Jurnal Cyber Security - 1913070023 - Abdul Majid Azhar H - Ransomware Attacks in The Healthcare Industries - Risk and Protection
Jurnal Cyber Security - 1913070023 - Abdul Majid Azhar H - Ransomware Attacks in The Healthcare Industries - Risk and Protection
Jurnal Cyber Security - 1913070023 - Abdul Majid Azhar H - Ransomware Attacks in The Healthcare Industries - Risk and Protection
Corresponding Author:
Abdul Majid Azhar Hamidan,
Department of Information Sytems,
Asian Banking Finance and Informatics Institute Perbanas,
Jl. Perbanas, Kuningan, Karet Kuningan, Kecamatan Setiabudi, Kota Jakarta Selatan, Daerah Khusus
Ibukota Jakarta 12940, Indonesia
Email: [email protected]
1. INTRODUCTION
Ransomware, as defined by the Merriam-Webster dictionary, is a malware that requires its victims
to pay a ransom. Ransomware is a type of malware used by criminals that encrypts files and then attempts to
extort money in return for the key to unlocking the data files (Spencer et al., 2018). The healthcare industry is
a prime target for criminals using ransomware because of the number of patient records in its possession and
the revenue those data could generate in the black market for criminals. The healthcare industry holds
valuable information that could generate financial gains for criminals and could also be beneficial to state
actors for political gains. Ransomware attacks on the sector generated much success and will continue as
long as cybersecurity experts do not put in place effective methods to limit its damages.
Before 2016, healthcare organizations were not thought to be a primary target for ransomware.
However, 14 hospitals had become the target of ransomware and a total of 173 hacking/information
technology (IT) incident data breaches had been officially reported by October 16, 2016, Hospitals have
become an easy target for hackers for two reasons: (1) the necessity of computer storage of information
associated with patient care (e.g., electronic medical records) and (2) the security holes in IT systems. In fact,
a report from Ponemon Institute in 2016 stated that 89 percent of healthcare organizations suffered at least
one data breach involving the loss of patient data over a two-year period, and 45 percent had more than five
such breaches. Also, the frequency of successful hacking of patient medical files increased from 55 percent in
2015 to 64 percent in 2016. When hit with ransomware, some hospitals have been desperate to pay the
ransom because of their need for the most up-to-date information, such as drug interactions, care directives,
and medical history, in order to provide critical care to patients. Accordingly, the healthcare industry is now
considered to be at a substantial risk of a ransomware attack, mainly because it trails other leading industries
in securing vital data.
Hackers have found it easy to attack hospitals with ransomware because of hospitals’ rapid adoption
of IT without a concomitant increase in the number and sophistication of IT support staff. This IT adoption
1
JOIN (Jurnal Online Informatika) p-ISSN: 2528-1682
e-ISSN: 2527-9165
occurred after the government allocated funds for the Meaningful Use program, which encouraged the use of
electronic health records (EHRs). With the Meaningful Use incentives, HER utilization increased from 9.4
percent in 2008 to 96.9 percent in 2014.
With such a substantial increase in IT utilization in a short time frame, many healthcare facilities
have been unable to adopt adequate network security and other information technology resources to combat
potential attacks. Without sufficient funds, many hospitals do not have the staff to employ simple barriers to
hackers, such as the quick installation of electronic patches. According to a 2016 report by Verizon, 85
percent of successful exploits take advantage of vulnerabilities such as old patches.
The purpose of this study was to determine the extent of recent ransomware infections in the
healthcare setting, the risk liabilities and costs associated with infections, and possible risk mitigation tactics.
be a substantial amount for a large or small hospital to pay per record. This total may or may not include
additional costs associated with a data breach, which could vary depending on the size of the organization
and number of patients affected. Such variable costs include credit monitoring provided to patients, which
may cost anywhere from $8 to $30 per patient, depending on the level of oversight needed.
If the institution chooses to pay the ransom, the amount must be considered. The average ransom
demanded has been approximately $10,000 for enterprises and $710 for individuals. In a report published by
Cyberdata and security vendor Imperva, attackers have often tailored the ransom to the country in which the
affected institution is located. For example, the average ransom demand in the United States has been $710.
However, in countries such as Israel, Russia, and Mexico, the average demand has been $500. For this
reason, companies in more developed nations such as the United States are more favourite targets, as they are
thought to be able to afford to pay a greater ransom.
3
JOIN (Jurnal Online Informatika) p-ISSN: 2528-1682
e-ISSN: 2527-9165
Some systems allow all users to modify their internal structures, and such users today would be
considered over-privileged users. This was the standard operating procedure for early microcomputer and
home computer systems, where there was no distinction between an administrator or root, and a regular user
of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they
are allowed to modify internal structures of the system. In some environments, users are over-privileged
because they have been inappropriately granted administrator or equivalent status.
Some systems allow code executed by a user to access all rights of that user, which is known as
over-privileged code. This was also standard operating procedure for early microcomputer and home
computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system.
Almost all currently popular operating systems, and also many scripting applications allow code too many
privileges, usually in the sense that when a user executes code, the system allows that code all rights of that
user. This makes users vulnerable to malware in the form of e-mail attachments, which may or may not be
disguised.
After all, threats evolve and business practices change, introducing new risks and security solutions.
Providers should schedule annual risk assessments designed to identify new vulnerabilities and implement
controls to address them.
If the provider’s IT staffers have expertise in security, they may conduct these assessments in-house.
Consulting firms offering assessment services may also be called on to create a point-in-time snapshot of an
organization’s cybersecurity status.
5. CONCLUSION
The number of ransomware attacks and variants has increased substantially in recent years.
Healthcare facilities have become a significant target for these attacks, and in response to this increase, it is
crucial that they develop a proper disaster recovery plan and adequately educate their users on information
security. With proper planning in place, a healthcare facility is not only more likely to survive an attack but
also more likely to decrease costs associated with an attack and to mitigate the risk to its reputation.
ACKNOWLEDGEMENTS
This research was supported/partially supported by Marshall Digital Scholar. We thank our colleagues from
Marshall University who provided insight and expertise that greatly assisted the research, although they may
not agree with all of the interpretations/conclusions of this paper.
6. REFERENCES
[1] Drame, Papa S (2019), “Ransomware Attacks in the Healthcare Industry: Attacks Methods and Preventive Steps”
ProQuest Dissertation Publishing, 1-2
[2] Nikki Spence, MS, Niharika Bhardwaj, David P. Paul, and Alberto Coustasse (2018), “Ransomware in Healthcare
Facilities: A Harbinger of the Future?” Perspective In Health Information Management
[3] Paul, III, D. P., Spence, N., Bhardwa, N., Coustasse, A. (2018, April). “Healthcare Facilities: Another Target for
Ransomware Attacks”. Presented at the 54th Annual MBAA Conference, Chicago, IL.
[4] Wikipedia, Malware,
https://en.wikipedia.org/wiki/Malware
[5] Mike Chapple (2020), “5 Ways to Defend Your Medical Practice Against Ransomware”, HealthTech Magazine,
downloaded 22/10/20 from https://healthtechmagazine.net/article/2020/05/5-ways-defend-your-medical-practice-
against-ransomware
[6] Tekno Kompas, Kena Ransomware, Rumah Sakit Ini Terpaksa Bayar Tebusan Rp 226 Juta,
https://tekno.kompas.com/read/2017/05/14/11181737/kena.ransomware.rumah.sakit.ini.terpaksa.bayar.tebusan.rp.2
26.juta?page=all