In widely reported news, the Hollywood Presbyrerian Medical Center has paid a ransom of $17,000 to have their patient record systems restored.
Likely enabled by a phishing attack – where a member of the hospital’s staff clicked on an email link – the resulting malware meant that patient records were not available for 10 days.
At first the hospital IT team and outside consultants tried to fix the problem themselves, but it became apparent that the quicker and cheaper option was to pay the ransom.
The hackers demanded 40 Bitcoins – with a value of around $17,000 – and in return provided a decryption key.
Smart malware looks for network vulnerabilities.
Phishing attacks can give hackers access to vulnerable system resources, such as old software or incorrectly configured servers. And once malware is installed on a network it will actively seek out vulnerabilities so they can be exploited. And even if it beginning now, once malware is on the network it can be activated by future vulnerabilities, as and when they become available.
A daily vulnerability audit from SecludIT’s Elastic Detector identifies malware – and the vulnerabilities that malware will leverage – within a day of those vulnerabilities being discovered. Elastic Detector also provides remediation tips so that the IT team can take action to fix the problem. Our remediation tips are like having a resident security expert on your IT team.