Literature DB >> 27437066

A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

Dean F Sittig1, Hardeep Singh2.   

Abstract

Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

Entities:  

Keywords:  Health information technology; cybersecurity; electronic health record; ransomware; socio-technical

Mesh:

Year:  2016        PMID: 27437066      PMCID: PMC4941865          DOI: 10.4338/ACI-2016-04-SOA-0064

Source DB:  PubMed          Journal:  Appl Clin Inform        ISSN: 1869-0327            Impact factor:   2.342


Introduction

Rapid adoption of electronic health records (EHRs) has fundamentally changed the way health care organizations and clinicians care for patients, manage the hospital, account for health care quality, and bill for their services. Recently there have been several high-profile ransomware attacks involving hospitals [1-6]. Furthermore, a recent survey of 61 chief information officers, chief information security officers, and other IT director-level respondents conducted by HIMSS Analytics (Chicago, IL) found that more than half of them had been targets of ransomware attacks in the previous 12 months [7]. Most of these organizations either a) fended off the attacks through intelligent use of network and user activity surveillance systems, b) were able to restore their critical systems from backups, or c) quietly paid the ransom. Reports of these events are generally leaked to the news media only after hospital operations are compromised for an extended period of time. In the absence of a centralized learning system for these events [8], it is not possible to decipher specific details of what happened, how it was initiated, who was responsible, and how it was resolved. While specific details of how ransomware attacks begin are not well known, they often start when a user is tricked into clicking a link or opening an attachment of a malicious email message. Software that is intended to damage or disable the computer is then downloaded to the user’s computer, and it quickly encrypts all of the data on that machine and possibly reaches out over the network to encrypt data on other machines as well, thus rendering all data inaccessible [9]. The user is then presented a message stating that all the files have been encrypted, and if they do not pay a ransom within a short period of time, the files will be destroyed. Once the attack has been launched, users have three basic options: 1) try to restore their data from a backup; 2) pay the ransom; or 3) lose their data. The goal of this paper is to provide recommendations to health care organizations (HCOs) on how to prevent and mitigate these malicious events. We use a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an EHR and the underlying computing infrastructure.

Origin of Ransomware

While ransomware in hospitals seems to be much discussed these days, the concept dates back to the distribution of the “AIDS Trojan virus” via floppy disk through surface mail back in 1989 [10]. Over fifteen years of internet revolution passed before the next instance of ransomware (GPCoder), which was delivered via e-mail in 2005 [11, 12]. The means of distribution of these ransomware programs has since grown to include malicious advertisements; USB drives; macros embedded in documents, spreadsheets, and presentations; archived files; batch or command files; and executables. The means of paying the ransom has also evolved from sending checks to off-shore bank accounts to paying via PayPal, from requiring users to purchase cash cards from certain websites, to paying with bitcoins. With increasing electronic data, malicious programs that encrypt key files and demand payment for the decryption key must now be taken seriously [13]. Moreover, health care has become more electronic than ever, making it attractive to hackers.

Conceptual Approach to Addressing Health IT Ransomware

As with most health information technology-related (HIT) issues, preventing a ransomware attack is a complex socio-technical problem [14]. For example, ransomware attacks often rely on some form of “social engineering,” or the psychological manipulation of people in an attempt to gain their trust and lead them to divulge confidential information, along with a sophisticated encryption algorithm (i.e., technical part of problem). Solving these types of socio-technical problems is a shared task between those responsible for configuring, maintaining, and operating the organization’s HIT infrastructure as well as the users of this infrastructure. While preventing all ransomware attacks is not possible, there are a number of steps HCOs can take to reduce their risk as well as mitigate potential harm. Based on previously developed health IT-related conceptual frameworks and the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity [15], we outline four overarching socio-technical steps to secure an EHR system and the underlying computing infrastructure [16, 17]. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, HCOs need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from a ransomware attack and take actions to prevent them in future. In the sections below, we outline a comprehensive, multi-faceted socio-technical approach to preventing and mitigating these attacks. The detailed recommendations follow Sittig and Singh’s eight dimensional socio-technical model and are summarized in ► Table 1. These recommendations address all five functions of the NIST Cybersecurity Framework Core—Identify, Protect, Detect, Respond, Recover, thus providing HCOs with an operational strategy for management of ransomware risk. While some of the recommendations we suggest might be common-sense and obvious, often these mishaps occur from failing to adhere to the most basic recommendations. For example, the most likely cause of the attack on MedStar was “an improperly installed JBoss server” that “appears to have used the default settings leaving access to the server’s management interface open to the Internet” [18]. Even after the attack, many institutions remain vulnerable, as shown by an Internet scan revealing that 2.1 million systems still remain vulnerable to the same JBoss exploit used in the attack [19]. In addition, several of our recommendations, synthesized from a variety of sources, map directly to the Health Insurance Portability and Privacy Act (HIPAA) Security rule [20].
Table 1

