Last week, hackers bricked Hollywood Presbyterian Medical Center, encrypting all the data on its devices and demanding 9,000 Bitcoin (~$3.6m) to give the hospital's IT staff the keys needed to reboot it.
The hospital apparently negotiated a steep discount: they've paid a mere $17,000 (40 btc) to the hackers. Possibly they used the billing department's ninja bill-collectors to negotiate for them.
The move was greenlit by the hospital's South Korean owners. From the CEO's statement, it sounds like they got the actual, working keys.
“The malware locks systems by encrypting files and demanding ransom to obtain the decryption key. The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” Stefanek said. “In the best interest of restoring normal operations, we did this.”
The hospital said it alerted authorities and was able to restore all its computer systems by Monday with the assistance of technology experts.
Hollywood hospital pays $17,000 in bitcoins to hackers who took control of computers
[Richard Winton/LA Times]
(Image: Hollywood Presbyterian Medical Center, Junkyardsparkle, CC0))
For decades, it was a commonplace in western business that no one could afford to ignore China: whatever problems a CEO might have with China's human rights record could never outweigh the profits to be had by targeting the growing Chinese middle-class.
A little over a year ago, Bloomberg stunned the world with a report that claimed that Chinese intelligence services had figured out how to put undetectable, rice-grain-sized hardware implants into servers headed for the biggest US cloud and enterprise IT firms, and that when some of the victims discovered this fact, they quietly ripped out […]
How can a single, ill-conceived law wreak havoc in so many ways? It prevents you from making remix videos. It blocks computer security research. It keeps those with print disabilities from reading ebooks. It makes it illegal to repair people's cars. It makes it harder to compete with tech companies by designing interoperable products. It's even been used […]
We have a theory about those throw blankets that are barely big enough to cover your legs. The only people who seem to make them or use them are grandmothers, and the blankets are only that small because Nana got bored halfway through the sewing job. Look, we’re sure she means well. But if you […]
Remember when the default state of your online presence was anonymity? That’s not so clear-cut anymore, and the worst part is you may not even know who is using your data or what they’re using it for. Small wonder that so many people are choosing to surf through virtual private networks. VPNs filter web access […]
Get ready for the stream of your dreams, binge-watchers. There’s a contest afoot, and at stake is a lifetime subscription to Netflix. All you have to do is sign up, and you’re entered to win this ultimate Netflix plan. When does it expire? Only when you do. And hey, just in case you need something […]