{"id":73912,"date":"2022-08-25T10:13:31","date_gmt":"2022-08-25T17:13:31","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=73912"},"modified":"2025-04-16T10:01:02","modified_gmt":"2025-04-16T14:01:02","slug":"ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/","title":{"rendered":"Ransomware in Healthcare: The NHS Example and What the Future Holds"},"content":{"rendered":"<p>On August 4, 2022, Advanced \u2013 a major software provider for the UK\u2019s National Health System (NHS) and other healthcare customers \u2013 suffered a ransomware attack from a group that is still unknown to the public. The attack disrupted NHS services including ambulance dispatch, appointment bookings, patient referrals and emergency prescriptions. As of August 19, more than two weeks after the incident, most systems have only been partially recovered, and full recovery is expected to take up to four weeks in some cases.<\/p>\n<p>This attack impacted the NHS via a service provider, similar to what happened when <a href=\"\/blog\/thousands-of-companies-compromised-by-revil-ransomware-%E2%80%93-the-supply-chain-strikes-again\/\" target=\"new\" rel=\"noopener\">REvil leveraged Kaseya VSA<\/a> to spread ransomware in 2021. However, this time the ransomware doesn\u2019t appear to have spread outside of Advanced\u2019s systems, at least in part because the software vendor disconnected some of their networks so customers could not connect to compromised servers.<\/p>\n<p>In this blog post, we explore the impact of this ransomware incident on the NHS, show how future ransomware attacks may exploit exposed Internet of Things (IoT) devices on healthcare providers and discuss <a href=\"\/solutions\/healthcare\/\">what healthcare organizations should do<\/a> to avoid being the next victim.<\/p>\n<h2>The impact of ransomware on the NHS<\/h2>\n<p>This is not the first time that health services in the region have been severely impacted by ransomware. In May 2017, the <a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\" target=\"_blank\" rel=\"noopener\">WannaCry<\/a> attack on the NHS, launched by North Korea, led to thousands of canceled appointments and a cost of nearly 100 million pounds. In May 2021, the Conti ransomware attack on Ireland\u2019s health service led to <a href=\"https:\/\/www.zdnet.com\/article\/cost-of-conti-ransomware-attack-on-irish-healthcare-system-may-reach-over-100-million\/\" target=\"_blank\" rel=\"noopener\">weeks of disruption and a projected cost of $100 million<\/a>.<\/p>\n<p>The impact on the NHS of the current attack has not yet been calculated, but it can begin to be understood by analyzing the Advanced software systems that were attacked, their function and their current status, as shown in the table below.<\/p>\n<div class=\"c-responsive-table\">\n<table style=\"width: 100%; height: 336px;\" data-tablestyle=\"MsoTable15Grid4Accent5\" data-tablelook=\"1184\" aria-rowcount=\"21\">\n<tbody>\n<tr style=\"height: 24px;\" aria-rowindex=\"1\">\n<th style=\"height: 24px;\"><b>Software<\/b><\/th>\n<th style=\"height: 24px;\"><b>Function<\/b><\/th>\n<th style=\"height: 24px;\"><b>Status as of Aug. 19<\/b><\/th>\n<\/tr>\n<tr style=\"height: 48px;\" aria-rowindex=\"2\">\n<td style=\"height: 48px;\"><strong>Adastra<\/strong><\/td>\n<td style=\"height: 48px;\">Clinical patient management, which helps emergency call handlers dispatch ambulances and doctors access patient records<\/td>\n<td style=\"height: 48px;\">Forensic investigation advanced but 111 customers not reconnected<\/td>\n<\/tr>\n<tr style=\"height: 48px;\" aria-rowindex=\"3\">\n<td style=\"height: 48px;\"><strong>Caresys<\/strong><\/td>\n<td style=\"height: 48px;\">Care home management<\/td>\n<td style=\"height: 48px;\">Forensic investigation ongoing but recovery not started (expected in 3 to 4 weeks)<\/td>\n<\/tr>\n<tr style=\"height: 48px;\" aria-rowindex=\"3\">\n<td style=\"height: 48px;\"><strong>Odyssey<\/strong><\/td>\n<td style=\"height: 48px;\">Clinical decision support<\/td>\n<td style=\"height: 48px;\">Forensic investigation ongoing but recovery not started (expected in 3 to 4 weeks)<\/td>\n<\/tr>\n<tr style=\"height: 48px;\" aria-rowindex=\"3\">\n<td style=\"height: 48px;\"><strong>Carenotes<\/strong><\/td>\n<td style=\"height: 48px;\">Electronic patient record software, used by mental health trusts for patient records<\/td>\n<td style=\"height: 48px;\">Customers had access to partial data, forensic investigation ongoing (expected for 