An Eight Dimensional Socio-technical Approach for Preventing or Mitigating Ransomware Attacks. (Based on Sittig & Singh’s Eight Dimensional Socio-technical model) [32]

Socio-technical dimensionRecommendations for Health Care Organizations
Hardware/Software

Perform regular backups of your data. Be sure to back up frequently (continuous or realtime backup may be ideal), and store your backups offline

Maintain a “gold image” of system configurations (i.e., allows an organization to reset systems to the pre-attack state)

Test your backup’s restore function regularly (e.g., quarterly for key data resources, yearly for less important aspects of the system)

Keep your operating system, application software, browsers and plug-ins, firmware, and anti-virus software up-to-date with the latest patches

Make sure your firewall is properly configured (e.g., require passwords on Remote Desktop Protocol [RDP] ports)

Segment your network by categorizing IT assets (e.g., desktops, servers, routers), data, and personnel into groups, and restricting access to these groups using entry and exit traffic filtering

Consider disabling USB (Universal Serial Bus) ports to prevent malicious software delivery

Following a successful attack, disconnect the infected computers from the network

Turn off wireless network functionality of the infected machine

If the attack is widespread, shut down all network operations to prevent the malware from spreading

Clinical Content

“Whitelist”, or allow only specified programs to run, while blocking all others, to prevent malicious executables from running

Block email messages with attachments *.exe, *.zip, *.rar, *.7z, *.js, *.wsf, *.docm, *.xlsm, *.pptm, *.rtf, *.msi, *.bat, *.com, *.cmd, *.hta, *.scr, *.pif, *.reg, *.vbs, *.cpl, and *.jar from suspicious sources

User Interface

Legitimate Messages Should Have A Telephone Number Someone Can Call (I.E., Out Of Band Check), And A Personal Email Address Which Has A Legitimate User Name That People Can Check In Their Local Directory; Email And Website Links Should Display Complete Internet Address (Url) To Build Trust

Often The First Indication That An Attack Has Occurred Is An Alarming Message Sent To The Desktop Background, Or A Window Opens To A Ransomware Program That You Cannot Close, With Instructions On How To Pay The Ransom; Users Should Turn Off The Computer And Report It To Their It Support Team Immediately

People

Do not follow unsolicited Web links in emails

Users are trained on ransomware prevention strategies, including how to identify malicious e-mails (i.e., spam, phishing, and spear-phishing messages), and avoid clicking on potentially weaponized attachments (such as a *.exe, *.zip, *.rar, *.7z, *.js, *.wsf, *.docm, *.xlsm, *.pptm, *.rtf, *.msi, *.bat, *.com, *.cmd, *.hta, *.scr, *.pif, *.reg, *.vbs, *.cpl, *.jar files). Safe file attachment formats include *.jpg, *.png, *.pdf, *.docx, *.xlsx, and *.pptx

Train users not to use USB flash drives unless the drives are obtained from a trusted source

Restrict users’ administrative privileges on local desktops and laptops. For users who require administrative access, configure 2 accounts, one with administrative privileges that is used only when necessary, and one with more restrictive privileges that they use for routine activities, including reading email and browsing the Internet

Restrict the ability of users to “write” (i.e., create and delete files), on shared drives of departmental or group shares

Workflow/communication

Scan all software downloaded from the internet prior to executing it

Conduct simulated phishing attacks (i.e., fraudulent email messages or websites that appear to be from legitimate sources), to raise user’s awareness of the problem

Conduct mock system recovery exercises (i.e., identify backups and test restore capabilities)

Conduct regular risk assessments

Require 2-factor authentication for remote access to applications

Consider using organization-wide password reset (expiration) in response to a successful attack

Internal Policies, Procedures, and Environment

Based on risk and business impact assessments, identify applications and data based on importance to the business (e.g., Tier 0 – essential for business operations; Tier 1 – 1 hour downtime acceptable; Tier 2 – 1 day downtime acceptable; Tier 3 – 1 week downtime acceptable) – Develop a plan to manage a ransomware situation accordingly

Restrict users’ ability to install and run software applications using the principle of “Least Privilege,” or minimize users’ access to only those systems and services required by their job

IT security should be under the control of executives with extensive IT experience (e.g., CIO or Chief Information Security Officer)

Consider blocking users’ access to personal email accounts (e.g., Gmail, Yahoo, Hotmail, iCloud) and web advertisements to avoid malvertising (i.e., insertion of malicious code into online advertisements to infect unsuspecting users)

External Rules and Regulations

Review all information security-related HIPAA requirements

Contact your organization’s insurance provider, a computer forensics expert, and the FBI in the event of a successful attack

Measurement and Monitoring

Monitor network activity to identify suspicious activity

Monitor the external environment for security incidents and address gaps and deficiencies as they are identified

Following unexpected extended system downtime (e.g., ransomware), convene an investigation team consisting of key stakeholders and Health IT professionals to review the event and its management, identify potential root causes, and discuss future prevention or mitigating procedures

Step 1 – Ensure Adequate System Protection by Correctly Installing and Configuring Computers and Networks

The computing infrastructure must be prepared for a ransomware attack by creating a regular backup process for the data. This backup should be made frequently (i.e., at least daily, and a continuous or real-time backup is ideal). Copies of these backups should be stored offline to ensure that ransomware has no access to them. In addition, organizations should maintain a “gold image” of system configurations (i.e., one that allows an organization to reset systems to the pre-attack state). One should also test the organization’s ability to restore these backups on a regular basis (e.g., quarterly for key data resources, yearly for less important aspects of the system). Personnel in the organization responsible for maintaining all of the computers’ operating systems, application software, browsers and plug-ins, firmware, and anti-virus software should ensure that they are up-to-date with the latest patches. Before applying any patches, health IT professionals should thoroughly test them, along with the rest of the technical and application infrastructure, to ensure that the patches do not create new, unforeseen problems. Network engineers should also ensure that the organization’s firewall is properly configured (e.g., require passwords on Remote Desktop Protocol [RDP] ports), to prevent unauthorized people or programs from accessing mission-critical organizational resources. It may be necessary to segment the network by categorizing IT assets (e.g., desktops, servers, routers), data, and personnel into groups and restricting access to these groups using entry and exit traffic filtering. Finally, at the local device level, organizations should consider disabling USB (Universal Serial Bus) ports to prevent malicious software delivery [21]. In addition to these hardware and software-specific precautions, organizations should develop a “whitelist” of specified programs that are allowed to run, while blocking all others in order to prevent malicious executables from running. Furthermore, the organization should consider blocking email messages with potentially weaponized attachments ([note: this is not an exhaustive list] *.exe, *.zip, *.rar, *.7z, *.js, *.wsf, *.docm, *.xlsm, *.pptm, *.rtf, *.msi, *.bat, *.com, *.cmd, *.hta, *.scr, *.pif, *.reg, *.vbs, *.cpl, *.jar files), from suspicious or unknown sources (e.g., sitwithheprop.ru or xxxiooo.com) [22, 23]. Organizations should also consider restricting the ability of users to “write” (i.e., create and delete files), on shared drives of departmental or group shares. They should also consider limiting users’ ability to install and run software applications using the principle of “Least Privilege,” or minimize users’ access to only those systems and services required by their job. This may include restricting users’ administrative privileges on local desktops and laptops. For users who require administrative access, configure two accounts, one with administrative privileges that is used only when necessary, and one with restricted privileges (e.g., no ability to install new applications), that they use for routine activities, including reading email and browsing the Internet.

