were unable to breach the security. The department subsequently suspended its electronic communication channels with the HSE.<ref>{{cite news|last=O'Shea|first=Cormac|date=16 May 2021|title=Hackers tried to breach social welfare system before HSE attack|publisher=[[Irish Mirror]]|url=https://www.irishmirror.ie/news/irish-news/hackers-tried-breach-social-welfare-24119744|access-date=16 May 2021}}</ref><ref name="thejournal16"/> |
||
On 20 May, [[Minister for the Environment, Climate and Communications|Minister for Communications]] [[Eamon Ryan]] said a helpline was to be set up to assist individuals who have had health information published as a result of the hack, and that [[social media]] companies were asked to not share information that has been released,<ref>{{Cite news|last=McConnell|first=Daniel|date=20 May 2021|title=Helpline for people whose health information will be published by cybercrime gang|language=en|publisher=[[Irish Examiner]]|url=https://www.irishexaminer.com/news/arid-40294274.html|access-date=20 May 2021}}</ref> with a [[High Court (Ireland)|High Court]] |
On 20 May, [[Minister for the Environment, Climate and Communications|Minister for Communications]] [[Eamon Ryan]] said a helpline was to be set up to assist individuals who have had health information published as a result of the hack, and that [[social media]] companies were asked to not share information that has been released,<ref>{{Cite news|last=McConnell|first=Daniel|date=20 May 2021|title=Helpline for people whose health information will be published by cybercrime gang|language=en|publisher=[[Irish Examiner]]|url=https://www.irishexaminer.com/news/arid-40294274.html|access-date=20 May 2021}}</ref> with a [[High Court (Ireland)|High Court]] injunction obtained by the HSE to prohibit the sharing of this information.<ref>{{Cite news|last=Carolan|first=Mary|title=HSE secures injunctions restraining sharing of hacked data|url=https://www.irishtimes.com/news/crime-and-law/courts/high-court/hse-secures-injunctions-restraining-sharing-of-hacked-data-1.4570769|date=20 May 2021|access-date=20 May 2021|publisher=[[The Irish Times]]|language=en}}</ref><ref>{{Cite news|date=20 May 2021|title=HSE secures injunction against sharing of stolen data|publisher=[[RTÉ News and Current Affairs]]|url=https://www.rte.ie/news/health/2021/0520/1222928-hse-cyber-attack/|access-date=20 May 2021}}</ref> On the same day, it was reported that the [[Wizard Spider|organised cyber crime group]] provided a [[decryption key]] that could enable the HSE to recover their IT systems and the files that hackers locked and encrypted.<ref>{{cite news|url=https://www.rte.ie/news/2021/0520/1222857-hse-weekly-briefing/|title=IT experts testing decryption key sent by criminals behind cyber attack|publisher=[[RTÉ News and Current Affairs]]|first=Paul|last=Reynolds|date=20 May 2021|access-date=20 May 2021}}</ref><ref>{{cite news|url=https://www.irishtimes.com/news/crime-and-law/cyber-gang-provides-decryption-tool-to-unlock-hse-systems-1.4570765|title=Cyber gang provides decryption tool to unlock HSE systems|publisher=[[The Irish Times]]|first=Conor|last=Lally|date=20 May 2021|access-date=20 May 2021}}</ref> Meanwhile, the public was advised by Gardaí to be aware of a number of call and text scams in the wake of the cyber attack amid warnings the delivery of care in the health service would be a high risk for weeks;<ref>{{cite news|url=https://www.independent.ie/irish-news/hse-and-gardai-investigate-scam-texts-and-emails-in-wake-of-health-service-cyber-attack-40450116.html|title=HSE and gardaí investigate scam texts and emails in wake of health service cyber-attack|publisher=[[Irish Independent]]|first=Eilish|last=O'Regan|date=20 May 2021|access-date=20 May 2021}}</ref><ref>{{cite news|url=https://www.thejournal.ie/hse-hack-scammers-5443123-May2021/|title=Warning as fraudsters see HSE hack as opportunity to scam people with calls and texts|publisher=[[TheJournal.ie]]|first=Michelle|last=Hennessy|date=20 May 2021|access-date=20 May 2021}}</ref> as of 24 May, the Garda Síochána have described any calls threatening the release of information as "opportunistic", stating they do not have access to private data.<ref>{{Cite news|last=Reynolds|first=Paul|date=24 May 2021|title=Gardaí not aware of any stolen HSE data published online|work=[[RTÉ]]|url=https://www.rte.ie/news/health/2021/0524/1223542-cyber-attack/|access-date=24 May 2021}}</ref> |
||
On 27 May, the Chief Executive of the HSE – [[Paul Reid (HSE)|Paul Reid]] – said that the cost of the cyber attack on its IT systems could exceed €100 million.<ref>{{cite news|url=https://www.irishtimes.com/news/health/cyberattack-will-cost-hse-at-least-100-million-to-restore-and-upgrade-network-1.4577076|title=Cyberattack will cost HSE at least €100 million to restore and upgrade network|publisher=[[The Irish Times]]|first=Paul|last=Cullen|date=27 May 2021| |
On 27 May, the Chief Executive of the HSE – [[Paul Reid (HSE)|Paul Reid]] – said that the cost of the cyber attack on its IT systems could exceed €100 million.<ref>{{cite news|url=https://www.irishtimes.com/news/health/cyberattack-will-cost-hse-at-least-100-million-to-restore-and-upgrade-network-1.4577076|title=Cyberattack will cost HSE at least €100 million to restore and upgrade network|publisher=[[The Irish Times]]|first=Paul|last=Cullen|date=27 May 2021|access-date=27 May 2021}}</ref> |
||
The Defence Forces' [[Communications & Information Services Corps|CIS Corps]] deployed 'ethical hackers' to fight back against the ransomware attack and sent CIS personnel to hospitals and HSE offices in order to decrypt devices affected onsite. Army Reservists were particularly useful to this effort due to their cybersecurity skills and experienced gleaned from the private sector during their day jobs.<ref>{{cite news |last1=O'Connor |first1=Niall |title=Defence Forces deployed 'ethical hackers' to fight back against massive HSE cyber attack |url=https://www.thejournal.ie/defence-forces-cis-how-they-fought-the-hse-cyber-attack-5499730-Jul2021/ |access-date=20 August 2021 |publisher=[[TheJournal.ie]] |date=20 July 2021}}</ref><ref>{{cite news |title=Cyber Security in the Defence Forces |url=https://play.acast.com/s/the-irish-defence-forces-podcast/s3ep10-cyber-security-in-the-defence-forces |access-date=20 August 2021 |publisher=Defence Forces Public Relations Branch |date=16 July 2021}}</ref> |
The Defence Forces' [[Communications & Information Services Corps|CIS Corps]] deployed 'ethical hackers' to fight back against the ransomware attack and sent CIS personnel to hospitals and HSE offices in order to decrypt devices affected onsite. Army Reservists were particularly useful to this effort due to their cybersecurity skills and experienced gleaned from the private sector during their day jobs.<ref>{{cite news |last1=O'Connor |first1=Niall |title=Defence Forces deployed 'ethical hackers' to fight back against massive HSE cyber attack |url=https://www.thejournal.ie/defence-forces-cis-how-they-fought-the-hse-cyber-attack-5499730-Jul2021/ |access-date=20 August 2021 |publisher=[[TheJournal.ie]] |date=20 July 2021}}</ref><ref>{{cite news |title=Cyber Security in the Defence Forces |url=https://play.acast.com/s/the-irish-defence-forces-podcast/s3ep10-cyber-security-in-the-defence-forces |access-date=20 August 2021 |publisher=Defence Forces Public Relations Branch |date=16 July 2021}}</ref> |
||
On 5 September, during a major operation carried out by Gardaí targeting the gang behind the ransomware attack, the Garda National Cyber Crime Bureau seized several domains used in the cyberattack and other ransomware attacks.<ref>{{cite news|url=https://www.rte.ie/news/ireland/2021/0905/1244805-cyber-attack-gardai/|title=IT infrastructure of crime group 'significantly disrupted' by gardaí|publisher=[[RTÉ News and Current Affairs]]|first=Colman|last=O'Sullivan|date=5 September 2021| |
On 5 September, during a major operation carried out by Gardaí targeting the gang behind the ransomware attack, the Garda National Cyber Crime Bureau seized several domains used in the cyberattack and other ransomware attacks.<ref>{{cite news|url=https://www.rte.ie/news/ireland/2021/0905/1244805-cyber-attack-gardai/|title=IT infrastructure of crime group 'significantly disrupted' by gardaí|publisher=[[RTÉ News and Current Affairs]]|first=Colman|last=O'Sullivan|date=5 September 2021|access-date=5 September 2021}}</ref> |
