4 March 2017

Barts NHS trust security breach observations

Barts NHS trust security breach observations

In January 2017 we became informed of a successful attack against the largest NHS trust in England. The media came to conclusion that it was a ransomware attack, which are usual these days. However, the NHS officials disputed these assumptions.

Some new facts were publicly disclosed on March 1 during the NHS board meeting. The original report (available here) says that the attack was carried out by “a new virus not seen previously”. Here is the original quote from the report:

An IT virus had affected the Trust’s networks during January 2017. It was confirmed that this had affected all sites, except Whipps Cross but that the response had been effective and the Trust had swiftly returned to business as usual. The virus had affected pathology systems (requiring the temporary use of manual systems), but no other IT systems used to deliver clinical care. A serious incident investigation was under way and further details would be shared once this had concluded. The Deputy Chief Executive noted some inaccuracies in media reporting about this incident, confirming that this virus had not been a ransomware attack and that the Trust’s patient information systems had not been hacked or otherwise compromised (with no patient data stolen or at risk). He explained that the Trust’s antivirus software had been up to date and that this had been a new virus not seen previously. A ‘patch’ had been issued globally within 8 hours, protecting other organisations from this virus. He thanked teams for their hard work and support to maintain business as usual standards in difficult circumstances. The Chief Executive noted that she had visited Pathology departments to thank them for their work during the affected weekend to oversee contingency arrangements.

Based on this report and other statements, made previously to the media, we may conclude that the only security mechanism in place was a signature-based antivirus software, which did not have signature for this particular malware variant/sample. A little bit of googling revealed that NHS computers use Windows XP operating system, which is no longer supported by Microsoft. This explains why they have to rely on antivirus only.

The attack affected the following hospitals: the Royal London, St Bartholomew’s, Mile End and Newham. Since the IT department had to disconnect network shares and some drives, the malware in question is most likely to be a worm spreading via SMB shares.

Yesterday some media reported that a zero-day vulnerability was used for this attack. We believe that this is a FALSE statement. To avoid any speculations in the future, we do not believe this was a targeted attack either. Most likely this was just a random infection with a random malware. The kind of infection we see on a daily basis in organizations with poorly implemented security controls.

Back to the list

Latest Posts

Week in review: major security incidents in October 9-15

Week in review: major security incidents in October 9-15

The article contains a brief report of cybersecurity incidents for the past week.
16 October 2017
Week in review: major security incidents in October 2-8

Week in review: major security incidents in October 2-8

The article contains a brief report of cybersecurity incidents for the past week.
9 October 2017
Week in review: major security incidents in September 25 – October 1

Week in review: major security incidents in September 25 – October 1

The article contains a brief report of cybersecurity incidents for the past week.
3 October 2017
Featured vulnerabilities
FreeBSD update for WPA2 protocol
Medium Patched | 18 Oct, 2017
Information disclosure in Tor
Low Patched | 17 Oct, 2017

Future events
Location: Na Strži 65/1702, Praha 4
Links: http://financnictvi.konference.cz/

Technologické inovace ve finančním sektoru (FINTECH). Kybernetická bezpečnost, risk management, decision engine, datová analýza, reporting, platformy bezpečnostních technologií, mobilní aplikace v globálním světě financí, projektové řízení, případové studie.
Location: Bajkalská 25/A, Bratislava
Links: http://bdd.exponet.sk/

Explózia dát je nepochybne sprievodným javom súčasnosti. Preto aj problematika bezpečnosti a dostupnosti dát zaznamenáva prevratný rozvoj a jej obsah a rozsah sa mení tiež v súvislosti s vývojom nových technológií. Ochrana dát sa netýka len jednotlivých zariadení, ale aj sietí, online úložísk a služieb. Množstvo dát, portfólio zariadení a úložisk sa tiež významne rozširuje s nástupom internetu vecí. Konferencia sa zameriava na aktuálne trendy a možnosti lepšej ochrany a efektívnej práce s dátami.
Location: Na Strži 65/1702, Praha 4
Links: http://did.konference.cz/

Konference přinese aktuální témata, vystoupení předních odborníků z praxe i z akademického prostředí, případové studie. V popředí zájmu budou big data, data analytics, propojování interních a externích dat, business intelligence, geodata, open data,  big data ve finančnictví, vzdělávání i astronomii.