Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

Ransomware Attack Disrupts Georgia Hospital’s Access to Health Records

Memorial Hospital and Manor’s access to its Electronic Health Record system was disrupted following a ransomware attack.

Memorial Hospital and Manor in Bainbridge, Georgia, can no longer access its Electronic Health Record system after falling victim to a ransomware attack.

The attack, the small rural hospital said in a social media post, was discovered early Saturday morning, after receiving alerts from its malware protection software.

According to the medical and surgical hospital services provider, its operations were not affected by the attack. However, the hospital’s staff implemented downtime procedures, reverting to pen and paper to record patient information.

“While we believe this issue will not impact either the level or the quality of care we provide to our patients, we want to be fully transparent regarding this situation,” Memorial Hospital and Manor said on Sunday.

“Please bear with us as you may experience longer wait times when you come to either the hospital or physician offices as we are working on a paper-based process,” the hospital said.

Memorial Hospital and Manor launched an investigation into the incident and started working on restoration and recovery plans.

While it said that ransomware was used in the attack, the hospital did not say whether any data was stolen from its systems and it is unclear whether any patient information was compromised.

On Monday, however, the Embargo ransomware gang claimed responsibility for the incident, adding Memorial Hospital and Manor to its Tor-based leaks site and claiming the theft of 1.15 terabytes of data.

Advertisement. Scroll to continue reading.

The group is threatening to make the allegedly stolen data public on November 8 unless a ransom is paid until then.

A relatively new group operating under a ransomware-as-a-service (Raas) business model, Embargo emerged earlier this year. The same as other ransomware gangs out there, the Embargo gang engages in double extortion, stealing data and pressuring the victims into paying a ransom.

Roughly two weeks ago, ESET reported seeing a new toolkit consisting of a loader and an endpoint detection and response (EDR) killer, dubbed MDeployer and MS4Killer, respectively, which were used in Embargo ransomware deployments.

Related: City of Columbus Ransomware Attack Impacts 500,000 People

Related: UK Teen Gets Indefinite Hospital Order For ‘Grand Theft Auto’ Hack

Related: Rural Sewage Plants Hit by Ransomware Attacks in Maine

Related: France Seeks to Protect Hospitals After Series of Cyberattacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

SSH Communications Security has appointed Pauli Haikonen as the company’s Chief Information Security Officer (CISO).

Cloud and container security firm Sysdig has tapped William Welch as CEO on its path to an IPO.

Dave Scher has been promoted to Deputy Chief Information Officer at MITRE.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.