||
===PricewaterhouseCoopers report=== |
===PricewaterhouseCoopers report=== |
||
On 10 December a report by [[PricewaterhouseCoopers]] was released which revealed that the attackers were in the HSE computer systems eight weeks before the attack was initiated.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks>{{Cite news|title=HSE hackers were in health service's computer system for eight weeks before cyber attack|url=https://www.thejournal.ie/hse-hack-report-5626054-Dec2021/|last=McNally|first=Tadgh|date=2021-12-10|access-date=2021-12-10|work=[[TheJournal.ie]]}}</ref> The report said that the HSE legacy IT system was not resilient against cyberattacks.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> It had evolved over time but had not been designed to resist attacks.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> |
On 10 December a report by [[PricewaterhouseCoopers]] was released which revealed that the attackers were in the HSE computer systems eight weeks before the attack was initiated.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks>{{Cite news|title=HSE hackers were in health service's computer system for eight weeks before cyber attack|url=https://www.thejournal.ie/hse-hack-report-5626054-Dec2021/|last=McNally|first=Tadgh|date=2021-12-10|access-date=2021-12-10|work=[[TheJournal.ie]]}}</ref> The report said that the HSE legacy IT system was not resilient against cyberattacks.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> It had evolved over time but had not been designed to resist attacks.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> |
||
HSE CEO Paul Reid said that the system had not been strategically designed, but was the result of amalgamation of health boards, hospital groups and Community Healthcare Organisations.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> The system is very fragmented and siloed.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> In contrast, the HSE staff were described as resilient, working quickly to ensure continuity of services.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> Reid also said that the HSE has initiated a number of actions to mitigate future attacks.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> These include a 24 |
HSE CEO Paul Reid said that the system had not been strategically designed, but was the result of amalgamation of health boards, hospital groups and Community Healthcare Organisations.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> The system is very fragmented and siloed.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> In contrast, the HSE staff were described as resilient, working quickly to ensure continuity of services.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> Reid also said that the HSE has initiated a number of actions to mitigate future attacks.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> These include a 24-hour monitoring system for IT systems in the HSE and more multi-factor authentication for users.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> |
||
HSE chairman Ciarán Devine said that the heath service still feels the impact of the attack.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> |
HSE chairman Ciarán Devine said that the heath service still feels the impact of the attack.<ref name=tj-hse-hackers-were-in-health-services-computers-for-eight-weeks/> |
||
Line 199: | Line 198: | ||
==Department of Health cyberattack== |
==Department of Health cyberattack== |
||
On 13 May, the [[National Cyber Security Centre (Ireland)|National Cyber Security Centre]] (NCSC) was alerted of "suspicious activity" on [[Department of Health (Ireland)|Department of Health]] systems, and in the morning of 14 May an attempt to run ransomware was prevented, with Department of Health IT systems shut down as a precaution.<ref name="thejournal16" /><ref>{{cite news|last=Lally|first=Conor|date=16 May 2021|title=Department of Health hit by cyberattack similar to that on HSE|publisher=[[The Irish Times]]|url=https://www.irishtimes.com/news/health/department-of-health-hit-by-cyberattack-similar-to-that-on-hse-1.4566541| |
On 13 May, the [[National Cyber Security Centre (Ireland)|National Cyber Security Centre]] (NCSC) was alerted of "suspicious activity" on [[Department of Health (Ireland)|Department of Health]] systems, and in the morning of 14 May an attempt to run ransomware was prevented, with Department of Health IT systems shut down as a precaution.<ref name="thejournal16" /><ref>{{cite news|last=Lally|first=Conor|date=16 May 2021|title=Department of Health hit by cyberattack similar to that on HSE|publisher=[[The Irish Times]]|url=https://www.irishtimes.com/news/health/department-of-health-hit-by-cyberattack-similar-to-that-on-hse-1.4566541|access-date=16 May 2021}}</ref><ref>{{cite news|last1=Moloney|first1=Eoghan|last2=Molony|first2=Senan|last3=Schiller|first3=Robin|date=16 May 2021|title=Department of Health subjected to separate cyber attack|publisher=[[Irish Independent]]|url=https://www.independent.ie/irish-news/department-of-health-subjected-toseparate-cyber-attack-40431351.html|access-date=16 May 2021}}</ref> A preliminary investigation by the NCSC showed the use of [[Remote desktop software|remote access tool]] Cobalt Strike, sold by American technology company HelpSystems,<ref>{{Cite web|last=Corfield|first=Gareth|title=We need to talk about criminal hackers using Cobalt Strike, says Cisco Talos|url=https://www.theregister.com/2020/09/24/cobalt_strike_cisco_talos/|access-date=2021-05-21|website=www.theregister.com|language=en}}</ref> to infect systems and execute the ransomware payload.<ref name=":5">{{Cite web|date=16 May 2021|title=Ransomware Attack on Health Sector - UPDATE 2021-05-16|url=https://www.ncsc.gov.ie/pdfs/HSE_Conti_140521_UPDATE.pdf|url-status=live|archive-url=https://web.archive.org/web/20210519143439/https://www.ncsc.gov.ie/pdfs/HSE_Conti_140521_UPDATE.pdf|archive-date=19 May 2021|access-date=21 May 2021|website=[[National Cyber Security Centre (Ireland)]]}}</ref> |
||
According to [[RTÉ News and Current Affairs|RTÉ News]], a digital note from the cyber crime group believed to be responsible was left on the Department's IT systems, similar to the one discovered at the HSE.<ref>{{cite news|url=https://www.rte.ie/news/ireland/2021/0516/1221933-dept-of-health/|title=Dept of Health responding to cyber attack since Thursday|publisher=[[RTÉ News and Current Affairs]]|first=Paul|last=Reynolds|date=16 May 2021| |
According to [[RTÉ News and Current Affairs|RTÉ News]], a digital note from the cyber crime group believed to be responsible was left on the Department's IT systems, similar to the one discovered at the HSE.<ref>{{cite news|url=https://www.rte.ie/news/ireland/2021/0516/1221933-dept-of-health/|title=Dept of Health responding to cyber attack since Thursday|publisher=[[RTÉ News and Current Affairs]]|first=Paul|last=Reynolds|date=16 May 2021|access-date=16 May 2021}}</ref> |
||
==Restoration of systems== |
==Restoration of systems== |
||
On 23 June 2021, it was confirmed that at least three quarters of the HSE's IT servers had been decrypted and 70% of computer devices were back in use.<ref>{{cite news|url=https://www.rte.ie/news/politics/2021/0622/1230770-hse-oireachtas-committee/|title=Three quarters of HSE IT servers decrypted|publisher=[[RTÉ News and Current Affairs]]|first=Tommy|last=Meskill|date=23 June 2021| |
