SEOClerks

NHS cyber attack: GPs and hospitals hit by ransomware



Write the reason you're deleting this FAQ

NHS cyber attack: GPs and hospitals hit by ransomware

So I flicked over to the news earlier and there was this report about GP's and hospitals being hit by a massive wave of ransomware. And it's a major thing as well as NHS hospitals in England and Scotland have been hit and affected by it. To the point that hospitals can't access patients details and some people have had to have important operations cancelled because of it. One guy was booked in to have a heart bypass operation that is very serious and it had to be cancelled. He was literally about to go in and they had to cancel on him due to not being able to access his details.

And I just thought, oh well that's quite bad I hope they get to sort it out soon. And I started to think about how a computer could become infected with ransomware and I thought, that's just like anything. Never open suspicious emails, don't click on unknown links, don't download and install questionable software that kind of thing.

Then I go to login to my VPS, to check how some of my campaigns are running. And then what do I see? That the background has been changed and there's a program running telling my my important files have been encrypted and I need to pay to have them decrypted.

Here's a screenshot of what I see on my VPS.
NHS cyber attack: GPs and hospitals hit by ransomware

Now I'm not at worried about this as it's only a VPS and I don't have any files on it. I only have my software running on it and that's it. So obviously I'm not going to pay anything. I can just ignore it and carry on without it affecting me in any way.

I would dread to think what it must be like to actually have this ransomware infect your main PC though! And I think the only thing you could really do is to format your disc and reinstall a fresh Windows install on it.

This is just another reason (next to HDD crashing) why you need to have a backup for all of your important files. That way if it does happen you can just reinstall Windows.

I don't know how on earth my VPS became infected though. I don't think I've even opened IE on it. I can only assume that it was probed and then a vulnerability (hole) was found and they got in that way. And that's probably how it's happened for all the other PC's that have become infected by this ransomware.

Fancy targeting hospitals though. That's playing with peoples lives man.

Have you been hit by this ransomware?

What do you think of it?

Comments

Please login or sign up to leave a comment

Join
clerkboy3
OMG!
This is clearly disgraceful... Shame on the people who did these things!!!
If they really wanted to attack websites of national interest, at least something less serious; but hospitals is really bad!...
These cyber attacks should never occur, especially in national or government websites! Maybe they need more stronger and robust websites!



Are you sure you want to delete this post?

Atropia
I stumbled across this article initially on Reddit. From my thoughts, I found it disgusting as to why people would decide to attack a public service database.



Are you sure you want to delete this post?

gkillian
It's worth noting that this is apparently a huge story - locations all over the world were attacked, from hospitals and government institutions in Europe, to FedEx in the USA, to schools in China. idealmike is correct - there was apparently a recently patched Windows vulnerability that enabled the culprits to attack targets of opportunity who had yet to make the update. (The Ransomware is apparently called Wana, for those who want to look more into it.)

These ransomware attacks are becoming more and more common, and the really garbage thing is - that as we can note from a hospital being targeted (possibly not even intentionally) - the criminals are inflicting huge amounts of damage that isn't even benefiting them in any way. They're making very little money while causing untold amounts of damage, including risking lives in this instance.

Unfortunately, ransomware seems to be on the rise - we'll probably be seeing more of this.



Are you sure you want to delete this post?

idealmike
Yeah I just heard on Sky news now they were saying how this was a repurposed worm from before and purchased by some hackers and released into the wild on an unprecedented scale. So much so that it's really taken a lot of people by surprise and had a negative impact on some very big names and brands all around the world from Fedex to car manufactures and more. And through it all, the hackers have only been reported to have made about $20,000 from it which is nothing when you consider the cost of the damages involved from it all. I hope they find whoever did it and I hope some good comes from it by way of improved systems security.

Time will tell.



Are you sure you want to delete this post?

Pedror
Hi guys. Which of you have a car? Which navigator do you use? I decided to buy a new one and I need your help. In search of information on the Internet, I looked at some good options on the site https://bestazy.com/best-truck-gps/, but I did not decide which GPS to choose for myself. What can you say about this? How many knows about this? Share your opinion with me. Perhaps you can help me find a suitable option for myself.



Are you sure you want to delete this post?

