Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:55 PM
Connect Directly

Rate of Ransomware Attacks in Healthcare Slows in H1 2020

But lull is unlikely to continue for long, some security experts say.

The relatively low number of publicly disclosed ransomware attacks on healthcare entities through mid-May 2020 suggests many threat groups are sticking by their word to avoid targeting them during the current pandemic, a new study shows.

How long that truce will hold, though, appears to be an open question.

Corvus Insurance recently analyzed threat data related to hospitals, health systems, doctors' offices, consultants, and other entities in the healthcare sector during the first several months of this year. The data shows a total of 18 publicly reported ransomware attacks on healthcare organizations through mid-May compared with 20 attacks in total during the entire first half of 2019.

Corvus estimates the total number of ransomware attacks on hospitals and other healthcare entities by the end of June will likely exceed last year's mark — but not by the margin many had expected based on attack trends prior to the pandemic.

"The Security Report on Healthcare Entities from Corvus shows that despite a significant and steady rise in ransomware attacks over the past few years, attacks on healthcare entities have actually stalled in 2020 amid the COVID-19 pandemic," says Lauren Winchester, vice president of smart breach response at Corvus Insurance. "[The data is a] possible reflection of claims by many ransomware groups that they would avoid attacks on healthcare entities during COVID-19."  

Chris Morales, head of security analytics at Vectra, says Corvus' finding tracks with what his own company has observed in recent months.

"We have seen no increase in external attacks against healthcare this year," Morales says, though there has been an increase in attacks targeting healthcare data in the cloud. "That shift is directly correlated to the current COVID-19 pandemic and the loosening of security policies in hospitals to ensure doctors can continue to function in providing care."

According to Morales, direct ransomware attacks in healthcare has been trending down even prior to the pandemic, at least partly because attackers have been general unable to extract large ransoms from victims in this sector.

Corvus' analysis shows that while healthcare organizations are typically more heavily targeted in ransomware attacks than many other sectors, their defenses continue to lag. For instance, only 14% of healthcare organizations in the sector currently use email scanning and filtering tools, which are technologies that security analysts consider fundamental to defending against phishing threats. Corvus' research, in fact, has shown these services could reduce the likelihood of a ransomware attack by 33%.

Open ports — such as those associated with the Remote Desktop Protocol (RDP) — are another concern. According to Corvus, while healthcare organizations overall tend to have a smaller attack surface than others, hospitals present a big target because of open ports. On average, hospitals have more than eight ports on their networks that are Internet-accessible and that attackers could potentially find and exploit.

Attacks Likely to Increase in H2
Winchester says the rate of ransomware attacks on healthcare entities is likely to start increasing again in the second half of this year. In fact, in 2019, before news of the pandemic, ransomware attacks in healthcare increased 75% between the first and second half of the year.

"Ransomware attack groups have historically targeted healthcare entities because the critical nature of their operations and rich set of data make for a great return on investment," she notes. "Those underlying drivers have not changed, and as the US moves toward cautious reopening, we expect attackers will re-engage with healthcare entities."

Ransomware families such as Maze, Sodinokibi, and Dopplepaymer, in particular, will likely continue to pose big threats to healthcare organizations when attacks resume. The operators of these ransomware families have shown a tendency to steal business-critical data from a victim organization before encrypting the data and then using the threat of data exposure as additional leverage for forcing ransom payments.

"The vast majority of ransomware attacks in recent years have not resulted in notifiable data breaches, but groups like Maze are actively seeking out sensitive information while in a system," Winchester says. "This creates a public relations nightmare for the healthcare entity and has very real implications for the patients whose protected health information may be published by the attackers."

Heather Paunet, vice president of product management at Untangle, says healthcare entities have another reason to worry: The increased amount of data on individuals that is being gathered as part of COVID-19-related testing activities will likely prove to be a big target.

"IT departments need to be more aware than before about how to protect their networks, their employees, and their patients," she says.

The relative lull in ransomware attacks on healthcare organizations comes even as attacks on organizations in other sectors show no signs of abating. Several security vendors have even noted an increase in ransomware attacks and other attacks types over the past few months by threat actors using COVID-19 related phising lures and websites. Just this week, for example, Japanese automaker Honda was forced to pause production at some of its plants worldwide after ransomware — believed to be SNAKE — crippled several critical systems at the company.

Related Content:


Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really   bad day" in cybersecurity. Click for more information and to register
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This is not what I meant by "I would like to share some desk space"
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-20
NVIDIA SHIELD TV, all versions prior to 8.2.2, contains a vulnerability in the implementation of the RPMB command status, in which an attacker can write to the Write Protect Configuration Block, which may lead to denial of service or escalation of privileges.
PUBLISHED: 2021-01-20
NVIDIA SHIELD TV, all versions prior to 8.2.2, contains a vulnerability in the NVDEC component, in which an attacker can read from or write to a memory location that is outside the intended boundary of the buffer, which may lead to denial of service or escalation of privileges.
PUBLISHED: 2021-01-20
NVIDIA SHIELD TV, all versions prior to 8.2.2, contains a vulnerability in the NVHost function, which may lead to abnormal reboot due to a null pointer reference, causing data loss.
PUBLISHED: 2021-01-20
OpenMage is a community-driven alternative to Magento CE. In OpenMage before versions 19.4.10 and 20.0.6, there is a vulnerability which enables remote code execution. In affected versions an administrator with permission to update product data to be able to store an executable file on the server ...
PUBLISHED: 2021-01-20
Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and enables their automatic discovery. Weave Net before version 2.8.0 has a vulnerability in which can allow an attacker to take over any host in the cluster. Weave Net is suppli...