On 23 June 2021, it was confirmed that at least three quarters of the HSE's IT servers had been decrypted and 70% of computer devices were back in use.<ref>{{cite news|url=https://www.rte.ie/news/politics/2021/0622/1230770-hse-oireachtas-committee/|title=Three quarters of HSE IT servers decrypted|publisher=[[RTÉ News and Current Affairs]]|first=Tommy|last=Meskill|date=23 June 2021|access-date=23 June 2021}}</ref><ref>{{cite news|url=https://www.thejournal.ie/75-it-servers-restored-cyber-attack-5474660-Jun2021/|title=Three quarters of HSE IT servers decrypted following crippling cyber attack|publisher=[[TheJournal.ie]]|first=Céimin|last=Burke|date=23 June 2021|access-date=23 June 2021}}</ref><ref>{{cite news|url=https://www.newstalk.com/news/hse-cyber-attack-around-75-of-systems-now-unlocked-but-weeks-of-disruption-still-ahead-1214684|title=HSE cyberattack: 'Many more weeks' before health services return to normal|publisher=[[Newstalk]]|first=Eoghan|last=Murphy|date=23 June 2021|access-date=23 June 2021}}</ref> By 15 July, this had risen to 82% of servers and 83% of devices.<ref>{{cite news |last1=Bowers |first1=Shauna |title=HSE cyberattack: 82% of servers now decrypted |url=https://www.irishexaminer.com/news/arid-40338074.html |publisher=[[Irish Examiner]] |date=15 July 2021}}</ref> By September, over 95% of all servers and devices had been restored.<ref name="bbc">{{cite news|url=https://www.bbc.com/news/world-europe-58413448|title=HSE cyber-attack: Irish health service still recovering months after hack|publisher=[[BBC News]]|first=Michael|last=Sheils McNamee|date=5 September 2021|access-date=5 September 2021}}</ref> |
||
==Legal action== |
==Legal action== |
||
On 25 June 2021, [[High Court (Ireland)|High Court]] judge [[Tony O'Connor (judge)|Tony O'Connor]] was told that approximately 27 files stolen from the HSE were placed on a malware analysis service [[VirusTotal]] in late May.<ref name=ie-hse-seeks-order-to-find-who-uploaded-or-downloaded-files>{{Cite news|title=HSE seeks order to help find who uploaded or downloaded files stolen in cyberattack|url=https://www.irishexaminer.com/news/courtandcrime/arid-40322462.html|last=O’Loughlin|first=Ann|date=25 June 2021|access-date=26 June 2021|publisher=[[Irish Examiner]]}}</ref><ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files>{{Cite news|title=Cyberattack: HSE seeks court orders to help identify those who accessed stolen files|url=https://www.irishtimes.com/news/crime-and-law/courts/high-court/cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files-1.4603522|last=O'Faolain|first=Aodhan|date=25 June 2021|access-date=26 June 2021|publisher=[[The Irish Times]]}}</ref> VirusTotal is owned and run by Chronicle Security Ireland Ltd, |
On 25 June 2021, [[High Court (Ireland)|High Court]] judge [[Tony O'Connor (judge)|Tony O'Connor]] was told that approximately 27 files stolen from the HSE were placed on a malware analysis service [[VirusTotal]] in late May.<ref name=ie-hse-seeks-order-to-find-who-uploaded-or-downloaded-files>{{Cite news|title=HSE seeks order to help find who uploaded or downloaded files stolen in cyberattack|url=https://www.irishexaminer.com/news/courtandcrime/arid-40322462.html|last=O’Loughlin|first=Ann|date=25 June 2021|access-date=26 June 2021|publisher=[[Irish Examiner]]}}</ref><ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files>{{Cite news|title=Cyberattack: HSE seeks court orders to help identify those who accessed stolen files|url=https://www.irishtimes.com/news/crime-and-law/courts/high-court/cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files-1.4603522|last=O'Faolain|first=Aodhan|date=25 June 2021|access-date=26 June 2021|publisher=[[The Irish Times]]}}</ref> VirusTotal is owned and run by Chronicle Security Ireland Ltd, its US parent Chronicle LLC and ultimately Google.<ref>{{cite web|url=https://support.virustotal.com/hc/en-us/articles/115002145529-Terms-of-Service|title=Terms of Service – VirusTotal|website=[[VirusTotal]]|access-date=27 June 2021}}</ref> The stolen files included confidential patient information and was downloaded 23 times before the files were removed on 25 May.<ref>{{cite news|url=https://www.thejournal.ie/hse-cyber-attack-data-downloaded-high-court-5477678-Jun2021/|title=Data stolen in HSE cyber attack downloaded 23 times before being removed, High Court told|publisher=[[TheJournal.ie]]|first=Aodhan|last=O'Faolain|date=25 June 2021|access-date=27 June 2021}}</ref> |
||
The defendants – Chronicle Security Ireland and Chronicle LLC – said they wanted to help the HSE as much as possible, but for data protection reasons cannot hand material over unless a court orders them. Therefore, the HSE sought [[Norwich Pharmacal order]]s against the defendants to require them to provide information on those who uploaded or downloaded the stolen information. The orders would require the defendants to supply the HSE with the unknown users' email addresses, phone numbers, IP addresses or physical addresses.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
The defendants – Chronicle Security Ireland and Chronicle LLC – said they wanted to help the HSE as much as possible, but for data protection reasons cannot hand material over unless a court orders them. Therefore, the HSE sought [[Norwich Pharmacal order]]s against the defendants to require them to provide information on those who uploaded or downloaded the stolen information. The orders would require the defendants to supply the HSE with the unknown users' email addresses, phone numbers, IP addresses or physical addresses.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
||
The HSE's national director for operation performance and integration – Joe Ryan – said the HSE became aware that the ''[[Financial Times]]'' had published an article referring to stolen data and mentioning a link to stolen data. The HSE sought the return of the stolen data and an explanation to the link location but the ''Financial Times'' indicated it had received the information from a confidential source which they refused to reveal.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
The HSE's national director for operation performance and integration – Joe Ryan – said the HSE became aware that the ''[[Financial Times]]'' had published an article referring to stolen data and mentioning a link to stolen data. The HSE sought the return of the stolen data and an explanation to the link location but the ''Financial Times'' indicated it had received the information from a confidential source which they refused to reveal.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
||
On 20 May 2021, the HSE had obtained a court order restraining any processing, publishing, sharing or selling of stolen data. When the ''Financial Times'' received a copy of the order, they handed over the information they got from the source to the HSE computer security advisers. Analysis of this material revealed that the stolen data had been uploaded to VirusTotal.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
On 20 May 2021, the HSE had obtained a court order restraining any processing, publishing, sharing or selling of stolen data. When the ''Financial Times'' received a copy of the order, they handed over the information they got from the source to the HSE computer security advisers. Analysis of this material revealed that the stolen data had been uploaded to VirusTotal.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
||
Ryan said that after they were contacted, the defendants deleted the stolen data from their servers.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
Ryan said that after they were contacted, the defendants deleted the stolen data from their servers.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
||
Counsel for the HSE told the judge that the matter was urgent but hoped that the matter could be finalised when the matter next comes before the court. The defendant's lawyers said they were unlikely to oppose any order in an agreed form from the HSE to disclose information. The judge, on an [[ex parte]] basis, granted counsel permission to serve short notice of the proceedings on the defendants and resumed the matter the following week.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
Counsel for the HSE told the judge that the matter was urgent but hoped that the matter could be finalised when the matter next comes before the court. The defendant's lawyers said they were unlikely to oppose any order in an agreed form from the HSE to disclose information. The judge, on an [[ex parte]] basis, granted counsel permission to serve short notice of the proceedings on the defendants and resumed the matter the following week.<ref name=it-high-court-cyberattack-hse-seeks-court-orders-to-help-identify-those-who-accessed-stolen-files/> |
||
==Notification of affected people== |
|||
