Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

FBI Warning Healthcare Providers to Prepare for Ransomware Attacks

Author: Scarinci Hollenbeck, LLC

Date: December 1, 2020

Key Contacts

Back
FBI Warning Healthcare Providers to Prepare for Ransomware Attacks

The FBI is warning hospitals and healthcare providers to brace for a deluge of ransomware attacks

The Federal Bureau of Investigation (FBI) is warning hospitals and healthcare providers to brace for a deluge of ransomware attacks. The advisory, which was issued jointly with the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Health and Human Services (HHS), states that the agencies have “credible information” of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers. The threat of ransomware attacks come as the U.S. healthcare system is already feeling the strain of COVID-19.

According to the advisory, cyber actors are targeting the Healthcare and Public Health (HPH) Sector with TrickBot and BazarLoader malware, often leading to ransomware attacks, data theft, and the disruption of healthcare services. “CISA, FBI, and HHS are sharing this information to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats,” the advisory states.

Precautions to Help Prevent a Ransomware Attack

To be ready to fend off a potential cyberattack, hospitals and other healthcare providers should audit their existing cyber policies and procedures to ensure that they are sufficient. Of course, simply have protocols in place is just the first step; it is also important to verify that employees know how to carry them out and that they work as expected.

Below are a few specific tips:

  • Implement a cyber incident response plan: It is of paramount importance that organizations create, maintain, and exercise a basic cyber incident response plan and an associated communications plan that includes response and notification procedures for a ransomware incident.  The development of these plans in conjunction with legal counsel and technology consultants is critical to controlling the organization’s potential liability when attacked. 
  • Plan for the loss of critical systems: Because it often takes time to recover from a ransomware attack and restore normal operations, it’s important to plan for the possibility of critical information systems being inaccessible for an extended period of time. As emphasized in the FBI advisory, this should include, but not be limited to, the following: print and properly store/protect hard copies of digital information that would be required for critical patient healthcare; plan for and periodically train staff to handle the re-routing of incoming/existing patients in an expedient manner if information systems were to abruptly and unexpectedly become unavailable; coordinate the potential for surge support with other healthcare facilities in the greater local area.
  • Perform regular data backups: It is critical to maintain offline, encrypted backups of data and to regularly test your backups. Backup procedures should be conducted on a regular basis. It is important that backups be maintained offline or in separated networks as many ransomware variants attempt to find and delete any accessible backups. Maintaining offline, current backups is most critical because there is no need to pay a ransom for data that is readily accessible to your organization.
  • Update software regularly: Never ignore software updates; it is imperative to quickly patch the operating system, software, and firmware on all computers as soon as manufacturers release updates. Employees should also be instructed to install security updates on all company devices, as well as any personal devices that may be connected to your network. Virus detection programs should also be kept up to date. While it is often easy to ignore software update notifications, failing to stay up to date can not only leave you vulnerable to a cyberattack, but also expose you to liability.
  • Conduct cybersecurity training: Well-trained employees can often thwart of cyberattack before it takes down your systems. However, as ransomware attacks become more sophisticated, workers need to be more vigilant. While ransomware attacks initially relied on email messages that were clearly identifiable as spam, hackers are now using phishing schemes that make emails appear to come from a known contact.

Recent Cyberattacks Targeting the Healthcare Industry

Statistics confirm the growing cyber threat to the healthcare sector. According to a recent report by Checkpoint Security, the number of ransomware attacks against U.S. hospitals in October 2020 increased by 71 percent, compared to the previous month. CheckPoint Security also reported a 50 percent uptick in average daily ransomware attacks in the third quarter of 2020, compared to the first six months of the year. In Q3, attacks in the US skyrocketed by 200 percent. 

In September, Universal Health Services suffered a ransomware attack impacting all of its 250 U.S. facilities. Without access to its computer systems, doctors and nurses were forced to use paper and pencil to keep patient records, and laboratory and imaging results were also delayed. Sky Lakes Medical Center in Oregon, the University of Vermont Health Network, and St. Lawrence Health System in New York reported similar incidents in recent weeks. In Germany, a ransomware attack resulted in a patient death. According to media reports, a woman who needed urgent admission died after she had to be transferred to another city for treatment.

