New Jersey, Pennsylvania hospitals affected by cyberattacks

Avatar

Hospitals in New Jersey and Pennsylvania are dealing with the ramifications of cyberattacks this week following several similar incidents that took place during the Thanksgiving holiday.

This week, Capital Health said it is experiencing network outages because of a cybersecurity incident. The company runs two hospitals — Regional Medical Center in Trenton and Capital Health Medical Center in Hopewell — as well as several smaller healthcare facilities across the New Jersey-Pennsylvania region. The incident follows a separate attack on a health services provider that operates multiple hospitals in New Jersey, which forced it to turn away emergency vehicles.

“We continue to care for patients in both hospitals, including our Emergency Rooms, in our practices, and at all other locations under established protocols for system downtimes where necessary. We are prioritizing safe patient care, while working to restore the network and address the impact of this disruption,” they said in a statement.

“After becoming aware of the situation, we immediately notified the appropriate authorities and are working closely with law enforcement and third-party experts to address the situation quickly and safely.”

The company’s IT team said it is working to restore hospital systems and data but noted that its emergency rooms are still open to those in need of care. Some elective surgeries have been moved to later dates and outpatient radiology appointments are not available.

Neurophysiology and non-invasive cardiology testing will be rescheduled as well and patients are being contacted with more information.

They are unsure of when the issue will be resolved but are planning to “operate with system limitations for at least the next week.”

The attack on Capital Health comes days after Ardent Health Services — which operates multiple hospitals in New Jersey as well — reported widespread issues due to a ransomware attack on its systems.

The attack on Ardent Health Services affected more than 30 hospitals across the country and forced several to divert ambulances away from their emergency rooms.

Since 2020 and the onset of the COVID-19 pandemic, ransomware gangs have made a point of targeting healthcare facilities because they are likely to pay exorbitant ransoms.

A study from University of Minnesota researchers released in October found that ransomware incidents increased the in-hospital mortality for patients admitted to attacked hospitals. The researchers estimate that from 2016 to 2021, between 42 and 67 Medicare patients died as a result of the outages caused by ransomware attacks.

“The true number of deaths caused by ransomware attacks is likely even larger, when you include patients with other types of health insurance coverage,” the researchers said in Stat News earlier this month.

“The morbidity effects of a ransomware attack (i.e., how delays in care make existing conditions worse) are as yet unknown.”

Recorded Future — the parent company of The Record — reported at least 19 ransomware attacks on healthcare facilities last month and steep increases in incidents throughout 2023.

BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

CISA warns of attacks on Unitronics tool used by water utilities, wastewater systems

Next Post

US Treasury sanctions Sinbad cryptocurrency mixer used by North Korean hackers

Related Posts

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia

Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations in Central Asia, East Asia, and Europe. Recorded Future's Insikt Group, which has assigned the activity cluster the name TAG-110, said it overlaps with a threat group tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) as UAC-0063, which, in turn, overlaps with APT28. The
Avatar
Read More

Multi-Stage ValleyRAT Targets Chinese Users with Advanced Tactics

Chinese-speaking users are the target of an ongoing campaign that distributes malware known as ValleyRAT. "ValleyRAT is a multi-stage malware that utilizes diverse techniques to monitor and control its victims and deploy arbitrary plugins to cause further damage," Fortinet FortiGuard Labs researchers Eduardo Altares and Joie Salvio said. "Another noteworthy characteristic of this malware is its
Avatar
Read More

Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution

A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing System (CUPS) on Linux systems that could permit remote command execution under certain conditions. "A remote unauthenticated attacker can silently replace existing printers' (or install new ones) IPP urls with a malicious one, resulting in arbitrary command execution (on the computer) when a print
Avatar
Read More