Tag - Ransomware

Cyber spying on the rise, EU agency warns
BRUSSELS — Crafty hacking groups backed by hostile states have increasingly targeted European public institutions with cyber espionage campaigns in the past year, the European Union’s cybersecurity agency said Wednesday. Public institutions were the most targeted type of organization, accounting for 38 percent of the nearly 5,000 incidents analyzed, the ENISA agency said in its yearly threat landscape report on European cyber threats. The EU itself is a regular target, it added. State-aligned hacking groups “steadily intensified their operations toward EU organizations,” ENISA said, adding that those groups carried out cyber espionage campaigns on public bodies while also attempting to sway the public through disinformation and interference.  The report looked at incidents from July 1, 2024 to June 30, 2025. Multiple European countries said in August that they had been affected by “Salt Typhoon,” a sprawling hacking and espionage campaign believed to be run by China’s Ministry of State Security. In May, the Netherlands also attributed a cyber espionage campaign to Russia, and the Czech government condemned China for carrying out a cyberattack against its foreign ministry exposing thousands of unclassified emails. These incidents underlined how European governments and organizations are increasingly plagued by cyber intrusions and disruption. Though state-backed cyber espionage is on the rise, ENISA said the most “impactful” threat in the EU is ransomware, a type of hack where criminals infiltrate a system, shut it down and demand payment to allow victims to regain control over their IT. Another type of attack, known as distributed denial-of-service (DDoS), was the most common type of incident, ENISA said. DDoS attacks are most commonly deployed by cyber activists. ENISA said different types of hacking groups are increasingly using each others’ tactics, most notably when state-aligned groups use cyber-activist techniques to hide their provenance. The agency also highlighted the threat to supply chains posed by cyberattacks, saying the interconnected nature of modern services can amplify the effect of a cyberattack.   Passengers at Brussels, Berlin and London Heathrow airports recently experienced severe delays due to a cyberattack on supplier Collins Aerospace, which provides check-in and boarding systems. “Everyone needs to take his or her responsibilities seriously,” Hans de Vries, the agency’s chief operations officer, told POLITICO. “Any company could have a ripple effect … We are so dependent on IT. That’s not a nice story but it’s the truth.”
Intelligence
Security
Supply chains
Services
Disinformation
The NHS digital revolution needs more than vision — it needs action now
In an AI-first era, where AI is becoming an integral part of everything we do, its applications spanning across different sectors and facilitating various parts of our daily routines, healthcare should be no exception. In an ideal world, this is what healthcare should look like: a patient goes to an app to book an appointment, AI directs them to the doctor with the best expertise, knows which equipment is available, and which location makes most sense, and puts the appointment in their respective diaries. The complexity with healthcare is that this isn’t just a system, but three interconnected worlds that must work together seamlessly. Patients rightly want care when and where they need it. Clinicians want to ensure their expert resource is directed as impactfully and efficiently as possible. And medical assets, from MRI scanners to life-saving medications, must be available when and where required. This is where investing in technology becomes key. The good news is that the AI revolution in healthcare is already beginning, and the early results are encouraging. Some GP practices have cut waiting times by 73 percent using smart triaging systems, reducing waits from 11 to three days. AI can help tackle the dreaded ‘8am rush’ when phone lines jam with appointment requests. In the same study, GP practices using these systems reduced phone-based contacts from 88 percent to 18 percent and saw a 30 percent drop in missed appointments — potentially saving £350 million annually from reduced non-attendance. Through ServiceNow’s work with NHS Trusts, we’ve identified five areas where change can make an immediate difference, as outlined in ServiceNow’s NHS Digital Transformation white paper: * improving the staff experience; * joining up corporate services; * protecting against cyber threats; * streamlining patient journeys; and * harnessing AI. The reward for getting this right? We could see £35 billion in productivity savings by 2030. That’s money that could be reinvested directly into patient care. Better staff systems could save £750 million annually — not through cuts, but by giving critical NHS workers back the 29 million hours currently lost to bureaucracy. Right now, it takes up to 120 days to get a new NHS employee properly started. In some trusts we have cut that to 25-40 days. Imagine the impact if this was rolled out across the whole NHS. When you’re trying to grow the workforce from 1.5 to 2.4 million people by 2036, every day matters. Joining up corporate services could save another £1.6 billion each year. This is especially urgent given that Integrated Care Systems are facing combined deficits and have been told to slash running costs by 50 percent. The NHS 10 Year Health Plan for England talks about rebuilding the NHS in working-class communities; areas that currently get 10 percent less funding per person. Digital transformation isn’t just about efficiency; it’s about equity. When systems work properly, everyone benefits, but the biggest gains go to those who currently struggle most to access care. The problem is these parts barely speak to each other. The white paper reveals just how costly this disconnection has become: 13.5 million hours wasted annually due to inadequate IT, a 7.5 million case waiting list, and nearly £3 billion spent each year compensating for care failures. Behind every statistic is a person. Someone facing a delayed diagnosis, a cancelled operation or simply not receiving the care they deserve. This fragmentation isn’t just inefficient, it has a direct effect on patients and clinicians too. We’re spending £15.5 billion annually, 6.5 percent of the entire NHS budget, on corporate services that don’t talk to each other. Nurses are spending over a quarter of their time on paperwork instead of caring for patients. GP practices are drowning in 240 million calls annually from frustrated patients who can’t get through. We have a patchwork of systems where crucial information gets lost in translation.  When it takes 20 separate manual processes just to say goodbye to a leaving employee, you know there’s room for improvement. In addition to internal challenges, there’s the cyber threat affecting the NHS. Healthcare cyberattacks doubled between 2022 and 2023. A single ransomware attack forced over 10,000 patients to have their appointments cancelled at just two trusts. Without proper digital defenses and monitoring, we’re one attack away from regional healthcare paralysis. But here’s the thing, AI is only as good as the systems it connects to. That’s where we need to be honest about the infrastructure challenge. You can’t build tomorrow’s healthcare on yesterday’s technology. We need systems that talk to each other, share information securely and put the right information in the right hands at the right moment. The truth is, the NHS can’t do this transformation alone. The scale is too big, the timeline too tight and the technical challenges too complex. It’s about partnership — because the best outcomes happen when public sector insight combines with private sector innovation and speed. We need genuine partnerships focused on outcomes, not just products. At ServiceNow, we’ve seen what’s possible when this approach works: connected systems, freed-up time and better patient experiences. We’re at a crossroads, and the path we choose in the next two to three years will determine the NHS our children inherit. We can keep tinkering around the edges, managing decline through small improvements or we can be bold and build the digital foundation that healthcare needs. This isn’t a distant dream; it’s an immediate opportunity. Patients have waited long enough. NHS staff have endured enough frustration with systems that make their jobs harder, not easier. The cost of inaction isn’t just measured in pounds, it’s measured in lives. The technology exists, the knowledge is there and the legal framework is in place. What we need now is to act on what we already know works for this transformation to happen.
Budget
Rights
Technology
Services
Health Care
British institutions to be banned from paying ransoms to Russian hackers
LONDON — Hospitals, local councils and operators of critical U.K. infrastructure are among the organizations who will be banned from paying ransoms to hackers under new plans unveiled by the British government. The move — which will cover all public sector bodies as well as the owners and operators of critical national infrastructure — comes after years of escalating cyber attacks on parts of the British state. Many of these attacks on British institutions and infrastructure can be traced back to Russia-aligned hacking groups that are now the subject of sanctions. Estimates from Chinalysis suggest ransomware payments globally generated $1 billion from victims in 2023 alone. The new measures, which also include the mandatory reporting of all ransomware incidents, come following a consultation in which three-quarters of respondents supported a targeted ban. Security Minister Dan Jarvis told MPs in a written statement on Tuesday that the government’s ransomware plan will provide “vital intelligence to expose, detect and disrupt these criminal networks” and to “defend the economy and our business we need to break the ransomware business model.” The government highlighted the case of the British Library — which suffered a cyber attack in 2023 but did not pay a ransom to hackers. But Rebecca Lawrence, its chief executive, said the library “which holds one of the world’s most significant collections of human knowledge” had its technology infrastructure destroyed by the attack, with users still feeling the impact. This year has seen an escalation in cyber attacks with luxury retailer Harrods, and high-street names the Co-op and Marks and Spencer all seeing their services disrupted by criminals.  INVESTMENT SHAKE-UP While the government is moving to strengthen one arm of its national security operation, it is also seeking to remove what it called “red tape” from other aspects of its defenses. The Cabinet Office announced Tuesday that it is making changes to its National Security and Investment Act — legislation aimed at safeguarding critical areas of the economy from malign or foreign influence. These include removing requirements for key businesses to tell the government about internal restructuring changes or alert officials when appointing a liquidator. Pat McFadden, the department’s lead minister, told MPs that the changes “reduce business burdens without exposing the country to greater risk.” Ministers will also consult on plans to shake up what are defined as key sectors under the legislation to update the importance of areas such as semiconductors and artificial intelligence. The consultation also will look at bringing the water sector under national security legislation.  This would mean that the industry in Britain — which itself is under extensive scrutiny due to debt-laden ownership structures — will have any potential buy-outs, such as those based overseas, escalated to national security experts. The annual review of the legislation, also published Tuesday, revealed that the government had only blocked one deal out of all those called in for further scrutiny. A further 16 saw a “final order” notice submitted to mitigate risks to national security, which could include stringent conditions applied to an investment deal.
Intelligence
Security
Water
Artificial Intelligence
Technology
Why hackers love Europe’s hospitals
Simon Meier, a trauma and orthopedic surgeon, was off duty when a colleague called one evening. University Hospital Frankfurt was the target of a massive cyberattack which required an urgent response. The next morning, Meier, who was also the hospital’s emergency planner, sat in a crisis meeting with hospital leadership. IT teams had worked through the night without success, and now, a critical decision loomed. “We had to cut off the whole hospital network from the internet,” Meier recalled. “We didn’t want to give anyone the chance to tamper with the IT systems anymore.” Internet access was severed, databases were frozen and hospital staff had to switch to pen and paper, as well as phone calls, to deliver care. “It severely impaired the communication between our electronic systems,” Meier said. Accessing lab results or data from mobile X-ray machines became a headache, with systems unable to report to the hospital database. “We had to reschedule appointments just to be able to have a look into the patient’s files and postpone some planned surgeries,” he said. Now, over one-and-a-half years later, the system is not yet back to “normal,” Meier said. Internet and database access remain restricted, and a costly infrastructure rebuild is underway to plug long-exploited vulnerabilities. This attack is just one of 309 cybersecurity incidents targeting the health care sector in the EU in 2023 alone — more than any other critical sector. The cost of a major incident typically reaches some €300,000. Beyond the financial impact, cyberattacks pose a threat to patients’ lives. The stakes became clear in a recent case in the U.K., where the death of a patient was linked — among other contributing factors — to a delayed blood test result caused by a cyberattack that disrupted pathology services last summer.  World Health Organization (WHO) chief Tedros Adhanom Ghebreyesus called cyberattacks on health care “issues of life and death.”  While health care has become the primary target for cybercriminals in recent years, putting lives at risk, the sector paradoxically invests less in cybersecurity than any other industry, leaving high-value data vulnerable to attack. PERFECT TARGET For cybercriminals, targeting health data “is a perfect business plan,” said Christos Xenakis, professor at the department of digital systems at the University of Piraeus, Greece. “It’s easy to steal data, and what you steal, you can sell it at a high price.” Ransomware attacks — where hackers lock data and demand a ransom — dominate the sector, an EU Agency for Cybersecurity (ENISA) report showed. “They achieve two targets: One is to get the data and sell (it), and the other is to encrypt the whole system, disrupt the whole system, and ask for money,” Xenakis said.  While health care has become the primary target for cybercriminals in recent years, putting lives at risk, the sector paradoxically invests less in cybersecurity than any other industry, leaving high-value data vulnerable to attack. | Andreas Arnold/Picture Alliance via Getty Images Stolen data can be sold on the dark web to criminals who use it to commit identity theft, insurance fraud or blackmail. To restore disrupted systems, criminals can demand millions of euros — hackers, for instance, wanted $4.5 million for the return of the stolen data after a cyberattack on Hospital Clínic in Barcelona. The hospital refused to pay.  However, other types of cyberattacks are also on the rise, including those by pro-Russian hacktivists aiming to disrupt health care operations, rather than for profit. Despite the risks, only 27 percent of health care organizations have a dedicated ransomware defense program, and 40 percent don’t offer any security awareness training for non-IT staff, a separate ENISA report found. CREATING CYBERSECURITY CULTURE Xenakis believes that the health care sector sees cybersecurity as “out of their business” scope and as a “luxury” rather than an essential. Health care staff are unaware of the risks, he believes, resulting in poor “cyber hygiene.” He recalls being left alone in a doctor’s office with unsecured computers — an easy target for hackers. “If I wanted to do something, it [would have been] easy for me,” he said. At the same time, he doubts that he would have been left in a room with critical medicines. Hospitals understand the risks if medicines got into the wrong hands, he said, “but they cannot understand cybersecurity.”  The task is to create a culture of good cybersecurity practices to protect data and the systems, Xenakis said. “Technology awareness education is … extremely low.” Findings from the Finnish Innovation Fund Sitra back this up. While many health care organizations have cybersecurity policies in place, they are often not “clearly communicated or consistently understood by their staff.” High personnel turnover — not just among medics but also cybersecurity officers — further “exacerbates training gaps and the ability to enforce cybersecurity policies.” Sabina Magalini, a former professor of surgery at the Catholic University of the Sacred Heart in Rome, who coordinated an EU-funded project PANACEA to improve hospital cybersecurity, believes that current laws overlook hospital-specific challenges. “Hospitals have different problems,” she said, listing high staff turnover, lack of training and overwork. “The hospital is not a nuclear power plant … It’s like a port … with a harbor: people coming in, going out, and everything is open,” Magalini said.  She argued that hospitals need continuous cybersecurity drills and streamlined systems that don’t slow down care. Health care staff “don’t want to pass half of the day logging in and logging out,” she said. BLAME THE SYSTEM, NOT THE STAFF However, training hospital personnel, while beneficial, is insufficient to address security threats. “If you have a hospital with 2,000 people working, the probability for someone to click the button (for a phishing link)” is unavoidable, Xenakis said. Especially as artificial intelligence is increasingly used by cybercriminals for automating attacks, such as phishing and deepfake-driven fraud, making the attacks “very sophisticated, very targeted,” Xenakis said.  Germany is backing sector-specific cybersecurity standards and also requires hospitals to invest at least 15 percent of cybersecurity funding received through a program on future-proofing hospitals under its recovery and resilience plan. | Andreas Arnold/Picture Alliance via Getty Images “You cannot blame the people,” Xenakis said. There must be intelligent detection tools “to eliminate the damage … or counteract the attack,” he said. Magalini also pointed out another shortcoming: cybersecurity consultancies that assist hospitals often originate from outside Europe. “They are either from the United States or Canada … also from Russia,” she said, adding that there should be a “European way of doing cybersecurity.” INVESTMENT GAPS While the risks are clear, national governments are skimping on prevention, Xenakis believes, saying that he has no good example of a country “that has invested a lot in cybersecurity in the health sector.”  