CISA, FBI and HHS do not recommend paying ransoms. “Payment does not guarantee files will be recovered. It may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities,” the advisory states. Instead, the agencies emphasize the importance of preparedness. 

Key Takeaway

In light of the growing threat from malicious cyber criminals, it is imperative to review or establish critical cyber procedures, including patching plans, cyber incident response protocols, and business continuity plans. It is critical to involve legal counsel when preparing incident reports and response protocols.

If you have questions, please contact us

If you have any questions or if you would like to discuss the matter further, please contact me, Maryam Meseha, or the Scarinci Hollenbeck attorney with whom you work, at 201-896-4100.

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Scarinci Hollenbeck, LLC, LLC

Related Posts

See all
Smart Contract Legal Issues: Drafting Agreements for Blockchain post image

Smart Contract Legal Issues: Drafting Agreements for Blockchain

Smart contracts feature a unique blend of legal agreement and technical code. This innovation has the potential to reshape how business is conducted. At the same time, smart contract legal issues around enforceability, jurisdiction, identity, and compliance are common. The legal framework for these self-executing agreements is still evolving. What Are Smart Contracts? Smart contracts, […]

Author: Bryce S. Robins

Link to post with title - "Smart Contract Legal Issues: Drafting Agreements for Blockchain"
Are Stay Interviews the Key to Retaining Top Talent? post image

Are Stay Interviews the Key to Retaining Top Talent?

Retaining top talent continues to be one of the greatest challenges facing employers today. Even in an employer’s market, the loss of a key employee can disrupt operations and result in significant costs. While compensation plays a role, long-term retention often depends on workplace culture, communication, and employee engagement. One increasingly popular strategy for improving […]

Author: Angela A. Turiano

Link to post with title - "Are Stay Interviews the Key to Retaining Top Talent?"
Why Secured Transactions Are Important post image

Why Secured Transactions Are Important

Secured transactions form the backbone of a wide range of business dealings, including business loans, mortgages, and inventory financing. Because the stakes are often high and relatively minor oversights can have drastic consequences, lenders and borrowers should thoroughly understand how to form an enforceable security agreement that protects their legal rights. What Is a Secured […]

Author: Dan Brecher

Link to post with title - "Why Secured Transactions Are Important"
Don’t Cash a “Paid in Full” Check Without Understanding the Legal Implications post image

Don’t Cash a “Paid in Full” Check Without Understanding the Legal Implications

Cashing a check marked “paid in full” can be a risky endeavor, particularly if you don’t fully understanding the legal implications. If you are owed more than the amount of the check you accept and deposit, you may waive your right to collect the full disputed amount. That is why you should consider either rejecting […]

Author: Dan Brecher

Link to post with title - "Don’t Cash a “Paid in Full” Check Without Understanding the Legal Implications"
Changes to Qualified Small Business Stock Will Benefit Startup Founders and Investors post image

Changes to Qualified Small Business Stock Will Benefit Startup Founders and Investors

The One Big Beautiful Bill Act of 2025 (OBBBA) significantly impacts federal taxes, credits, and deductions. A key change relating to Qualified Small Business Stock (QSBS) allows greater tax-free gains for investments in startups and other qualifying small businesses. Company founders and other investors should understand how the enhanced tax strategy works or risk missing […]

Author: Dan Brecher

Link to post with title - "Changes to Qualified Small Business Stock Will Benefit Startup Founders and Investors"
Corporate Consolidation and Antitrust Issues in Mergers post image

Corporate Consolidation and Antitrust Issues in Mergers

Corporate consolidation involves two or more businesses merging to become a single larger entity. The result is often a stronger and more competitive company that can better navigate today’s competitive marketplace. What Is Corporate Consolidation? Corporate consolidation closely resembles a basic merger transaction. The primary difference is that a consolidation creates an entirely new business […]

Author: Dan Brecher

Link to post with title - "Corporate Consolidation and Antitrust Issues in Mergers"

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Sign up to get the latest from our attorneys!

Explore What Matters Most to You.

Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

Let`s get in touch!

* The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form. By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. Message frequency may vary. You can reply STOP to opt-out of further messaging.

Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!