NHS could have 'fended off' WannaCry by taking 'simple steps' – report

Service was warned of the risks a year before ransomware hit

By Kat Hall

Posted in Security, 27th October 2017 08:03 GMT

The UK health service could have fended off WannaCry "if only it had taken simple steps to protect its computers", but failed to heed warnings about falling victim to a cyber attack a full year before that incident happened.

This was among the findings of an investigation by Blighty's National Audit Office, which today published a report, WannaCry cyber attack and the NHS in England, focused on the impact on Britain's health service and its patients; why some parts of the NHS were affected; and the effectiveness of the response.

WannaCry hit 34 per cent of health trusts in England, although the full extent of the disruption and financial impact is unknown. Thousands of appointments and operations were cancelled and in five regions of the UK patients had to travel further to accident and emergency departments.

The watchdog found that the health service did not formally respond to the cyber attack warning from early 2016 until July 2017.

Meg Hillier, chair of the Public Accounts Committee, said:

"The NHS could have fended off this attack if it had taken simple steps to protect its computers and medical equipment. Instead, patients and NHS staff suffered widespread disruption, with thousands of appointments and operations cancelled.

"The Department of Health failed to agree a plan with the NHS locally for dealing with cyber attacks so the NHS response came too late in the day.

"The NHS and the Department need to get serious about cyber security or the next incident could be far worse."

All NHS organisations infected by WannaCry had unpatched or unsupported Windows operating systems so were susceptible to the ransomware.

However, whether organisations had patched their systems or not, taking action to manage their firewalls facing the internet would have guarded organisations against infection, it said.

"NHS Digital told us that the majority of NHS devices infected were unpatched but on supported Microsoft Windows 7 operating systems."

Unsupported devices, those on XP, were in the minority of identified issues.

Fending off cyber attacks as important as combatting terrorism, says new GCHQ chief

READ MORE

NHS Digital has also confirmed that the ransomware spread via the internet, including through the N3 network, the broadband network connecting all NHS sites in England. There were no instances of the ransomware spreading via NHSmail, the health service's email system.

Back in 2014, the Department of Health and Cabinet Office wrote to trusts saying it was essential they had "robust plans" to migrate from old software, such as Windows XP, by April 2015.

In March and April 2017, NHS Digital had issued critical alerts warning organisations to patch their systems to prevent WannaCry. However, before May 12, the Department had no formal mechanism for assessing whether local NHS organisations had complied with their guidance and whether they were prepared for a cyber attack.

Amyas Morse, head of the National Audit Office, said today:

"The WannaCry cyber attack had potentially serious implications for the NHS and its ability to provide care to patients. It was a relatively unsophisticated attack and could have been prevented by the NHS following basic IT security best practice.

"There are more sophisticated cyber threats out there than WannaCry so the Department and the NHS need to get their act together to ensure the NHS is better protected against future attacks."

In order to mitigate risks, the NHS pledged to learn from WannaCry and is taking action.

These include developing a response plan setting out what the NHS should do in the event of a cyber attack; ensuring organisations implement critical CareCERT alerts (emails sent by NHS Digital providing information or requiring action); and ensuring that organisations are taking the cyber threat seriously. ®

Sign up to our NewsletterGet IT in your inbox daily

92 Comments

More from The Register

WannaCrypt NHS victim Lanarkshire infected by malware again

Infect me once, shame on you. Infect me twice…

Ransomware keeping cops, NHS and local UK gov bods awake at night

Biggest threat next year, Met Police cybercrime boss says

Acronis: Ransomware protection! Get yer free ransomware protection!

Windows-only but sure, thanks

Ransomware brutes smacked 1 in 3 NHS trusts last year

One was hit 19 times over 12 months

NHS deploys Microsoft threat detection service on just 30,000 devices

Updated That's only 2% of Blighty's health service PCs

Cryakl ransomware antidote released after servers seized

Don't pay the miscreants – don't even fix a price

Microsoft emergency update: Malware Engine needs, erm, malware protection

Stop appreciating the irony and go install the patch now

Police anti-ransomware warning is hotlinked to 'ransomware.pdf'

This (probably) isn't a spear phishing attack but we were too afraid to verify

Lanarkshire NHS infection named as Bitpaymer variant

Ransomeware asked for 50+ Bitcoin, but analysts say files can't be decrypted anyway

Scammers become the scammed: Ransomware payments diverted with Tor proxy trickery

Of course this does nothing for victims' encrypted files