• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Security

Globe2 ransomware blamed for Lincolnshire NHS trust cyber attack

As suspected, Northern Lincolnshire and Goole NHS Foundation Trust finally admits that ransomware took its systems down in October

Globe2 ransomware blamed for Lincolnshire NHS trust cyber attack
  • Graeme Burton
  • @graemeburton
  • 05 December 2016
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

The cyber attack on a NHS trust in Lincolnshire that led to operations being cancelled for four days in October has been attributed to a ransomware outbreak.

In a statement circulated today, Northern Lincolnshire and Goole NHS Foundation Trust finally revealed the source of the outbreak, which led the organisation to shut down almost all the organisation's IT systems, and to cancel all operations for several days until the outbreak was contained and dealt with.

"The cyber attack experienced by Northern Lincolnshire and Goole NHS Foundation Trust in October 2016 was a variant of ransomware called Globe2," Pam Clipson, director of strategy and planning at Northern Lincolnshire and Goole NHS Foundation Trust, told Computing.

Clipson then explained how the Trust sought to tackle the outbreak: "Our teams took immediate action upon detection of the attack, minimising its impact. The Trust took the decision to halt routine appointments in order to ensure patient safety while we eradicated the issue.

"Any potentially encrypted servers were checked and cleansed both prior to switching off and before returning to ‘live' status. The majority of our systems were up and running again within 48 hours. A total of just over 2,800 patient appointments were cancelled as a result of the disruption.

"We liaised with an external cyber security company and the police to ensure our response to the incident was as rigorous as possible.

"As the police regional cyber crime unit's investigation is still in progress, it could be prejudicial to publish any further detail about the case, including the exact details of how the perpetrator gained access."

Reports in the press had suggested that the source of the outbreak was an infected USB stick, but Clipson denied this.

"We can confirm that recent publicly reported information alleging that access was gained through a USB stick or due to remote working have no grounding in fact. We can assure our patients and other stakeholders that we acted swiftly to enhance our existing cyber security but in order to maintain security and support the police investigation, we are unable to share specific information at this time on the exact steps we have taken."

Northern Lincolnshire and Goole NHS Foundation Trust wasn't the first organisation in the county to suffer from a ransomware outbreak. In January, Lincolnshire County Council was targeted in an attack that its CIO Judith Hethington Smith claimed could have cost it more than £1m in ransoms, if it hadn't taken its IT systems offline.

The action effectively shut the Council down for almost a week.

Further reading

Lincolnshire NHS trust restarts services following virus outbreak
  • Security
  • 03 November 2016
How GDPR and the Network and Information Systems Security Directive will complicate cloud computing
  • Security
  • 05 December 2016
IT restored at Lincolnshire County Council after ransomware shutdown
  • Security
  • 02 February 2016
£1m ransomware demand from previously unknown malware took down Lincolnshire County Council network
  • Security
  • 30 January 2016
Total IT shut down at Lincolnshire County Council over zero-day attack
  • Security
  • 27 January 2016
NHS targeted by ransomware scammers
  • Hardware
  • 10 October 2016
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Security
  • Public Sector
  • Health
  • NHS
  • Health
  • ransomware
  • security-spotlight

More on Security

BA faces possible £800m data breach claim

Claim would be the largest group action personal data claim in UK history

  • Legislation and Regulation
  • 13 January 2021
Boosting cyber resilience when the odds are stacked against you

2020 exposed gaps in our ability to trust information, ignited cloud migrations, and put overburdened security teams under more strain. In 2021 we must focus on the danger areas

  • Security
  • 13 January 2021
Oliver Presland, VP, Consulting Services Portfolio Ensono
Ensono: Users expect high speed and availability, and outages can severely impact brand reputation

Oliver Presland, VP, Consulting Services Portfolio Ensono discusses the impact of the pandemic on user expectations and the security landscape

  • Security
  • 11 January 2021
Nissan suffers data leak via misconfigured Git server
Nissan suffers data leak via misconfigured Git server

The exposed data included source code of Nissan mobile apps and diagnostics tool

  • Security
  • 07 January 2021
The FT has gone 'cloud-only'
The FT goes 'cloud-only', using AWS and GCP

Greg Cope, technical director for enterprise services, and interim CTO Mark Ridley discuss the successes and pitfalls along the way, as the organisation managed to ditch all of its data centres during the global pandemic

  • Cloud Computing
  • 06 January 2021
blog comments powered by Disqus
Back to Top

Most read

Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Microsoft fixes Windows 10 bug forcing restarts
Microsoft fixes Windows 10 bug forcing restarts
Twitter's Trump ban raises social media regulation questions, says Hancock
Twitter's Trump ban raises social media regulation questions, says Hancock
Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Delta: Microsoft's identity management lead is under threat
Delta: Microsoft's identity management lead is under threat
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading