Question

Present a summary of a Ransomware/Malware case in which a healthcare facility/organization was targeted and dealt with the threat or mitigated the exposure. Identify a strategy the organization could...

Present a summary of a Ransomware/Malware case in which a healthcare facility/organization was targeted and dealt with the threat or mitigated the exposure. Identify a strategy the organization could consider to limit potential exposure to this issue in the future (this may include strategies outlined in interviews/articles about the case).

The four heavily cited types of ransomware/malware that have occurred over the last few years are (1) Wannacry (2) Locky (3) Petya/NotPetya (4) SamSam. You may choose your own healthcare facility/organization in order to ensure you can find enough information on the case. You are not limited to the four types of ransomware/malware listed above, you can absolutely choose a different one or a case where the type was unknown, just ensure that it is a healthcare facility/organization and a form of malware/ransomware. If you have work or had experience with a healthcare facility/organization that experienced a ransomeware/malware case that was not publicized you are more than welcome to use that as well!!

Your post should be a minimum of 250 words and have all work use cited using APA format.  Be sure to include any supporting documentation.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

It is a well-known case of SamSam or Samas ransomware targeting Hancock Health in the US back in early 2018. Unlike other ransomware, SamSam does not need to be attached to an email. It can be remotely activated when enough or sufficient data is primed. SamSam is more of targeted ransomware, unlike other ransomware or malware which are quite random. That is the group specifically target an organization or company or system.

In the case of Hancock Health, all the files were renamed as "we apologize" or "we are sorry". Initially, the IT department thought that the data was safe and they only needed to run a system check. It was only later that they realized that they had been hacked by something much more severe. They had to shut down their systems immediately. All there files had been attacked. None of their data was safe. They even had to think of the possibility of the attack in the clinical equipment like ECG machines, IV pump, and ventilators. They had to re-route all new patients to other hospitals. All their online systems were down and they had to work with pen and paper.

The threat group demanded 4 bitcoins which is approximately $55000 for the decryption files. The management had other options but they needed time to implement any or all of them which they did not have. The threat group had demanded money within a period of 7 days. Keeping in mind the confidentiality of the patients' data and also the need to not allow any further damage, the management paid for the ransom and retrieved their data and files.

For future damage control, the following measures can be taken to prevent any such attack

1. All external facing applications like Java etc. need to be kept updated and any errors rectified immediately.

2. All external facing applications need to have 2-factor identification or authentication.

3. All critical information should be backed up in a routine manner. These data should be stored in a secure location.

4. Users should be made aware of the interface that resembles ransomware.

5. All forms of anti-virus, anti-malware, and anti-ransomware should be regularly updated.

6. Users should be trained to detect and act on such malware and ransomware.

Add a comment
Know the answer?
Add Answer to:
Present a summary of a Ransomware/Malware case in which a healthcare facility/organization was targeted and dealt with the threat or mitigated the exposure. Identify a strategy the organization could...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key...

    CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key role in the U.S. health care delivery system. These providers integrate internal and external information with their clinical knowledge to determine the patient’s treatment options. An effective ambulatory electronic health record (EHR) is critical to supply physicians with the information they need to provide quality care and maximize their efficiency. This case involves the decision-making process to replace an inadequate EHR system in a...

  • Case: Geekdom Games Bob Phillips, the owner of Geekdom Games contacted your consulting company last week...

    Case: Geekdom Games Bob Phillips, the owner of Geekdom Games contacted your consulting company last week to discuss the expansion of his business and the role of information systems in that expansion. Geekdom Games is a small game design business located in St. Louis, Missouri. Geekdom has been in business for five years and has three full-time employees in addition to Mr. Phillips. Geekdom Games produces interactive, fantasy based board games and role playing games similar to Dungeons and Dragons....

  • I have this case study to solve. i want to ask which type of case study...

    I have this case study to solve. i want to ask which type of case study in this like problem, evaluation or decision? if its decision then what are the criterias and all? Stardust Petroleum Sendirian Berhad: how to inculcate the pro-active safety culture? Farzana Quoquab, Nomahaza Mahadi, Taram Satiraksa Wan Abdullah and Jihad Mohammad Coming together is a beginning; keeping together is progress; working together is success. - Henry Ford The beginning Stardust was established in 2013 as a...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT