Very interesting article about the subject from November 2015: It’s Way Too Easy to Hack the Hospital, <a href="http://www.bloomberg.com/features/2015-hospital-hack/" rel="nofollow">http://www.bloomberg.com/features/2015-hospital-hack/</a>
Exactly what happened? Most hospitals use proprietary electronic medical record systems. These are layered constructs of different networks requiring different passwords and VPNs for their different functions. Is there an actual url that one can visit to verify this? Did the internet archive capture this in a snapshot I can see? Or is this smack that a neighboring hospital is pushing to capture market share in this era of declining reimbursements and increasing regulation?
So instead of targeting random people in opportunistic attacks, the malware writers had a very clear target here. It's like "spearansomware". I only wonder why it took them so long to get to this idea.
not sure if they are being specifically targeted, or hospital networks are easy targets, but i work with a vendor who supports this hospital.<p>this is the 3rd major healthcare org hit with this in like past 3 weeks. last one just got hit last week.<p>RIS/HIS/PACS/EHR/any systems all hit, with like 80-90% of network equipment compromised