3 to 4 weeks)<\/td>\n<\/tr>\n<tr style=\"height: 48px;\" aria-rowindex=\"3\">\n<td style=\"height: 48px;\"><strong>Crosscare<\/strong><\/td>\n<td style=\"height: 48px;\">Clinical management for hospices and private practices<\/td>\n<td style=\"height: 48px;\">Forensic investigation ongoing but recovery not started (expected in 3 to 4 weeks)<\/td>\n<\/tr>\n<tr style=\"height: 48px;\" aria-rowindex=\"3\">\n<td style=\"height: 48px;\"><strong>Staffplan<\/strong><\/td>\n<td style=\"height: 48px;\">Care management software<\/td>\n<td style=\"height: 48px;\">Customers had access to partial data, forensic investigation ongoing (expected for 3 to 4 weeks)<\/td>\n<\/tr>\n<tr style=\"height: 24px;\" aria-rowindex=\"3\">\n<td style=\"height: 24px;\"><strong>eFinancials<\/strong><\/td>\n<td style=\"height: 24px;\">Public sector financial management<\/td>\n<td style=\"height: 24px;\">Systems back online and customers could reconnect<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><b>One point stands out from the response to this incident: regardless of paying a ransom to recover data or not, healthcare systems cannot simply be brought back online after an attack. They need to go through a thorough forensic investigation to ensure there is no further compromise.<\/b><\/p>\n<p>Advanced employed two external organizations to perform the forensic and recovery actions. For one service alone, eFinancials, those firms had to scan nearly 150 servers. In the healthcare sector, the time it takes to recover impacted systems typically leads to delayed or canceled patient care, as was the case for WannaCry in 2017 and Conti in 2021.<\/p>\n<p><span data-contrast=\"auto\">Although the response to this incident is still ongoing, it is safe to assume that there will be a very high financial impact for Advanced, and once again several NHS patients will have appointments and treatment delayed or canceled.<\/span><\/p>\n<h2>What the future holds for ransomware in healthcare<\/h2>\n<p>As the CIO of the UK\u2019s health and social care system said in a <a href=\"https:\/\/www.england.nhs.uk\/wp-content\/uploads\/2018\/02\/lessons-learned-review-wannacry-ransomware-cyber-attack-cio-review.pdf\" target=\"_blank\" rel=\"noopener\">review of the WannaCry attack in 2018:<\/a> \u201cIt is not a question of &#8216;if&#8217; but &#8216;when&#8217; the next cyberattack strikes the health and social care system.\u201d<\/p>\n<p>In 2017, the impact happened because of computers running unpatched or legacy Windows operating systems at NHS trusts. In 2022, it was because of a managed service provider (MSP). MSPs are currently a great entry point for ransomware gangs because they may allow for access into many customer organizations at the same time. Even if the ransomware does not spread from the MSP to its customers, these customers are impacted by the MSP\u2019s downtime.<\/p>\n<p>In the future, Vedere Labs believes the impact will likely occur because of insecure IoT devices, since <a href=\"\/resources\/analysis-of-conti-leaks\/\">IoT as an entry point<\/a><span data-contrast=\"auto\"> is gaining relevance with ransomware gangs. That belief is echoed by the UK\u2019s National Cyber Security Centre (NCSC), which recently published a <a href=\"https:\/\/www.ncsc.gov.uk\/report\/organisational-use-of-enterprise-connected-devices\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">report<\/span><\/a> that concludes there is a high likelihood that enterprise IoT will be used as an &#8220;attack vector or pivot point to enable cyber actors to gain access to an enterprise&#8217;s corporate network for espionage purposes, disruption, or financial gain.&#8221;<\/span><\/p>\n<p>To show this threat vector in action, we recently developed <a href=\"\/research-labs\/r4iot\/\">R4IoT<\/a>, a proof-of-concept ransomware that gains access to an organization via exposed IoT devices and moves laterally to exfiltrate and encrypt data on IT systems. This type of attack exploits an increased IoT attack surface and is applicable in almost every organization nowadays, but especially in healthcare.<\/p>\n<p>A simple Shodan search for devices exposed to the internet in <a href=\"https:\/\/www.shodan.io\/search?query=org%3A%22nhs%22+country%3A%22GB%22\" target=\"_blank\" rel=\"noopener\">UK organizations with \u201cNHS\u201d in their name<\/a> returned 1,585 results on August 22. We can also see an increasing trend of devices exposed online by NHS trusts in the past few years:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-73917\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png\" alt=\"Ransomware in Healthcare: The NHS Example and What the Future Holds\" width=\"1812\" height=\"636\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png 1812w, https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM-300x105.