Kansas Heart Hospital Hit With Ransomware; Hackers Do Not Unlock Files After Receiving Ransom Payment

May 23, 2016
Wichita, Kan.-based Kansas Heart Hospital was hit with a ransomware attack last Wednesday, but after the hospital paid an undisclosed ransom, the hackers demanded more, according to local news reports.

Wichita, Kan.-based Kansas Heart Hospital was hit with a ransomware attack last Wednesday, but after the hospital paid an undisclosed ransom, the hackers demanded more, according to local news reports.

Local television news station KWCH reported last Friday that Kansas Heart Hospital president Greg Duick, M.D., acknowledged that the hospital was the victim of a cyber attack.

The KWCH report states quotes Duick as stating, “Kansas Heart Hospital had a cyber attack occur late Wednesday evening. We suspect, as attacks other parts of the country, this was an offshore operation.”

According to the report, hackers got access to the system and locked up the files, refusing to give back access unless the hospital paid a ransom.

The news report, written by Deedee Sun, quotes Duick as stating, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”

However, after the hospital paid a ransom, the hacker did not return full access to the files, according to the news report. Instead, they demanded another ransom. “The hospital says it will not pay again,” the article stated.

"The policy of the Kansas Heart Hospital in conjunction with our consultants, felt no longer was this a wise maneuver or strategy," Duick stated, according to the article.

As previously reported in Healthcare Informatics, FBI has officially stated that it does not recommend paying a ransom in a ransomware attack.

“Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cyber criminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals,” FBI Cyber Division Assistant Director James Trainor stated in a FBI blog post.

The article further states that the hospital had a cybersecurity plan in place, which went into effect.

"That plan went into immediate action. I think it helped in minimizing the amount of damage the encrypted agent could do," Duick was quoted as saying. “

He also said that patient information was not jeopardized and the attack did not impact patient treatment.

The hospital is working with security experts and its IT team to restore the rest of the system.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...