Special Features

Cybersecurity Month

Ransomware's ripple effect felt across ERs as patient care suffers

389 US healthcare orgs infected this year alone


Ransomware infected 389 US healthcare organizations this fiscal year, putting patients' lives at risk and costing facilities up to $900,000 a day in downtime alone, according to Microsoft.

In a report published Tuesday, Redmond recounts the surging costs – both in terms of patient care and dollars, with the average admitted payment now up to $4.4 million – to hospitals hit by a ransomware attack as well as those nearby.

Keep in mind, these monetary figures are averages. UnitedHealth spent $776 million to date on network restoration and $1.4 billion on increased medical care expenditures as a result of the Change Healthcare ransomware attack in February.

Previously, the company's CEO admitted to paying the criminals' $22 million ransom demand.

The Microsoft paper, which cites both internal and third-party research, points to highly time-sensitive stroke treatment as an example. Stroke code activation at hospitals close to one suffering from a ransomware infection jumped from 59 to 103, while confirmed strokes skyrocketed 113.6 percent, from 22 to 47 cases, according to a 2023 study.

It also found reported cardiac arrests at a nearby hospital dealing with an infected hospital's overflow of patients increased 81 percent, from 21 cases to 38.

Meanwhile, survival rates for out-of-hospital cardiac arrests with favorable neurological outcomes plummeted, from 40 percent pre-ransomware infection to 4.5 percent during the incident.

These network intrusions also divert ambulances that are transporting people to hospitals and emergency clinics. Microsoft cites a 35.2 percent increase in emergency medical services (EMS) arrivals at other hospitals when one nearby is experiencing an attack.

Meet the scumbags attacking hospitals

While healthcare attacks are usually perpetrated by "highly organized and specialized threat actor groups," according to Microsoft, ransomware-as-a-service has significantly lowered the barrier to entry for would-be extortionists. This, coupled with Russia providing a safe harbor for ransomware gangs, has led to a 300 percent increase in attacks.

Still, Iranian groups have been the most active in terms of attempted attacks against healthcare orgs this year, according to Microsoft's threat intelligence data.

This echoes an August warning from the US government about Iran's Pioneer Kitten hacking into American networks, including hospitals, to steal sensitive data and then "collaborate with ransomware affiliate actors to deploy ransomware."

In addition to the Russians and Iranians, Chinese crews are also getting in on the healthcare ransomware game and using it as a cover for their government-backed espionage activity, Microsoft suggests. ®

Send us news
1 Comment

Microsoft says more ransomware stopped before reaching encryption

Volume of attacks still surging though, according to Digital Defense Report

Would banning ransomware insurance stop the scourge?

White House official makes case for ending extortion reimbursements

Windows Themes zero-day bug exposes users to NTLM credential theft

Plus a free micropatch until Redmond fixes the flaw

Akira ransomware is encrypting victims again following pure extortion fling

Crooks revert to old ways for greater efficiency

Putin's pro-Trump trolls accuse Harris of poaching rhinos

Plus: Iran's IRGC probes election-related websites in swing states

Microsoft SharePoint RCE flaw exploits in the wild – you've had 3 months to patch

Plus, a POC to make it extra easy for attackers

Microsoft says tougher punishments needed for state-sponsored cybercriminals

Although it also reaffirmed commitment to secure-by-design initiatives

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Microsoft turning away AI training workloads – inferencing makes better money

Azure's acceleration continues, but so do costs

Windows 10 given an extra year of supported life, for $30

MIcrosoft extends its Extended Security Updates club to consumers, at last

Brazen crims selling stolen credit cards on Meta's Threads

The platform 'continues to take action' against illegal posts, we're told

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'