Order Now
Process Time: 0.40065479278564

Possible Duplicate queries found!
MatchCountSQLScript
SELECT * FROM `questions` as q JOIN categories_faq as c ON q.catid=c.CATID WHERE (q.status=1 OR (q.status=2 AND userid='') ) AND q.quesid='22556'1SELECT q.*, c.seo as CatSEO, c.name as CatName, c.parentid FROM `questions` as q JOIN categories_faq as c ON q.catid=c.CATID WHERE (q.status=1 OR (q.status=2 AND userid='') ) AND q.quesid='22556'

/opt/clerks-staging/docroot/viewfaq.php 496 () ()

SELECT * FROM seoclerks.members WHERE USERID='272'1SELECT * FROM seoclerks.members WHERE USERID='272'

/opt/clerks-staging/docroot/include/functions/includes/member.php 445 GetAllUserDetails() ()

SELECT * FROM categories_faq WHERE CATID='55'1SELECT CATID, seo, name, metatitle, h2header, metakeywords, metadescription, metaheader, parentid, image_name FROM categories_faq WHERE CATID='55'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() GetCategorySeoFromType()

SELECT * FROM seoclerks.members WHERE USERID=2721SELECT googleplus_profile FROM seoclerks.members WHERE USERID=272

/opt/clerks-staging/docroot/include/functions/main.php 16914 GetGooglePlusProfileFromId() ()

SELECT * FROM ratings_faq as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=22556 LIMIT 51SELECT m.username FROM ratings_faq as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=22556 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM answers a, seoclerks.members b WHERE a.quesid='22556' AND a.userid=b.USERID and b.status='1' AND a.status=1 ORDER BY a.combined_votes DESC, a.date_answered asc1SELECT a.answer, a.USERID, a.upvotes, a.downvotes, a.ansid, a.parentid, a.combined_votes, a.date_answered, b.username, b.userlevel, b.profilepicture FROM answers a, seoclerks.members b WHERE a.quesid='22556' AND a.userid=b.USERID and b.status='1' AND a.status=1 ORDER BY a.combined_votes DESC, a.date_answered asc

/opt/clerks-staging/docroot/viewfaq.php 1245 () ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=116983 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=116983 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=116991 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=116991 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=117026 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=117026 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=117028 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=117028 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=189786 LIMIT 51SELECT m.username FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=189786 LIMIT 5

/opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() ()

UPDATE questions SET total_views = total_views + 1 WHERE quesid='22556'1UPDATE questions SET total_views = total_views + 1 WHERE quesid='22556'

/opt/clerks-staging/docroot/include/functions/main.php 1765 update_Faqviewcount() ()

SELECT * FROM questions WHERE quesid!='22556' AND status='1' AND (question like '%NHS cyber attack: GPs hospitals hit ransomware%' OR question like '%cyber%' OR question like '%attack:%' OR question like '%hospitals%' OR question like '%ransomware%') -- ORDER BY RAND() LIMIT 151SELECT quesid, question, seo, userid FROM questions WHERE quesid!='22556' AND status='1' AND (question like '%NHS cyber attack: GPs hospitals hit ransomware%' OR question like '%cyber%' OR question like '%attack:%' OR question like '%hospitals%' OR question like '%ransomware%') -- ORDER BY RAND() LIMIT 15

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() ()

SELECT * FROM seoclerks.members WHERE USERID='147' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='147' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='59594' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='59594' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='19821' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='19821' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM seoclerks.members WHERE USERID='254580' limit 11SELECT profilepicture FROM seoclerks.members WHERE USERID='254580' limit 1

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture()

SELECT * FROM members_ledger WHERE script='/opt/clerks-staging/docroot/viewfaq.php' AND querystring LIKE '%id=22556%' AND added>=UNIX_TIMESTAMP(NOW())-1200 GROUP BY USERID 1SELECT USERID, username FROM members_ledger WHERE script='/opt/clerks-staging/docroot/viewfaq.php' AND querystring LIKE '%id=22556%' AND added>=UNIX_TIMESTAMP(NOW())-1200 GROUP BY USERID

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() ()

SELECT * FROM categories1SELECT * FROM categories

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() parseRedundantQueriesCache()

select * from categories_software order by name asc1select * from categories_software order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_GetSoftwareCategories()

select * from categories_wanttobuy order by name asc1select * from categories_wanttobuy order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_wantcategories()

select * from categories_wanttotrade order by name asc1select * from categories_wanttotrade order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_tradecategories()

SELECT * FROM seoclerks.members WHERE USERID='65703.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='65703.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='586511.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='586511.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

SELECT * FROM seoclerks.members WHERE USERID='272.jpg'1SELECT profilepicture FROM seoclerks.members WHERE USERID='272.jpg'

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage()

select * from categories_faq order by name asc1select * from categories_faq order by name asc

/opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_GetFaqCategories()

Invalid SQL

count(*)sql1error_msg

Expensive SQL

Tuning the following SQL could reduce the server load substantially
LoadCountSQLMaxMin

Suspicious SQL

The following SQL have high average execution times
Avg TimeCountSQLMaxMin