On 9 February 2023, it was revealed that over 32,000 notification letters were issued to people who had their data stolen in the cyber attack. More than 100,000 letters are to be sent to people affected by the attack by April 2023. [[Dáil Éireann]]'s Public Accounts Committee examined the financial impact and heard that the immediate response cost the Department of Health €1 million and cost the HSE €53 million.<ref>{{cite news|url=https://www.rte.ie/news/business/2023/0209/1355572-pac-hse-cyberattack/|title=HSE cyber attack: 32,000 notified of stolen data|publisher=[[RTÉ News]]|first=Brian|last=O'Donovan|date=9 February 2023|access-date=9 February 2023}}</ref> |
|||
==Impact on cancer treatment== |
|||
A research team led by Prof Seamus O'Reilly of Cork University Hospital found that in ten cancer trials units (three private, seven public) only two privately-run units had a preparedness plan in place before the attack.<ref name=imt-cyber-attack-had-an-effect-on-cancer-care-worse-than-covid>{{Cite news |title=Cyber-attack had an effect on cancer care 'worse than Covid' |url=https://www.imt.ie/news/cyber-attack-had-an-effect-on-cancer-care-worse-than-covid-21-03-2024/ |last=McHale |first=Michael |date=2024-03-21 |access-date=2024-03-22 |work=[[Irish Medical Times]]}}</ref> Three of the remaining sites have implemented a plan or are doing so, while file do not have a plan.<ref name=imt-cyber-attack-had-an-effect-on-cancer-care-worse-than-covid/> |
|||
The report also found that patient referrals to cancer clinical trials fell by 85 percent and trial recruitment fell by 55 percent.<ref name=imt-cyber-attack-had-an-effect-on-cancer-care-worse-than-covid/> |
|||
513 patients around Ireland had their radiation therapy interrupted.<ref name=imt-cyber-attack-had-an-effect-on-cancer-care-worse-than-covid/> |
|||
The attack came at the end of the third wave of COVID-19 and 'severely challenged the resilience of the already exhausted staff'.<ref name=imt-cyber-attack-had-an-effect-on-cancer-care-worse-than-covid/> |
|||
Professor O'Reilly said "Covid-19 as an oncologist made me do things professionally that I don’t want to do again. But the cyber-attack was worse than Covid" to the Policy Forum for Ireland keynote seminar ‘Next steps for cancer services in Ireland’.<ref name=imt-cyber-attack-had-an-effect-on-cancer-care-worse-than-covid/> He also said "It was a very difficult time. Results were frozen on the computer. Our ways of communicating with people were compromised, and we had no access to old information. We had patients who had scans done and the scans were trapped on the machine. It was very challenging for patients because they would turn up at clinics and there would be no records of them coming there or needing to be there. We would have had to send patients home to their GP to get their medical record details, get them printed out at their GP’s office and bring them back to us so we could look after them at the hospital."<ref name=imt-cyber-attack-had-an-effect-on-cancer-care-worse-than-covid/> |
|||
He said that the HSE had improved cybersecurity but warned against complacency.<ref name=imt-cyber-attack-had-an-effect-on-cancer-care-worse-than-covid/> He said "I think cyber-attacks are becoming more common and more sophisticated, so we’re still vulnerable to them, we’re probably more vulnerable now than we were in May of 2021. A cyber-attack now takes less than 24 hours to activate. the one we had in May 2021; it was embedding for two months. I think we we’re always going to be vulnerable to a cyber-attack. Systems have become more sophisticated to get around whatever we do."<ref name=imt-cyber-attack-had-an-effect-on-cancer-care-worse-than-covid/> |
|||
==Legal actions== |
|||
In May 2024 473 legal actions were reported to have been taken against the HSE in relation to the attack.<ref name=rte-news-473-legal-actions>{{Cite news |title=More than 470 legal actions taken against HSE over cyberattack |url=https://www.rte.ie/news/ireland/2024/0514/1448972-hse-cyber/ |last=O'Donovan |first=Brian |date=2024-05-14 |access-date=2024-05-14 |publisher=[[RTÉ News]]}}</ref> The State Claims Agency is managing 12 personal injury cases against the HSE in relation to the attack, where legal proceedings were being served in 11 cases.<ref name=rte-news-473-legal-actions/> The personal injury cases are related to the psychological impact of the attack.<ref name=rte-news-473-legal-actions/> There are a number of cases before the [[Court of Justice of the European Union]] related to the attack.<ref name=rte-news-473-legal-actions/> |
|||
==See also== |
==See also== |
||
* [[Colonial Pipeline cyberattack]] |
* [[Colonial Pipeline cyberattack]] |
||
Line 226: | Line 241: | ||
==References== |
==References== |
||
{{reflist}} |
{{reflist}} |
||
==External links== |
==External links== |
||
*[https://www.hse.ie/eng/services/publications/conti-cyber-attack-on-the-hse-full-report.pdf Conti cyber attack on the HSE Independent Post Incident Report (Redacted)] |
*[https://www.hse.ie/eng/services/publications/conti-cyber-attack-on-the-hse-full-report.pdf Conti cyber attack on the HSE Independent Post Incident Report (Redacted)] - copy of [[PwC|Price WaterhouseCoopers International]] report on attack |
||
*[https://www.audit.gov.ie/en/find-report/publications/2022/12-financial-impact-of-cyber-security-attack.pdf Financial impact of cyber security attack] - chapter 12 of ''[https://www.audit.gov.ie/en/publications/report%20on%20the%20accounts%20of%20the%20public%20services/report-on-the-accounts-of-the-public-services-2021.html Report on the accounts of the Public Services 2021]'' report on gov.ie |
|||
⚫ | |||
*[https://www.aha.org/system/files/media/file/2022/02/hhs-ocio-hc3-tlp-white-threat-brief-lessons-learned-from-the-hse-attack-2-3-22.pdf Lessons Learned from the HSE Cyber Attack] - from [[American Hospital Association]] |
|||
⚫ | |||
{{Use dmy dates|date=May 2021}} |
{{Use dmy dates|date=May 2021}} |
||
{{Hacking in the 2020s}} |
{{Hacking in the 2020s}} |
||
Line 235: | Line 253: | ||
[[Category:2021 in computing]] |
[[Category:2021 in computing]] |
||
[[Category:2021 in the Republic of Ireland]] |
[[Category:2021 in the Republic of Ireland]] |
||
[[Category: |
[[Category:2021 crimes in the Republic of Ireland]] |
||
[[Category:Cyberattacks]] |
[[Category:Cyberattacks]] |
||
[[Category:Cybercrime in the Republic of Ireland]] |
[[Category:Cybercrime in the Republic of Ireland]] |
||
[[Category:Data breaches]] |
[[Category:Data breaches]] |
||
[[Category:Hacking in the 2020s]] |
[[Category:Hacking in the 2020s]] |
||
[[Category:May 2021 crimes]] |
[[Category:May 2021 crimes in Europe]] |
||
[[Category:May 2021 events in |
[[Category:May 2021 events in Ireland]] |
||
[[Category:Ransomware]] |
[[Category:Ransomware]] |
||
[[Category:2021 disasters in Ireland]] |
Latest revision as of 08:58, 18 July 2024
Date | 14 May 2021 |
---|---|
Location | Ireland |
Type | Cyberattack, data breach, ransomware using Conti |
Target | |
Outcome |
|
Suspects | Wizard Spider, ContiLocker Team |
On 14 May 2021, the Health Service Executive (HSE) of Ireland suffered a major ransomware cyberattack which caused all of its IT systems nationwide to be shut down.[1][2][3][4]
It was the most significant cybercrime attack on an Irish state agency and the largest known attack against a health service computer system.[5][6] Bloomberg News reported that the attackers used the Conti ransomware.[7] The group responsible was identified as a criminal gang known as Wizard Spider, believed to be operating from Russia.[8][9][10] The same group is believed to have attacked the Department of Health with a similar cyberattack.
On 19 May, the Financial Times reviewed private data for twelve individuals which had appeared online as a result of the breach.[11] On 28 May, the HSE confirmed confidential medical information for 520 patients, as well as corporate documents were published online.[12]
Background
[edit]The attackers began by sending a malicious email to a workstation on 16 March 2021.[13] The email was opened on 18 March.[13] A malicious Microsoft Excel file was downloaded, which allowed the attackers access to HSE systems.[13] The attackers gained more access over the following weeks.[13] The HSE antivirus software detected activity on 31 March, but could not block it as it was set to monitor mode.[13]