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM-1024x359.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM-768x270.png 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM-1536x539.png 1536w\" sizes=\"auto, (max-width: 1812px) 100vw, 1812px\" \/><\/p>\n<p>Most of these devices are still either web servers or network infrastructure, such as VPN concentrators, firewalls and routers. However, we see a lot of interesting IoT, such as eight VoIP phones, five Zyxel WiFi routers, five Crestron conference room systems, one Honeywell NVR, one Hikvision IP camera, seven devices with exposed Telnet and 28 devices with exposed embedded SSH and FTP servers. For instance, below is a screenshot showing the Hikvision camera, which may be vulnerable to remote code execution via <a href=\"https:\/\/watchfulip.github.io\/2021\/09\/18\/Hikvision-IP-Camera-Unauthenticated-RCE.html\" target=\"_blank\" rel=\"noopener\">CVE-2021-36260<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-73918\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.46-PM.png\" alt=\"Ransomware in Healthcare\" width=\"2092\" height=\"798\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.46-PM.png 2092w, https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.46-PM-300x114.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.46-PM-1024x391.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.46-PM-768x293.png 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.46-PM-1536x586.png 1536w, https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.46-PM-2048x781.png 2048w\" sizes=\"auto, (max-width: 2092px) 100vw, 2092px\" \/><\/p>\n<h2>Defending healthcare networks from future attacks<\/h2>\n<p>In 2018, after WannaCry, the NHS\u2019s <a href=\"https:\/\/www.england.nhs.uk\/wp-content\/uploads\/2018\/02\/lessons-learned-review-wannacry-ransomware-cyber-attack-cio-review.pdf\">review of the incident<\/a> included this finding:<\/p>\n<p><em>\u2026most NHS trusts also need capital investment in areas such as addressing weaknesses in their infrastructure to secure networks by upgrading firewalls, improving network resilience and segmentation to minimise the risk to medical, improving device security through device replacement and automation of patch management, and improving anti-virus protection.<\/em><\/p>\n<p>The themes of <em>patching<\/em>, <em>segmenting<\/em> and <em>automating <\/em>that were relevant in 2018 are even more important today with the increased attack surface brought by IoT.<\/p>\n<p>The widespread use of IoT devices, the fact that they are often exposed online and the difficulty in patching them means that every organization, particularly in the healthcare sector, needs a proactive and holistic approach to cybersecurity that prioritizes:<\/p>\n<ul>\n<li>Discovering and inventorying <em>every device<\/em> on their digital terrain<\/li>\n<li>Continuously assessing the <em>compliance and risk posture<\/em> of these devices<\/li>\n<li>Automatically enforcing <em>segmentation controls<\/em> and proper network hygiene to mitigate the risk from vulnerable devices<\/li>\n<\/ul>\n<h3>Healthcare cybersecurity considerations checklist<\/h3>\n<p><strong>The process for selecting a cybersecurity solution to protect your patients\u2019 and your hospital\u2019s critical infrastructure can be overwhelming. Download this checklist for IT security and clinical teams to ensure you don\u2019t overlook the essentials.<\/strong><br \/>\n<a href=\"\/healthcare-cybersecurity-considerations-checklist\/\"  title=\"Download the Checklist\" class=\"c-btn c-btn--primary icon-position-right\" target=\"_blank\"><span class=\"cta-button-text\">Download the Checklist<\/span><\/a>\n","protected":false},"excerpt":{"rendered":"<p>On August 4, 2022, Advanced \u2013 a major software provider for the UK\u2019s National Health System (NHS) and other healthcare customers \u2013 suffered a ransomware attack from a group that is still unknown to the public. The attack disrupted NHS services including ambulance dispatch, appointment bookings, patient referrals and emergency prescriptions. As of August 19, [&hellip;]<\/p>\n","protected":false},"author":124,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[542],"class_list":["post-73912","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware in Healthcare NHS UK Example and Beyond - Forescout<\/title>\n<meta name=\"description\" content=\"The recent cyberattack on NHS UK disrupted patient services and showed that healthcare systems cannot simply be brought back online after a ransomware incident.