• Our software update is now concluded. You will need to reset your password to log in. In order to do this, you will have to click "Log in" in the top right corner and then "Forgot your password?".
  • Welcome to PokéCommunity! Register now and join one of the best fan communities on the 'net to talk Pokémon and more! We are not affiliated with The Pokémon Company or Nintendo.

Ransomware cyberattack on various NHS hospitals

Nihilego

[color=#95b4d4]ユービーゼロイチ パラサイト[/color]
8,875
Posts
13
Years
  • I feel the need to point out that this attack isn't NHS-specific, and probably didn't target the NHS. It's ransomware which spreads through old Windows machines via file sharing, I believe (which is why the NHS was hit so bad - patient data). Some poor sod probably clicked on the wrong thing in an email and it sorta escalated. Very, very unfortunate that it's ended up here, though.

    How will companies be able to get across the point that accepting random emails is not necessarily a good thing, let alone opening them, and how will people be able to protect themselves from ransomware in the future?

    Mandatory basic computer literacy courses for their staff. So many people have no idea how to tell something that looks dangerous from something which doesn't and, at least in the UK, NHS workers aren't explicitly trained on this (as far as I'm aware).

    Will antivirus software ever be able to keep up to the evolving form of money grabbing and be able to stop ransomware before it becomes too big?

    Microsoft released a patch for this in March this year for supported computers (which, I believe, don't include XP-based ones; i.e. the software that 90% of NHS computers run on). Antivirus would have been, dare I say, overkill had the NHS just bothered keeping their software up-to-date.

    Will the NHS get away from this unscathed?

    Financially, probably; I certainly can't see them paying out to fix this, other than to their own tech people. But undoubtedly this is going to cause big problems for patients and may even cost lives - blood group data, for example, will currently be inaccessible.
     

    Leviathan

    [span="font-family:ubuntu; color: whitesmoke; padd
    1,103
    Posts
    10
    Years
  • Honestly when I heard how it spread I felt like shaking my head a little. One of the oldest tricks in the book, preying on user incompetence. I dunno if I would hurry to suggest an upgrade of their operating systems (given the crucial nature of their data and the heavy relliance on stability, which the newer Windows OSs are anything but), but if all else, better Antivirus, spam filters, anti-malware, the works.

    And of course a few crashcourses for staff on the importance of web browsing wouldn't go astray either, but of course this is but speculation on my part. The NHS will do what it can to move past this mess and recover.
     

    Raffy98

    [color=#2d9bce][b][span="font-family: 'century got
    2,153
    Posts
    7
    Years
  • Microsoft released a patch for this in March this year for supported computers (which, I believe, don't include XP-based ones; i.e. the software that 90% of NHS computers run on). Antivirus would have been, dare I say, overkill had the NHS just bothered keeping their software up-to-date.

    Microsoft decided to push an extraordinary update even on older versions of Windows like our beloved Windows XP, even though the support ended on the 8th of April 2014. (source)
    This was a forced move, in my opinion, even if this OS is almost 16 years old I still see it installed on lots of PCs in schools and hospitals.
    This is not a good thing as it can put data security at great risk and this malware is proving it.
     

    Dter ic

    Fire Emblem....[b]HEROES[/b]
    741
    Posts
    11
    Years
  • Moral: Don't use old windows machines for critical systems.

    It wouldn't surprise me if some of the expensive equipment used by the NHS had XPe (embedded) which cannot be upgraded.

    Seems like it has stopped for now though there's a chance it may happen again. The way they stopped this by registering a hardcoded domain to check for sandboxing (causing the ransomeware to exit) could suggest this from what I have read.
     

    Mewtwolover

    Mewtwo worshiper
    1,187
    Posts
    16
    Years
  • Lucario said:
    Moral: Don't use old windows machines for critical systems.
    This.
    Microsoft decided to push an extraordinary update even on older versions of Windows like our beloved Windows XP, even though the support ended on the 8th of April 2014. (source)
    This was a forced move, in my opinion, even if this OS is almost 16 years old I still see it installed on lots of PCs in schools and hospitals.
    This is not a good thing as it can put data security at great risk and this malware is proving it.
    Indeed, releasing that update to XP was actually a mistake, Microsoft should've forced users to upgrade to newer Windows instead.
     

    Raffy98

    [color=#2d9bce][b][span="font-family: 'century got
    2,153
    Posts
    7
    Years
  • Anyway, I follow this guy on YouTube. If anyone wants to see the malware in action, he made a really nice video about this.

     

    Hands

    I was saying Boo-urns
    1,898
    Posts
    7
    Years
    • Age 33
    • Seen May 2, 2024
    You gotta be a real scumbag to target an already underfunded Health system thats on the brink.
     

    pkmn.master

    Hobbyist Game Developer
    299
    Posts
    16
    Years
  • I'm a CS major entering my senior year for my bachelors, and with this news I have been thinking that it might be better to focus on cyber security rather than just software engineering jobs. The wars of the future will be fought in cyberspace, as cheesy as that sounds. I feel as if we will be seeing more ransomware attacks soon. These hackers, and wannabe hackers all over the world are getting a taste of fresh blood.
     
    Back
    Top