On 13 May the cybersecurity provider for the HSE emailed the Security Operations team that there had been unhandled threats on at least 16 systems since 7 May.[13] The Security Operations team had the server team restart servers.[13]
The HSE was alerted to the attack at 4am on 14 May 2021.[14] The attack affected both national and local systems, involved in all core services, with the HSE taking down their IT system in order to protect it from the attack and to give the HSE time to consider options.[15]
The attack occurred during the COVID-19 pandemic. Ireland's COVID-19 vaccination programme was not affected by the attack and proceeded as planned;[7] however, the COVID-19 general practitioner and close contact referral system was down, requiring these individuals to attend walk-in sites rather than attend an appointment.[16][1]
The independent TD (Member of Parliament) Cathal Berry stated that the National Cyber Security Centre which is responsible for the state's cyber security, had only 25 members of staff, a budget of €5 million a year, no dedicated premises, and that its position of Director had been vacant for a year due to its salary of €89,000 a year.[17][18] The National Cyber Security Centre is under the remit of the Department of the Environment, Climate and Communications.[19]
Perpetrator & methodology
[edit]The National Cyber Security Centre identified the penetration testing tool Cobalt Strike, sold by American IT company HelpSystems, as being used to move through and infect HSE and Department of Health systems, to run executable files, and to deploy a variant of the Conti ransomware.[14][20] Cobalt Strike Beacon was detected on infected systems, which allowed them to be controlled and for software to be deployed remotely.[20]
The group responsible was identified as a criminal gang known as Wizard Spider, believed to be operating from Saint Petersburg, Russia.[8][9][10]
Impact
[edit]The ransomware cyber attack had a significant impact on hospital appointments across the country, with many appointments cancelled including all outpatient and radiology services.[21]
Several hospitals described situations where they could not access electronic systems and records and had to rely on paper records.[22] Some have warned of significant disruption with routine appointments being cancelled, including maternity checkups and scans.[23]
The COVID-19 testing referral system was made offline, requiring individuals with suspected cases to attend walk-in COVID-19 testing centres, rather than attend an appointment.[16] The COVID-19 vaccination registration portal was also made offline, but was later back online in the evening.[24]
The Chief Operations Officer of the HSE – Anne O'Connor – said on 14 May that some cancer and stroke services had been affected and that "the situation will be very serious if it continues into Monday [17 May]". She said that the most serious concerns were with diagnostics, with radiology systems having gone down, affecting CT and other scans from going ahead.[25] A large amount of out-patient appointments were also cancelled; most community health services are unaffected.[26] O'Connor also reported that "we don't know what data has been taken", but "we know some data has been compromised", with the Data Protection Commissioner being alerted to the potential breach.[27]
The HSE published a list of affected services on its website at lunchtime on 14 May 2021.[28][29]
On 19 May, the Financial Times reviewed "samples" of private data of twelve individuals that was published online, including admission records and laboratory results for a man admitted to hospital for palliative care. In response, the National Cyber Security Centre stated criminal gangs "habitually release stolen information as a means of pressurising organisations into paying a ransom". The ContiLocker Team claimed to also have staff employment contracts, payroll data and financial statements, patient addresses, and patient phone numbers.[11]
On 28 May, the HSE confirmed that data relating to 520 patients, including sensitive information, was published online.[12][30][31][32]
Hospital disruptions
[edit]In December 2021 the HSE said that it may take up to four months to contact all those whose data was stolen.[33] The Garda National Cyber Crime Bureau received the data from the United States Department of Justice through a mutual legal assistance treaty.[33] The Bureau provided the data to the HSE on 17 December 2021.[33] The HSE confirmed that said data was taken from its computers.[33] The HSE also contacted the Data Protection Commissioner about the data.[33] The data is expected to be a mix of personal data, medical information, HSE corporate information as well as commercial and general personal administrative information.[33]
Response
[edit]The HSE worked with the National Cyber Security Centre, the Garda Síochána, Irish Defence Forces, as well as various partners domestically and internationally, including Europol and Interpol.[14][34]
The Minister of State for Public Procurement and eGovernment – Ossian Smyth – said that the attack was international, not espionage, and that "this is a very significant attack, possibly the most significant cyber attack on the Irish State."[35]
The HSE claimed that it was a zero-day-threat and that there was no experience in how to respond to the attack.[36] The Minister for Health – Stephen Donnelly – said that the attack had "a severe impact" on health and social care services.[36] The Director-General of the HSE – Paul Reid – said that the attack will cost "tens of millions" to fix.[27]
A number of news outlets, including Bleeping Computer, reported that a ransom demand of €16.5 million (about $20 million) was made, offering to decrypt data and to not publish "private data".[37][38][39] Initially, the Business Post reported that a ransom demand of three bitcoin or €124,000 (about $150,000) was made.[40] Taoiseach Micheál Martin stated the ransom would not be paid, with the attack instead being dealt with in a "methodical way".[41][42]
American cybersecurity firms McAfee and FireEye were contracted by the HSE after the attack to mitigate the damage, and to monitor dark web sites for leaked data.[43]
On 16 May, it was reported that the Department of Social Protection came under "sustained and fierce attack" but the highly organised criminal group were unable to breach the security. The department subsequently suspended its electronic communication channels with the HSE.[44][39]
On 20 May, Minister for Communications Eamon Ryan said a helpline was to be set up to assist individuals who have had health information published as a result of the hack, and that social media companies were asked to not share information that has been released,[45] with a High Court injunction obtained by the HSE to prohibit the sharing of this information.[46][47] On the same day, it was reported that the organised cyber crime group provided a decryption key that could enable the HSE to recover their IT systems and the files that hackers locked and encrypted.[48][49] Meanwhile, the public was advised by Gardaí to be aware of a number of call and text scams in the wake of the cyber attack amid warnings the delivery of care in the health service would be a high risk for weeks;[50][51] as of 24 May, the Garda Síochána have described any calls threatening the release of information as "opportunistic", stating they do not have access to private data.[52]
On 27 May, the Chief Executive of the HSE – Paul Reid – said that the cost of the cyber attack on its IT systems could exceed €100 million.[53]
The Defence Forces' CIS Corps deployed 'ethical hackers' to fight back against the ransomware attack and sent CIS personnel to hospitals and HSE offices in order to decrypt devices affected onsite. Army Reservists were particularly useful to this effort due to their cybersecurity skills and experienced gleaned from the private sector during their day jobs.[54][55]
On 5 September, during a major operation carried out by Gardaí targeting the gang behind the ransomware attack, the Garda National Cyber Crime Bureau seized several domains used in the cyberattack and other ransomware attacks.[56]
PricewaterhouseCoopers report
[edit]On 10 December a report by PricewaterhouseCoopers was released which revealed that the attackers were in the HSE computer systems eight weeks before the attack was initiated.[13] The report said that the HSE legacy IT system was not resilient against cyberattacks.[13] It had evolved over time but had not been designed to resist attacks.[13]
HSE CEO Paul Reid said that the system had not been strategically designed, but was the result of amalgamation of health boards, hospital groups and Community Healthcare Organisations.[13] The system is very fragmented and siloed.[13] In contrast, the HSE staff were described as resilient, working quickly to ensure continuity of services.[13] Reid also said that the HSE has initiated a number of actions to mitigate future attacks.[13] These include a 24-hour monitoring system for IT systems in the HSE and more multi-factor authentication for users.[13]
HSE chairman Ciarán Devine said that the heath service still feels the impact of the attack.[13]
The HSE has accepted a number of recommendations from the report, including the development of a significant new investment plan and transforming legacy IT to include security.[13]
New roles of Chief Technology and Transformation Officer and Chief Information Security Officer are to be created.[13]
The report also recommends security crisis management plans to ensure that responses to futures attacks are properly managed.[13]
The use of ethical hackers to test system security will be increased.[13]
Department of Health cyberattack
[edit]On 13 May, the National Cyber Security Centre (NCSC) was alerted of "suspicious activity" on Department of Health systems, and in the morning of 14 May an attempt to run ransomware was prevented, with Department of Health IT systems shut down as a precaution.[39][57][58] A preliminary investigation by the NCSC showed the use of remote access tool Cobalt Strike, sold by American technology company HelpSystems,[59] to infect systems and execute the ransomware payload.[20]
According to RTÉ News, a digital note from the cyber crime group believed to be responsible was left on the Department's IT systems, similar to the one discovered at the HSE.[60]
Restoration of systems
[edit]On 23 June 2021, it was confirmed that at least three quarters of the HSE's IT servers had been decrypted and 70% of computer devices were back in use.[61][62][63] By 15 July, this had risen to 82% of servers and 83% of devices.[64] By September, over 95% of all servers and devices had been restored.[65]
Legal action
[edit]On 25 June 2021, High Court judge Tony O'Connor was told that approximately 27 files stolen from the HSE were placed on a malware analysis service VirusTotal in late May.[66][67] VirusTotal is owned and run by Chronicle Security Ireland Ltd, its US parent Chronicle LLC and ultimately Google.[68] The stolen files included confidential patient information and was downloaded 23 times before the files were removed on 25 May.[69]
The defendants – Chronicle Security Ireland and Chronicle LLC – said they wanted to help the HSE as much as possible, but for data protection reasons cannot hand material over unless a court orders them. Therefore, the HSE sought Norwich Pharmacal orders against the defendants to require them to provide information on those who uploaded or downloaded the stolen information. The orders would require the defendants to supply the HSE with the unknown users' email addresses, phone numbers, IP addresses or physical addresses.[67]
The HSE's national director for operation performance and integration – Joe Ryan – said the HSE became aware that the Financial Times had published an article referring to stolen data and mentioning a link to stolen data. The HSE sought the return of the stolen data and an explanation to the link location but the Financial Times indicated it had received the information from a confidential source which they refused to reveal.[67]
On 20 May 2021, the HSE had obtained a court order restraining any processing, publishing, sharing or selling of stolen data. When the Financial Times received a copy of the order, they handed over the information they got from the source to the HSE computer security advisers. Analysis of this material revealed that the stolen data had been uploaded to VirusTotal.[67]
Ryan said that after they were contacted, the defendants deleted the stolen data from their servers.[67]
Counsel for the HSE told the judge that the matter was urgent but hoped that the matter could be finalised when the matter next comes before the court. The defendant's lawyers said they were unlikely to oppose any order in an agreed form from the HSE to disclose information. The judge, on an ex parte basis, granted counsel permission to serve short notice of the proceedings on the defendants and resumed the matter the following week.[67]
Notification of affected people
[edit]On 9 February 2023, it was revealed that over 32,000 notification letters were issued to people who had their data stolen in the cyber attack. More than 100,000 letters are to be sent to people affected by the attack by April 2023. Dáil Éireann's Public Accounts Committee examined the financial impact and heard that the immediate response cost the Department of Health €1 million and cost the HSE €53 million.[70]
Impact on cancer treatment
[edit]A research team led by Prof Seamus O'Reilly of Cork University Hospital found that in ten cancer trials units (three private, seven public) only two privately-run units had a preparedness plan in place before the attack.[71] Three of the remaining sites have implemented a plan or are doing so, while file do not have a plan.[71]
The report also found that patient referrals to cancer clinical trials fell by 85 percent and trial recruitment fell by 55 percent.[71]
513 patients around Ireland had their radiation therapy interrupted.[71]
The attack came at the end of the third wave of COVID-19 and 'severely challenged the resilience of the already exhausted staff'.[71]
Professor O'Reilly said "Covid-19 as an oncologist made me do things professionally that I don’t want to do again. But the cyber-attack was worse than Covid" to the Policy Forum for Ireland keynote seminar ‘Next steps for cancer services in Ireland’.[71] He also said "It was a very difficult time. Results were frozen on the computer. Our ways of communicating with people were compromised, and we had no access to old information. We had patients who had scans done and the scans were trapped on the machine. It was very challenging for patients because they would turn up at clinics and there would be no records of them coming there or needing to be there. We would have had to send patients home to their GP to get their medical record details, get them printed out at their GP’s office and bring them back to us so we could look after them at the hospital."[71]
He said that the HSE had improved cybersecurity but warned against complacency.[71] He said "I think cyber-attacks are becoming more common and more sophisticated, so we’re still vulnerable to them, we’re probably more vulnerable now than we were in May of 2021. A cyber-attack now takes less than 24 hours to activate. the one we had in May 2021; it was embedding for two months. I think we we’re always going to be vulnerable to a cyber-attack. Systems have become more sophisticated to get around whatever we do."[71]
Legal actions
[edit]In May 2024 473 legal actions were reported to have been taken against the HSE in relation to the attack.[72] The State Claims Agency is managing 12 personal injury cases against the HSE in relation to the attack, where legal proceedings were being served in 11 cases.[72] The personal injury cases are related to the psychological impact of the attack.[72] There are a number of cases before the Court of Justice of the European Union related to the attack.[72]
See also
[edit]- Colonial Pipeline cyberattack
- WannaCry ransomware attack – which affected the National Health Service (NHS) in the United Kingdom
- Waikato District Health Board cyberattack
References
[edit]- ^ a b "Some health service disruption after HSE cyber attack". RTÉ News and Current Affairs. Retrieved 14 May 2021.
