Kansas Heart Hospital Hit With Ransomware; Hackers Do Not Unlock Files After Receiving Ransom Payment | Healthcare Informatics Magazine | Health IT | Information Technology Skip to content Skip to navigation

Kansas Heart Hospital Hit With Ransomware; Hackers Do Not Unlock Files After Receiving Ransom Payment

May 23, 2016
by Heather Landi
| Reprints

Wichita, Kan.-based Kansas Heart Hospital was hit with a ransomware attack last Wednesday, but after the hospital paid an undisclosed ransom, the hackers demanded more, according to local news reports.

Local television news station KWCH reported last Friday that Kansas Heart Hospital president Greg Duick, M.D., acknowledged that the hospital was the victim of a cyber attack.

The KWCH report states quotes Duick as stating, “Kansas Heart Hospital had a cyber attack occur late Wednesday evening. We suspect, as attacks other parts of the country, this was an offshore operation.”

According to the report, hackers got access to the system and locked up the files, refusing to give back access unless the hospital paid a ransom.

The news report, written by Deedee Sun, quotes Duick as stating, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”

However, after the hospital paid a ransom, the hacker did not return full access to the files, according to the news report. Instead, they demanded another ransom. “The hospital says it will not pay again,” the article stated.

"The policy of the Kansas Heart Hospital in conjunction with our consultants, felt no longer was this a wise maneuver or strategy," Duick stated, according to the article.

As previously reported in Healthcare Informatics, FBI has officially stated that it does not recommend paying a ransom in a ransomware attack.

“Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cyber criminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals,” FBI Cyber Division Assistant Director James Trainor stated in a FBI blog post.

The article further states that the hospital had a cybersecurity plan in place, which went into effect.

"That plan went into immediate action. I think it helped in minimizing the amount of damage the encrypted agent could do," Duick was quoted as saying. “

He also said that patient information was not jeopardized and the attack did not impact patient treatment.

The hospital is working with security experts and its IT team to restore the rest of the system.

Get the latest information on Health IT and attend other valuable sessions at this two-day Summit providing healthcare leaders with educational content, insightful debate and dialogue on the future of healthcare and technology.

Learn More

Topics

News

VA Chief Information Officer Scott Blackburn Resigns

The Department of Veterans Affairs’ (VA) acting chief information officer (CIO), Scott Blackburn, has resigned from his position, effective immediately.

HIT Advisory Committee Advances Recommendations on Core Data for Interoperability

The Health Information Technology Advisory Committee, a federal advisory committee to the Office of the National Coordinator for Health IT (ONC), voted Wednesday to approve nine recommendations to update the list of data elements that vendors must exchange to be considered interoperable.

ACP Study: Only 37 Percent of MIPS Measures Are Valid

A new study from the American College of Physicians Performance Measurement Committee rated as valid only 37 percent of the 86 Quality Payment Program measures for 2017 deemed relevant to ambulatory general internal medicine.

Intermountain Healthcare Launches Study to Unlock Genomic Data

Researchers from the Salt Lake City, Utah-based Intermountain Healthcare have announced a long-term prospective study that they think has the potential to help physicians and others unlock genomic data.

UNC Health Care Receives HIMSS Analytics Stage 7 Designation

UNC Health Care, an integrated health care system based in Chapel Hill, N.C., has achieved Stage 7 designation on the HIMSS Analytics’ Electronic Medical Record Adoption Model (EMRAM).

FDA Announces Plan to Advance Medical Device Safety and Cybersecurity

The Food and Drug Administration (FDA) has announced new proposals aimed at advancing medical device cybersecurity, including placing new responsibilities on manufacturers, both before and after their devices hit the market.