In Germany, for example, “they are used to just putting new regulations in place, but invest nothing in the cybersecurity of hospitals,” Meier said. He believes his Frankfurt hospital would have found the attack earlier if it had an intrusion detection system. They were “very lucky” to discover the attack before it destroyed the entire database, Meier said. “It could have resulted in a complete shutdown of the hospital.” “Cybersecurity threats pose enormous challenges for the health care sector by endangering the availability of essential health care services,” a spokesperson from the German health ministry told POLITICO in a written response. Germany is backing sector-specific cybersecurity standards and also requires hospitals to invest at least 15 percent of cybersecurity funding received through a program on future-proofing hospitals under its recovery and resilience plan. Europe’s Health Commissioner Olivér Várhelyi has also made it clear that investment must come from national governments. “If you go to a hospital, you always see a guard in the door. There is money for that, so there should be money for protecting the data as well,” he said in January.  But with the health sector often suffering from underinvestment, how much governments can spend on cybersecurity “is a question,” Magalini said. “There are so many other (health care) problems which are not cybersecurity … so I don’t know how they can make the investments.” The cost of inaction can be hundreds of millions of euros, as it was with an attack on Ireland’s Health Service Executive in May 2021 that shut down IT systems of the country’s publicly funded health care system. The attack’s cost was estimated at least €101 million, with a further €657 million to be spent safeguarding against future attacks.  “Why did it cost so much? Not because of the damage but [because] then someone intelligent thought, ‘no, we have to rebuild the system in a secure way,’” Magalini said.  Ray Walley, general practitioner from Ireland, saw firsthand how the attack severed ties with the hospital system.“We couldn’t refer stuff in. It affected outflow from the hospital system. We weren’t getting the results of blood tests. We weren’t getting the results of X-rays and scans,” he said. Walley believes that “cybersecurity is just another form of health care.” “We need to invest in this,” he said. “We need to be proactive. We need to spend the money.” EU’S ACTION: GOOD, BUT COULD BE BETTER The increasing number of cyberattacks on health care systems triggered a response from the EU this year. The European Commission unveiled in January an “action plan” on cybersecurity for hospitals and the health care sector. The plan proposes setting up a European Cybersecurity Support Center for the health care sector within ENISA and a specific rapid response service. The plan also introduces “cybersecurity vouchers,” which will enable EU countries to provide financial support to smaller health care providers for enhancing their cyber resilience.  “It’s good,” said Markus Kalliola, Sitra’s program director. But it “could be stronger.” He is one of the authors of the Commission’s evaluation report by Sitra, which points to murky EU governance, a lack of clear targets or budgets and a missed opportunity to build a functioning single market for cybersecurity solutions.  Sitra calls for going beyond the EU’s plan by considering cybersecurity as a matter of national security; setting up mandatory cybersecurity readiness for health care organizations; incorporating cybersecurity skills into health professionals’ basic training; and organizing more pan-European cybersecurity exercises. With the changing geopolitical situation, “it’s also a matter of national security,” Kalliola said. “EU member states should focus on … what is the national strategy in securing these critical health care services,” he added. Whether or not Europe’s security will feature in the Commission’s final hospital cybersecurity plan remains to be seen; the EU executive has just concluded a consultation and promised to put forward a refined plan by the end of the year. Other pieces of EU legislation — including the NIS2 Directive, Cyber Resilience Act, AI Act and medical devices rules — also raise the bar for cybersecurity across different sectors, including health care.  However, “despite advancements in regulatory efforts and technical solutions, implementation remains inconsistent. There is no time to lose in turning regulations into reality,” Kalliola said.
Data
Security
Artificial Intelligence
Fraud
Health Care
France detains Russian basketball player at US request on hacking charge
Russian basketball player Daniil Kasatkin was arrested in France on a hacking charge at the request of the United States. U.S. authorities believe Kasatkin negotiated payoffs for a ransomware ring that hacked around 900 companies and two federal government entities in the U.S., demanding money to end their attacks, according to a report from AFP. Kasatkin, who was arrested on June 21, denies the allegations. His lawyer, Frédéric Bélot, told POLITICO that Kasatkin is a “collateral victim of that crime” because he bought a second-hand computer with malware.  “He’s not a computer guy,” Bélot said. “He didn’t notice any strange behavior on the computer because he doesn’t know how computers work.” A French court denied Kasatkin bail on Wednesday, and he remains in jail awaiting formal extradition notification from U.S. authorities, according to Bélot. Kasatkin had traveled to France to visit Paris with his fiancée and was detained shortly after arriving at the airport. He played collegiate basketball briefly at Penn State, then four seasons for the Moscow-based MBA-MAI team. Bélot said Kasatkin’s physical condition has deteriorated in jail, which he argued is harming his athletic career. Joshua Berlinger contributed to this report. 
Sport
Cybersecurity and Data Protection
Cybercrime
Hackers
Malware