- ^ "Irish health service hit by 'very sophisticated' ransomware attack". Reuters. Retrieved 14 May 2021.
- ^ "Irish health service hit by cyber attack". BBC News. Retrieved 14 May 2021.
- ^ "Ransomware attack disrupts Irish health services". The Guardian. Retrieved 14 May 2021.
- ^ "Cyber attack 'most significant on Irish state'". BBC News. 15 May 2021. Retrieved 18 May 2021.
- ^ Lally, Conor (18 May 2021). "Wizard Spider profile: Suspected gang behind HSE attack is part of world's first cyber-cartel". The Irish Times. Retrieved 5 September 2021.
- ^ a b "Irish Health Service Shuts Down IT System Amid Cyber Attack". Bloomberg News. 14 May 2021. Retrieved 14 May 2021.
- ^ a b Reynolds, Paul (18 May 2021). "Wizard spider: Who are they and how do they operate?". RTÉ News and Current Affairs. Retrieved 18 May 2021.
- ^ a b Gallagher, Conor; McQuinn, Cormac. "Dark web 'dump sites' being monitored for HSE data after hack". The Irish Times. Retrieved 18 May 2021.
- ^ a b Horgan-Jones, Jack; Lally, Conor. "Scale of damage from cyberattack on HSE systems will not be known for days". The Irish Times. Retrieved 15 May 2021.
- ^ a b Noonan, Laura; Shotter, James (19 May 2021). "Irish patients' data stolen by hackers appears online". www.ft.com. Retrieved 19 May 2021.
- ^ a b Gallagher, Conor (28 May 2021). "Data of 520 patients published online, HSE confirms". The Irish Times. Retrieved 28 May 2021.
- ^ a b c d e f g h i j k l m n o p q r s t McNally, Tadgh (10 December 2021). "HSE hackers were in health service's computer system for eight weeks before cyber attack". TheJournal.ie. Retrieved 10 December 2021.
- ^ a b c "What we know so far about the HSE cyber attack". RTÉ News and Current Affairs. 14 May 2021. Retrieved 14 May 2021.
- ^ Moloney, Eoghan (14 May 2021). "'Serious and sophisticated' - HSE confirms ransomware cyber attack has hit all hospital IT systems". Irish Independent. Retrieved 15 May 2021.
- ^ a b Thomas, Cónal (14 May 2021). "Covid-19: GP and close contact referral system down, patients advised to attend walk-in centres". TheJournal.ie. Retrieved 14 May 2021.
- ^ "Ransomware attack defence upgrade urged by TD for part of Laois and Offaly". Leinster Express. Retrieved 17 May 2021.
- ^ O'Halloran, Marie. "Cyber security role is vacant because of low salary, TD says". The Irish Times. Retrieved 17 May 2021.
- ^ "NCSC: Contact Page". www.ncsc.gov.ie. Retrieved 19 May 2021.
- ^ a b c "Ransomware Attack on Health Sector - UPDATE 2021-05-16" (PDF). National Cyber Security Centre (Ireland). 16 May 2021. Archived (PDF) from the original on 19 May 2021. Retrieved 21 May 2021.
- ^ "HSE Cyber Security Incident". Health Service Executive (HSE). 19 May 2021. Archived from the original on 18 May 2021. Retrieved 19 May 2021.
- ^ Brennan, Colin (14 May 2021). "HSE issues defiant statement after 'significant ransomware attack'". Irish Mirror. Retrieved 15 May 2021.
- ^ Clarke, Vivienne (14 May 2021). "Taoiseach insists Ireland will not pay ransom after HSE cyber attack". BreakingNews.ie. Retrieved 15 May 2021.
- ^ Heaney, Steven; Clarke, Vivienne; Glennon, Nicole (14 May 2021). "Ransom will not be paid to perpetrators of HSE cyber attack". Irish Examiner. Retrieved 15 May 2021.
- ^ Moloney, Eoghan (14 May 2021). "Warning of widespread cancellations for HSE patients if ransomware attack not resolved by Monday". Irish Independent. Retrieved 15 May 2021.
- ^ O'Halloran, Marie. "HSE IT system will take "several weeks" to get back up and running – Donnelly". The Irish Times. Retrieved 19 May 2021.
- ^ a b "Paul Reid says it could cost 'tens of millions' to fix HSE IT systems". BreakingNews.ie. 17 May 2021. Retrieved 17 May 2021.
- ^ a b "Appointment and service updates – HSE IT system cyber attack". Health Service Executive (HSE). Archived from the original on 16 May 2021. Retrieved 15 May 2021.
- ^ McDermott, Stephen (14 May 2021). "HSE cyber attack: what services are affected and which ones are still working?". TheJournal.ie. Retrieved 14 May 2021.
- ^ O'Regan, Eilish (28 May 2021). "Sensitive data of 520 patients has been put online by hackers, HSE reveals". Irish Independent. Retrieved 28 May 2021.
- ^ Lee, George (28 May 2021). "HSE says stolen sensitive data of 520 patients on dark web". RTÉ News and Current Affairs. Retrieved 28 May 2021.
- ^ Duffy, Rónán (28 May 2021). "HSE hack: Sensitive data from 520 patients leaked online". TheJournal.ie. Retrieved 3 June 2021.
- ^ a b c d e f McNally, Tadgh (20 December 2021). "Four months before all people who had data stolen in cyber attack are contacted, says HSE". TheJournal.ie. Retrieved 24 December 2021.