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware in Healthcare NHS UK Example and Beyond - Forescout\" \/>\n<meta property=\"og:description\" content=\"The recent cyberattack on NHS UK disrupted patient services and showed that healthcare systems cannot simply be brought back online after a ransomware incident.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T17:13:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-16T14:01:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1812\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"Ransomware in Healthcare: The NHS Example and What the Future Holds\",\"datePublished\":\"2022-08-25T17:13:31+00:00\",\"dateModified\":\"2025-04-16T14:01:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/\"},\"wordCount\":1187,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/\",\"name\":\"Ransomware in Healthcare NHS UK Example and Beyond - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png\",\"datePublished\":\"2022-08-25T17:13:31+00:00\",\"dateModified\":\"2025-04-16T14:01:02+00:00\",\"description\":\"The recent cyberattack on NHS UK disrupted patient services and showed that healthcare systems cannot simply be brought back online after a ransomware incident.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png\",\"width\":1812,\"height\":636,\"caption\":\"Ransomware in Healthcare: The NHS Example and What the Future Holds\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware in Healthcare: The NHS Example and What the Future Holds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware in Healthcare NHS UK Example and Beyond - Forescout","description":"The recent cyberattack on NHS UK disrupted patient services and showed that healthcare systems cannot simply be brought back online after a ransomware incident.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware in Healthcare NHS UK Example and Beyond - Forescout","og_description":"The recent cyberattack on NHS UK disrupted patient services and showed that healthcare systems cannot simply be brought back online after a ransomware incident.","og_url":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2022-08-25T17:13:31+00:00","article_modified_time":"2025-04-16T14:01:02+00:00","og_image":[{"width":1812,"height":636,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png","type":"image\/png"}],"author":"Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"Ransomware in Healthcare: The NHS Example and What the Future Holds","datePublished":"2022-08-25T17:13:31+00:00","dateModified":"2025-04-16T14:01:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/"},"wordCount":1187,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/","url":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/","name":"Ransomware in Healthcare NHS UK Example and Beyond - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png","datePublished":"2022-08-25T17:13:31+00:00","dateModified":"2025-04-16T14:01:02+00:00","description":"The recent cyberattack on NHS UK disrupted patient services and showed that healthcare systems cannot simply be brought back online after a ransomware incident.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-25-at-1.03.09-PM.png","width":1812,"height":636,"caption":"Ransomware in Healthcare: The NHS Example and What the Future Holds"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/ransomware-in-healthcare-the-nhs-example-and-what-the-future-holds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Ransomware in Healthcare: The NHS Example and What the Future Holds"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/73912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=73912"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/73912\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=73912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=73912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=73912"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=73912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}