It happens every day to companies across America. Hackers exploit vulnerable computer systems and literally “take over” the company. Using dark web tools from bases abroad where they may or may not enjoy the particular government’s protection, sanction, or even employ, hackers are attacking America, every hour of every day.
The average American is blissfully unaware of this world, even though it directly affects them, often in hugely personal ways. Your most intimate details, like medical records, may be available for sale online and there’s nothing you can do to prevent it.
When the hack, referred to as a Ransomware Attack, hits closer to home, it becomes public knowledge. Take for instance the attack in early May on American gasoline supplier Colonial Pipeline, which crippled many cities. Americans were soon queuing for gas, hoarding supplies, as gas stations across the US closed or ran out of gas.
The hackers had taken control of the systems operating the supply of gasoline via pipelines that criss-cross America. This was personal and the American public felt the effects first hand. Ransomeware was all over the news.
What most Americans don’t realize, however, is just how common these attacks are. It’s the perfect digital crime. Take over some company’s system, shut it down remotely from a place of safety, and then demand payment from the company. Once the company pays — the ransom — their systems are unlocked and they can resume business.
Bizarrely, the hacker’s “code of ethics” for want of a better term, seems to hold true. Once payment is made, the systems are released. Payment is a simple matter, digital currencies like Bitcoin make tracking the money all but impossible.
It could be argued that without access to digital currencies, these hackers would be unable to extort money from their victims without leaving a clear trail for authorities to pursue.
Aside from the obvious inconvenience and potential dangers to essential energy supplies and other critical systems, there is another hugely unreported consequence of these hacks. The bleeding of personally identifying data. That’s your info and mine, all of it fair game. Don’t forget, these hackers are inside the systems they compromise, they have sufficient access to lock down the system.
It would be hugely naive to imagine they simply leave it there. While companies run around trying to secure loans to pay off ransom demands, the hackers are merrily downloading every shred of data they can strip from the systems.
That’s where the real value lies. Your information or data, which is spread throughout numerous systems across the US. This data is worth real hard cash on the dark web, especially certain types of personal data, like your healthcare information. From recent reports, it would appear no systems within the US are immune.
Most ransomware attacks never see the public light of day. They’re kept quiet and settled away from the prying eyes of the media and the public. For very good reasons. Investors don’t like companies that appear vulnerable and companies would rather not spend the next six months explaining to their customers that their data was compromised.
Healthcare is particularly vulnerable. It’s a sector favored by hackers. Easy access to poorly protected systems, rich data pickings, and a culture of “keeping it on the QT’ among medical institutions, hospitals, and healthcare systems make this sector almost irresistible. 1 in 3 companies or institutions within healthcare get hit, according to a recent whitepaper from IT Security firm Sophos. Here are the key takeaways from the paper.
Scripps is an excellent example in case. Scripps began notifying more than 147,000 individuals in early June this year that their protected health information was exposed during a malware attack. They now face 4 class-action lawsuits.
For certain patients, exposed information included names, addresses, birthdates, health insurance data, medical record numbers, patient account numbers, and treatment details. Less than 2.5 percent of individuals’ Social Security numbers and/or driver’s license numbers were involved, according to the health system.
The list of attacks is growing exponentially.
Keep in mind that only a small percentage of these attacks are ever made public and the data above should serve as a fair warning to all healthcare organizations. No one is immune and even smaller organizations are targeted.
Clearly, we cannot exist in a modern society without sharing our most private details with companies on a daily basis. There is a huge amount of trust involved, and where many Americans now simply take this relationship for granted, assuming companies will protect their information, ransomware exploits have exposed clear flaws in companies’ approaches to protecting our privacy.
We cannot affect or restrict the data we share without compromising, for instance in a healthcare setting, our quality of care and service. In these instances, the onus falls squarely on the shoulders of the service providers to protect our data and they are failing.
Our only recourse in this instance is to lobby our congressmen and women. Changes need to be urgently brought to bear on the holders of personal data, fines imposed for lack of proper security, and audited processes put in place to ensure our data is safe.
This is going to prove challenging, particularly when not even the federal government’s systems appear immune to attack. Perhaps it is time to apply Bitcoin-style encryption to our data and fight fire with fire.
California’s Medicaid program pays for the in-home care that Cynthia Williams provides for her sister,…
HIMSS 2025: Health Innovators Unveil Solutions to Transform Patient Care, Operational Efficiency and Outcomes
For the climate tech sector, this isn’t just about political setbacks — it’s about reimagining…
Based on studies of twins, AD is thought to be passed down 70% of the time.
A study shows that people with cancer may have a lower risk of developing Alzheimer’s…
Follow these 20 voices pioneering thinking around augmented intelligence and large language models (LLMs) and…
This website uses cookies. Your continued use of the site is subject to the acceptance of these cookies. Please refer to our Privacy Policy for more information.
Read More