- ^ Grennan, Dan (16 May 2021). "New cyber attack carried out on Department of Health as HSE scrambles to get systems back online". Extra.ie. Retrieved 16 May 2021.
- ^ Ní Aodha, Gráinne. "HSE ransomware attack is 'possibly the most significant cyber attack on the Irish State'". TheJournal.ie.
- ^ a b Burns, Sarah; Clarke, Vivienne; Lally, Conor; Cullen, Paul. "HSE cyber attack 'possibly the most significant' ever on Irish State". The Irish Times. Retrieved 14 May 2021.
- ^ Abrams, Lawrence (15 May 2021). "Ireland's Health Services hit with $20 million ransomware demand". Bleeping Computer. Retrieved 16 May 2021.
- ^ Weckler, Adrian (16 May 2021). "HSE working to restore IT systems amid claims hackers demand $20m for stolen data". Sunday World. Retrieved 16 May 2021.
- ^ a b c Ryan, Órla; MacNamee, Garreth; McNally, Tadgh; O'Connor, Niall (16 May 2021). "HSE won't comment on ransom figure, as staff are told to 'protect urgent care'". TheJournal.ie. Retrieved 16 May 2021.
- ^ Woods, Killian; Ryan, Emmet; Rogan, Aaron. "Hackers of HSE computer system demanded bitcoin ransom worth $150,000". Business Post. Retrieved 16 May 2021.
- ^ Aodha, Gráinne Ní. "HSE confirms ransom has been sought over cyber attack but says it will not be paid". TheJournal.ie. Retrieved 14 May 2021.
- ^ Horgan-Jones, Jack; Burns, Sarah; Lally, Conor; Cullen, Paul. "Bitcoin ransom will not be paid following cyber attack on HSE computer systems". The Irish Times. Retrieved 15 May 2021.
- ^ Gallagher, Conor; McQuinn, Cormac. "Dark web 'dump sites' being monitored for HSE data after hack". The Irish Times. Retrieved 20 May 2021.
- ^ O'Shea, Cormac (16 May 2021). "Hackers tried to breach social welfare system before HSE attack". Irish Mirror. Retrieved 16 May 2021.
- ^ McConnell, Daniel (20 May 2021). "Helpline for people whose health information will be published by cybercrime gang". Irish Examiner. Retrieved 20 May 2021.
- ^ Carolan, Mary (20 May 2021). "HSE secures injunctions restraining sharing of hacked data". The Irish Times. Retrieved 20 May 2021.
- ^ "HSE secures injunction against sharing of stolen data". RTÉ News and Current Affairs. 20 May 2021. Retrieved 20 May 2021.
- ^ Reynolds, Paul (20 May 2021). "IT experts testing decryption key sent by criminals behind cyber attack". RTÉ News and Current Affairs. Retrieved 20 May 2021.
- ^ Lally, Conor (20 May 2021). "Cyber gang provides decryption tool to unlock HSE systems". The Irish Times. Retrieved 20 May 2021.
- ^ O'Regan, Eilish (20 May 2021). "HSE and gardaí investigate scam texts and emails in wake of health service cyber-attack". Irish Independent. Retrieved 20 May 2021.
- ^ Hennessy, Michelle (20 May 2021). "Warning as fraudsters see HSE hack as opportunity to scam people with calls and texts". TheJournal.ie. Retrieved 20 May 2021.
- ^ Reynolds, Paul (24 May 2021). "Gardaí not aware of any stolen HSE data published online". RTÉ. Retrieved 24 May 2021.
- ^ Cullen, Paul (27 May 2021). "Cyberattack will cost HSE at least €100 million to restore and upgrade network". The Irish Times. Retrieved 27 May 2021.
- ^ O'Connor, Niall (20 July 2021). "Defence Forces deployed 'ethical hackers' to fight back against massive HSE cyber attack". TheJournal.ie. Retrieved 20 August 2021.
- ^ "Cyber Security in the Defence Forces". Defence Forces Public Relations Branch. 16 July 2021. Retrieved 20 August 2021.
- ^ O'Sullivan, Colman (5 September 2021). "IT infrastructure of crime group 'significantly disrupted' by gardaí". RTÉ News and Current Affairs. Retrieved 5 September 2021.
- ^ Lally, Conor (16 May 2021). "Department of Health hit by cyberattack similar to that on HSE". The Irish Times. Retrieved 16 May 2021.
- ^ Moloney, Eoghan; Molony, Senan; Schiller, Robin (16 May 2021). "Department of Health subjected to separate cyber attack". Irish Independent. Retrieved 16 May 2021.
- ^ Corfield, Gareth. "We need to talk about criminal hackers using Cobalt Strike, says Cisco Talos". www.theregister.com. Retrieved 21 May 2021.
- ^ Reynolds, Paul (16 May 2021). "Dept of Health responding to cyber attack since Thursday". RTÉ News and Current Affairs. Retrieved 16 May 2021.
- ^ Meskill, Tommy (23 June 2021). "Three quarters of HSE IT servers decrypted". RTÉ News and Current Affairs. Retrieved 23 June 2021.
- ^ Burke, Céimin (23 June 2021). "Three quarters of HSE IT servers decrypted following crippling cyber attack". TheJournal.ie. Retrieved 23 June 2021.
- ^ Murphy, Eoghan (23 June 2021). "HSE cyberattack: 'Many more weeks' before health services return to normal". Newstalk. Retrieved 23 June 2021.
- ^ Bowers, Shauna (15 July 2021). "HSE cyberattack: 82% of servers now decrypted". Irish Examiner.
- ^ Sheils McNamee, Michael (5 September 2021). "HSE cyber-attack: Irish health service still recovering months after hack". BBC News. Retrieved 5 September 2021.
- ^ O’Loughlin, Ann (25 June 2021). "HSE seeks order to help find who uploaded or downloaded files stolen in cyberattack". Irish Examiner. Retrieved 26 June 2021.
- ^ a b c d e f O'Faolain, Aodhan (25 June 2021). "Cyberattack: HSE seeks court orders to help identify those who accessed stolen files". The Irish Times. Retrieved 26 June 2021.
- ^ "Terms of Service – VirusTotal". VirusTotal. Retrieved 27 June 2021.
- ^ O'Faolain, Aodhan (25 June 2021). "Data stolen in HSE cyber attack downloaded 23 times before being removed, High Court told". TheJournal.ie. Retrieved 27 June 2021.
- ^ O'Donovan, Brian (9 February 2023). "HSE cyber attack: 32,000 notified of stolen data". RTÉ News. Retrieved 9 February 2023.
- ^ a b c d e f g h i McHale, Michael (21 March 2024). "Cyber-attack had an effect on cancer care 'worse than Covid'". Irish Medical Times. Retrieved 22 March 2024.
- ^ a b c d O'Donovan, Brian (14 May 2024). "More than 470 legal actions taken against HSE over cyberattack". RTÉ News. Retrieved 14 May 2024.
External links
[edit]- Conti cyber attack on the HSE Independent Post Incident Report (Redacted) - copy of Price WaterhouseCoopers International report on attack
- Financial impact of cyber security attack - chapter 12 of Report on the accounts of the Public Services 2021 report on gov.ie
- Lessons Learned from the HSE Cyber Attack - from American Hospital Association