Step 2 – Ensure More Reliable System Defense by Implementing User-Focused Strategies

Once all the computers and networks are installed and configured appropriately, the next line of defense is adequate training so that users correctly operate their devices and applications. Additionally, health IT professionals should review organization-wide electronic messages to ensure they conform to criteria for “legitimacy” below. Health care organizations do not have to develop their own training courses for either their end-users or health IT professionals; many commercially available courses exist [24]. IT professionals must help create messages such that users can easily recognize them as legitimate e-mails. Specifically, legitimate messages from one’s own institution (e.g., employer’s IT department), should not ask users to download and run file attachments or ask them to enter account or password information. In addition, these messages should have a recognizable telephone number that can be cross-referenced in the local directory to enable an out-of-band check, or a personal email address with a legitimate user name that can be cross-referenced in the local directory. All email and website links should display the complete internet address (URL) to build trust. End-users should be instructed on how to approach unrecognized emails with links and attachments. An example of such an approach is as follows: First Hover – on the link with your mouse pointer to identify where the link is taking you. Take a Second to Think – Any link, or attachment that is not from your own organization, or a recognized friend, should not to be clicked. When in doubt, either call or email (in a separate email) your friend or the organization requesting information to confirm it is legitimate. Only When Sure, Click In addition to making end-users aware about the risks and proper responses to fraudulent email messages with attachments, health IT professionals should conduct simulated phishing attacks by sending fake (but safe) email messages or links to websites that appear to be from legitimate sources [25, 26]. They should also increase their ability to respond to a successful ransomware attack by periodically conducting mock system recovery exercises (i.e., identify backups and test restore capabilities). Although this might be the norm at some places, all health IT departments should configure their virus protection software to scan all software downloaded from the internet prior to allowing users to execute it. They should also conduct regular risk and business impact assessments to identify key applications and data based on importance to the business (e.g., Tier 0 – essential for business operations; Tier 1 – 1 hour downtime acceptable; Tier 2 – 1 day downtime acceptable; Tier 3 – 1 week downtime acceptable). This could help develop a plan to manage a ransomware attack. Finally, the organization should require 2-factor authentication (i.e., something you have – token or cellphone, coupled with something you know – password), for remote access to applications.

Step 3 – Ensure Comprehensive System Monitoring of Suspicious Activities

All organizations should develop a network and user activity monitoring system that conducts surveillance for suspicious activities (e.g., similar to the anomaly detection algorithms that credit card companies use to identify stolen cards) [27], such as receipt of email messages from known fraudulent sources, executable email attachments, unexpected changes in key files on network-attached drives, unknown processes encrypting files, or significant increases in network traffic on unexpected ports. The organization should also continuously monitor the external environment for new security incidents (i.e., zero-day exploits, an attack that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known) [28], and address gaps and deficiencies as they are identified.

Step 4 – Respond, Recover, Investigate, and Learn from Ransomware Attacks

Often the first indication that a ransomware attack has occurred is an alarming message sent to the user’s desktop background, or a window opens to a ransomware program that the user cannot close which contains instructions on how to pay the ransom. In these cases, users should turn off the computer and report it to their IT support team immediately. The IT professionals should disconnect the infected computer(s) from the network and turn off wireless network functionality of the infected machine. If the attack is widespread, the IT department should shut down all network operations (i.e., both wired and wireless), to prevent the malware from spreading. Once the immediate threat is contained, the IT department should contact their organization’s insurance provider, a computer forensics expert, and in the USA, the Federal Bureau of Investigation’s (FBI) Internet Crime Complaint Center (http://www.ic3.gov/default.aspx). In addition, the organization should consider using an organization-wide password reset after recovery (i.e., immediately require all users to reset their passwords). Following any unexpected extended system downtimes, whether caused by ransomware or some other human or naturally occurring event, the organization should convene a multi-disciplinary investigation team consisting of key administrative and clinical stakeholders and Health IT professionals [29] to review the event and its management, identify potential root causes, and discuss future prevention or mitigating procedures [30]. The organization should also consider consulting with external experts in IT system reliability to review and report on recommendations for improvements in key system components, configurations, and policies and procedures [31].

Conclusions

With the recent rapid adoption of EHRs, the threat of ransomware in health care facilities is greater than ever. Simply sending an email message to all employees reminding them not to click on suspicious links or attachments in email messages is no longer sufficient to prevent the emerging threat of cyber-crime in the current, fast-paced, clinical computing environment. We outline a socio-technical approach to address ransomware that involves four overarching steps that health care organizations can undertake to secure an EHR and the underlying computing infrastructure. Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.
  7 in total

1.  Security threat posed by USB-based personal health records.

Authors:  Adam Wright; Dean F Sittig
Journal:  Ann Intern Med       Date:  2007-02-20       Impact factor: 25.391

Review 2.  Contingency planning for electronic health record-based care continuity: a survey of recommended practices.

