Skip to main content

Woman dies during a Ransomware attack on a German hospital

Woman dies during a Ransomware attack on a German hospital

It could be the first death directly linked to a cybersecurity attack


A woman in Germany died during a ransomware attack on the Duesseldorf University Hospital, in what may be the first death directly linked to a cyberattack on a hospital. The hospital couldn’t accept emergency patients because of the attack, and the woman was sent to a health care facility around 20 miles away, the Associated Press reported.

The cyberattack was not intended for the hospital, according to a report from the German news outlet RTL. The ransom note was addressed to a nearby university. The attackers stopped the attack after authorities told them it had actually shut down a hospital.


Health care facilities are one of the biggest targets for cyberattacks, and cybersecurity experts have warned for years that most hospitals aren’t prepared. They rely heavily on devices, like radiology equipment, that are often connected to the internet. Without those tools, they aren’t as able to treat patients.

“If systems are disrupted over the internet, by an adversary or an accident, that can have a profound impact on patient care,” says Beau Woods, a cybersecurity advocate and cybersafety innovation fellow with the Atlantic Council, told The Verge last year.

Even attacks that target patient data, and don’t directly impact medical devices, can hurt patient outcomes: one study found that a hospital’s death rate from heart attacks goes up in the years after a data breach. That’s probably because hospitals have to divert resources to respond to the attack or upgrade software in a way that changes how doctors operate.

Major cyberattacks, like the 2017 WannaCry cyberattack, have shut down major hospital systems — WannaCry took down the United Kingdom’s National Health Service, for example. No deaths were directly linked to that attack, but most experts warned it was only a matter of time.


German authorities are still investigating this woman’s death. If her diversion to another hospital is found to be responsible for her death, police may treat the cyberattack as a homicide.

Comments

Popular posts from this blog

How to secure PayPal

How to secure PayPal By- Aarti Jatan Your online finances need proper protection. Learn how to secure your PayPal account. With hundreds of millions of users around the world, PayPal has long been an international leader in the electronic payments industry. But as we know, money never fails to attract fraud, especially now, with as much of life as possible taking place online. Here is what you need to do to stay safe when sending or receiving money through PayPal. How secure is PayPal? As a matter of fact, PayPal is quite a reliable platform that maintains a high level of security — and keeps improving it. Thus, the company has an official program deploying white hat hackers to unearth vulnerabilities (the so-called bug bounty), under which it has already paid out almost $4 million since 2018. The program also covers several other services owned by PayPal, such as Venmo. PayPal also treats its users’ data responsibly: It did have one reliably reported leak, in 2017, but the leak invol...

WHAT IS A COMPUTER

WHAT IS A  COMPUTER By- Aarti Jatan A computer is a machine that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming . Modern computers have the ability to follow generalized sets of operations, called programs . These programs enable computers to perform an extremely wide range of tasks. A "complete" computer including the hardware , the operating system (main software ), and peripheral equipment required and used for "full" operation can be referred to as a computer system . This term may as well be used for a group of computers that are connected and work together, in particular a computer network or computer cluster . Computers are used as control systems for a wide variety of industrial and consumer devices . This includes simple special purpose devices like microwave ovens and remote controls , factory devices such as industrial robots and computer-aided design , and also general purpo...

A DEEP DIVE INTO THE OFFICIAL DOCKER IMAGE FOR PYTHON

  A DEEP DIVE INTO THE OFFICIAL DOCKER IMAGE FOR PYTHON The official Python image for Docker is quite popular, and in fact I recommend one of its variations as a base image . But many people don’t quite understand what it does, which can lead to confusion and brokenness. In this post I will therefore go over how it’s constructed, why it’s useful, how to use it correctly, as well as its limitations. In particular, I’ll be reading through the python:3.8-slim-buster variant, as of August 19, 2020 , and explaining it as I go along. Reading the Dockerfile The base image We start with the base image: FROM debian:buster-slim That is, the base image is Debian GNU/Linux 10, the current stable release of the Debian distribution, also known as Buster because Debian names all their releases after characters from Toy Story. In case you’re wondering, Buster is Andy’s pet dog . So to begin with, this is a Linux distribution that guarantees stability over time, while providing bug fixes. The slim...