Ontario hospital group confirms attack was ransomware

Share post:

The Daixin Team ransomware gang is taking credit for attacks that have hobbled five Southwestern Ontario hospitals that share a service provider.

The gang has also started posting what it says are 5.6 million records with personal and health information including names, Social Insurance numbers and patient treatment information.

Usually a ransomware gang will only start posting data if an organization refuses to pay a ransom or if negotiations have broken down.

As we reported on Oct. 24, the institutions in the group — Bluewater Health of Sarnia, Chatham Kent Health Alliance, Erie Shores HealthCare of Leamington, Hôtel-Dieu Grace Healthcare and Windsor Regional Hospital, along with shared service provider TransForm Shared Service Organization — were hit by a cyber attack that forced the curtailment of some healthcare services.

This week, Transform confirmed this was a ransomware attack. “We have determined through our investigation that, unfortunately, certain patient, employee and professional staff data has been taken and there is the possibility that the actors responsible for this attack may publish some of the stolen data,” it said in a statement.

“We continue to work around the clock to restore systems, and we expect to have updates related to the restoration of our systems in the upcoming week. We are working closely with law enforcement – including local police departments, Ontario Provincial Police, Interpol and FBI – and we have notified all relevant regulatory organizations including the Ontario Information and Privacy Commissioner.”

The Daixin posting was reported on X by Canadian-based Emsisoft threat analyst Brett Callow. In its message about the availability of the stolen data, the Daixin gang boasts that the information can be used for “a variety of crimes including opening new financial accounts, taking out loans…phishing and hacking… filing fraudulent tax returns, obtaining drivers licences” and more.

The healthcare sector is seen by crooks as vulnerable to pressure because of the sensitive medical information they hold. In the U.S., hospitals will likely have patients’ payment card data, while crooks may be betting that hospitals here will ask provincial governments — which largely fund healthcare — to bail them out.

According to a 2022 report by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Daixin Team has been actively targeting U.S. businesses, predominantly in the healthcare and public health (HPH) sector, with ransomware and data extortion operations.

Typically, CISA says, Daixin gains initial access to victims through virtual private network (VPN) servers. In one confirmed compromise, the actors likely exploited an unpatched vulnerability in the organization’s VPN server. In another, the actors used previously compromised credentials to access a legacy VPN server that did not have multifactor authentication (MFA) enabled. The actors are believed to have acquired the VPN credentials through the use of a phishing email with a malicious attachment.

Healthcare institutions are finding it harder to fighting ransomware, if a report released this week by Sophos is accurate. Twenty-four per cent of healthcare organizations said they were able to disrupt a ransomware attack before the attackers encrypted their data. That was down from 34 per cent in 2022. This is the lowest rate of disruption reported by the sector over the past three years.

Also, healthcare respondents this year took longer to recover than in 2022. Only 47 per cent said they recovered from an attack in a week, compared to 54 per cent last year.

Compromised credentials were the number one root cause of ransomware attacks against healthcare organizations, followed by exploits.

The Sophos State of Ransomware 2023 survey polled 3,000 IT/cybersecurity leaders in organizations with between 100 and 5,000 employees, including 233 from the healthcare sector, across 14 countries in the Americas, EMEA, and Asia Pacific.

The post Ontario hospital group confirms attack was ransomware first appeared on IT World Canada.
Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways