New Zealand Hospitals Forced to Cancel Surgeries After a Cyber Attack

  • By Dawna M. Roberts
  • Published: Jun 03, 2021
  • Last Updated: Mar 18, 2022

 The problem of ransomware does not just affect the U.S. A New Zealand hospital was hit last week, having to cancel surgeries and turn away patients.

What Happened?

On Tuesday, the New Zealand Waikato District Health Board (DHB) was hit hard by a ransomware attack and crippled its IT department and forced a shutdown of services among six of its hospitals. Everything was affected except email.

Medical personnel could not access patient records, perform clinical services, and many surgeries were canceled until things were restored. The hospital’s phone lines were even down, so they could only accept emergency patients.

What Does Waikato District Health Board Say?

In a comment to local news outlet Stuff, Kevin Snee, Waikato DHB Chief Executive, said that it would be days before everything was operating normally. The hospitals have begun referring all non-emergency patients to other facilities, and the staff is using pen and paper to keep records until the incident is over.

They made a public statement yesterday saying,

“Our staff are working to restore the infected systems and on the remediation process. We are working with the relevant government departments to ensure a secure environment is successfully re-established.”

“At affiliate Waikato Hospital, 29 out of 102 elective inpatient surgeries were postponed today. Yesterday, six out of 101 were canceled. At affiliate Thames Hospital, all elective surgeries were postponed. All outpatient activity was deferred at affiliate hospitals in rural areas.”

They concluded the message with,

“We are currently working with other government departments to investigate the cause, but are working on the theory that the initial incursion was via an email attachment. A forensic investigation is ongoing.”

Will They Pay the Ransom?

Many victims choose not to pay ransomware gangs. Recently Colonial Pipeline paid $4.4 million to restore their systems. A lot of cybercriminals have pledged not to attack infrastructure companies, schools, and medical providers. However, this particular attack appears to be similar to a WizardSpider hacker incident, and this group obviously does not honor such pledges.

Snee also told Stuff that “no ransom will be paid,” to cybercriminals. The hospital conglomerate has decided not to pay and to clean up the infection themselves. They are working closely with law enforcement to investigate the matter further.

Have We Become Too Reliant on Technology?

It is terrifying to think that ransomware gangs can swoop in anytime they like and seriously affect fuel prices and delivery, patient care, and other services that we rely on to survive. When a hospital is all but shut down because of a malware infection, it begs the question, have we become too reliant on technology?

The more urgent question is what can be done about it? Apparently, no one is immune from these attacks, and rarely is any company fortified enough, even security powerhouses like Microsoft and FireEye, to thwart these attempts.

Although there is an ongoing investigation, rumors say that the attack on hospitals came through email. Phishing is one of the number one ways criminals get their foot in the door. Improved employee training and honoring best practices are part of what is needed to fix the problem. Some other tips to keep companies safe are:

  • Force password resets for all employees.
  • Allow only strong passwords to be used.
  • Never let employees click on links or download attachments in email.
  • Educate employees on phishing, social engineering, and other malicious tactics.
  • Never reuse passwords on multiple websites.
  • Use good, strong antivirus/anti-malware software on all servers and devices.
  • Hire forensic experts to audit your security system and make improvements to security.
  • Install network monitoring to watch for any unwanted intrusions.

 

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Juice Jacking: Why Using Public USB Charging Stations Can Lead to Identity Theft

Juice Jacking: Why Using Public USB Charging Stations Can Lead to Identity Theft

We've all been there: You're away from home when you notice your phone's battery is dangerously low. For most people, the quick solution is to find a public charging station and restore their battery power.

Why Some People Are Choosing a Permanent Digital Detox

Why Some People Are Choosing a Permanent Digital Detox

As our reliance on digital devices and technologies has increased, so have concerns about the negative effects of excessive screen time on mental and physical health.

Is It Possible to Erase Yourself from the Internet?

Is It Possible to Erase Yourself from the Internet?

Our digital footprint, the trail of data and information left behind while using the internet, can be overwhelming. It encompasses everything from our social media posts and the websites we have visited to the emails we've sent and the online searches we have conducted.

Cybersecurity Threats: What You Need to Know About Piggybacking

Cybersecurity Threats: What You Need to Know About Piggybacking

In cybersecurity, piggybacking refers to an unauthorized person gaining access to a restricted area or system by exploiting the access privileges of an authorized user, typically by following them or leveraging their credentials, usually without their knowledge or consent.

What You Need to Know about the Coast Guard Data Breach

What You Need to Know about the Coast Guard Data Breach

The Coast Guard is the only branch of the United States military in the Department of Homeland Security. It enforces federal law, controls the nation's borders and maritime Approaches, and protects the United States ports and waterways.

Mars Hydro Security Flaw Puts IoT Users at Risk

Mars Hydro Security Flaw Puts IoT Users at Risk

Mars Hydro is a leading Chinese brand producing a wide range of Internet of Things (IoT) devices for indoor gardening and the hydroponics industry.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close