Authors:  Dean F Sittig; Daniel Gonzalez; Hardeep Singh
Journal:  Int J Med Inform       Date:  2014-08-07       Impact factor: 4.046

3.  Patient safety goals for the proposed Federal Health Information Technology Safety Center.

Authors:  Dean F Sittig; David C Classen; Hardeep Singh
Journal:  J Am Med Inform Assoc       Date:  2014-10-20       Impact factor: 4.497

4.  Creating an oversight infrastructure for electronic health record-related patient safety hazards.

Authors:  Hardeep Singh; David C Classen; Dean F Sittig
Journal:  J Patient Saf       Date:  2011-12       Impact factor: 2.844

5.  A new sociotechnical model for studying health information technology in complex adaptive healthcare systems.

Authors:  Dean F Sittig; Hardeep Singh
Journal:  Qual Saf Health Care       Date:  2010-10

6.  Electronic health records and national patient-safety goals.

Authors:  Dean F Sittig; Hardeep Singh
Journal:  N Engl J Med       Date:  2012-11-08       Impact factor: 91.245

Review 7.  Measuring and improving patient safety through health information technology: The Health IT Safety Framework.

Authors:  Hardeep Singh; Dean F Sittig
Journal:  BMJ Qual Saf       Date:  2015-09-14       Impact factor: 7.035

  7 in total
  14 in total

1.  EARS to cyber incidents in health care.

Authors:  Mohammad S Jalali; Bethany Russell; Sabina Razak; William J Gordon
Journal:  J Am Med Inform Assoc       Date:  2019-01-01       Impact factor: 4.497

Review 2.  The Rising Frequency of IT Blackouts Indicates the Increasing Relevance of IT Emergency Concepts to Ensure Patient Safety.

Authors:  Ulrich Sax; M Lipprandt; R Röhrig
Journal:  Yearb Med Inform       Date:  2016-11-10

3.  Leveraging Patient-Reported Outcomes Using Data Visualization.

Authors:  Lisa V Grossman; Steven K Feiner; Elliot G Mitchell; Ruth M Masterson Creber
Journal:  Appl Clin Inform       Date:  2018-08-01       Impact factor: 2.342

4.  Toward More Proactive Approaches to Safety in the Electronic Health Record Era.

Authors:  Dean F Sittig; Hardeep Singh
Journal:  Jt Comm J Qual Patient Saf       Date:  2017-08-30

5.  Securing Your Radiology Practice: Evidence-Based Strategies for Radiologists Compiled From 10 Years of Cyberattacks and HIPAA Breaches Involving Medical Imaging.

Authors:  Gerald M Bowers; Mary L Kleinpeter; William T Rials
Journal:  Perspect Health Inf Manag       Date:  2022-07-01

6.  Cybersecurity in Hospitals: A Systematic, Organizational Perspective.

Authors:  Mohammad S Jalali; Jessica P Kaiser
Journal:  J Med Internet Res       Date:  2018-05-28       Impact factor: 5.428

Review 7.  Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks.

Authors:  Salem T Argaw; Juan R Troncoso-Pastoriza; Darren Lacey; Marie-Valentine Florin; Franck Calcavecchia; Denise Anderson; Wayne Burleson; Jan-Michael Vogel; Chana O'Leary; Bruce Eshaya-Chauvin; Antoine Flahault
Journal:  BMC Med Inform Decis Mak       Date:  2020-07-03       Impact factor: 2.796

8.  The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review.

Authors:  Salem T Argaw; Nefti-Eboni Bempong; Bruce Eshaya-Chauvin; Antoine Flahault
Journal:  BMC Med Inform Decis Mak       Date:  2019-01-11       Impact factor: 2.796

9.  Artificial Intelligence and the Implementation Challenge.

Authors:  James Shaw; Frank Rudzicz; Trevor Jamieson; Avi Goldfarb
Journal:  J Med Internet Res       Date:  2019-07-10       Impact factor: 5.428

Review 10.  Radiochemistry, PET Imaging, and the Internet of Chemical Things.

Authors:  Stephen Thompson; Michael R Kilbourn; Peter J H Scott
Journal:  ACS Cent Sci       Date:  2016-08-16       Impact factor: 14.553

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.