University of Maryland Medical System investigates malware attack

Julie Spitzer - Print  | 

Baltimore-based University of Maryland Medical System is investigating a malware attack that affected about 250 of its 27,000 devices early Dec. 9, The Baltimore Sun reports.

Here are four things to know:

1. The attack began around 4:30 a.m. on Dec. 9, but patient care was not affected, and there is no evidence that patient data was compromised, Jon Burns, the hospital system's chief information officer and senior vice president, told The Baltimore Sun.

2. A variant of malware infected but did not encrypt the hospital's computer system. As a result, the hospital did not need to pay a ransom to unlock the infected devices, which were mostly desktop computers.

3. The hospital took its networks and devices offline around 7 a.m. to isolate the infected devices. The rest of the system was back online by the morning of Dec. 10.

4. "This was one of those things where nobody wants to go through it, but I think our organization responded in a very good way, both from a technical perspective as well as our caregivers," Mr. Burns told the Sun.

More articles on cybersecurity:

Threats and benefits of cloud-based storage systems: Penn Medicine’s CISO shares insights
California eye center plans to switch EMR vendors after it suffered a ransomware attack
Google's cloud security command center now available in beta: 3 notes




© Copyright ASC COMMUNICATIONS 2019. Interested in LINKING to or REPRINTING this content? View our policies by clicking here.

To receive the latest hospital and health system business and legal news and analysis from Becker's Hospital Review, sign-up for the free Becker's Hospital Review E-weekly by clicking here.