Feeds

Three hospital worm infection dubbed 'substantive failure'

Entirely avoidable

Secure remote control for conventional and virtual desktops

A worm attack that forced three London hospitals to shut down their computer networks late last year was entirely avoidable and represented a major failing by the organizations' IT staff, according to an independent review of the incident.

In mid-November, the Mytob worm wiggled its way into 4,700 PCs used by St Bartholomew's (Barts), the Royal London Hospital in Whitechapel, and The London Chest Hospital in Bethnal Green, and this forced the hospitals to reroute ambulances and scale back some "non-essential activities" while the infection was being contained. In some cases, doctors had to resort to pen and paper backup systems.

It took three days to restore key administrative systems such as email, and it took another two weeks to fully scan some 5,000 PCs belonging to the three hospitals, which collectively make up Barts and the London NHS Trust.

"The review concluded that the incident was 'entirely avoidable' and there was a 'substantive failure' of the Trust's information governance processes, 'especially those operational processes in the ICT domain,'" the independent review concluded. Only a portion of the report (PDF) was made public to prevent the airing of sensitive security details.

The failure at least partially involved the incorrect configuration of anti-virus software, which the report claimed left a back door for the worm to infiltrate the network. While the review didn't identify the package, IDG News says here that the hospitals used McAfee 8.5 anti-virus product, which had been able to identify Mytob for more than three years prior to the infection.

Mytob, which also goes under the name MyDoom, was introduced "accidentally" into the network with "no malicious intent," the report concluded without providing details.

The vulnerability of hospitals and other health organizations to malware attacks continues to be a major concern for administrators. Last month, hospitals around Sheffield in the UK came under attack by virulent worm known alternately as Downadup and Conficker. At least 800 PCs were confirmed to be infected, with many more potentially suspected.

The mass infiltration was allowed to take hold after administrators disabled Windows security updates, which were blamed for causing computers to reboot during surgery. Microsoft has offered a patch for the Conficker vulnerability since October, when it released an emergency update and strongly advised all customers to install it immediately.

The independent review offered 11 specific recommendations that fell into five categories:

  • Additional training to specific staff groups
  • Command and control arrangements
  • Administration and documentation within the control room
  • Categorized identification of Trust priority areas
  • Register of staff skills that can aid Trust response

The report also found hospital staff were able to ensure patient safety even during the outbreak.

"The Trust maintained a safe environment for its patients and was able to keep its theatres and outpatients clinics operational throughout the incident," it stated. "No urgent operations were cancelled, although a very small number of other operations were postponed and immediately rescheduled." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?