Ascension: 'We do not have a timeline' for networks to be restored after cyberattack (2024)

The nation's largest Catholic health system said it was postponing some elective procedures, tests and appointments “out of an abundance of caution” after a cyberattack earlier this week paralyzed Ascension's computer network and other technological systems.

The network continued to be disrupted Friday at all 140 Ascension hospitals nationally, including 15 in Michigan, and the St. Louis-based nonprofit hospital chain acknowledged "we do not have a timeline" for when it will be restored.

Ascension said it is working to investigate the source of the breach, contain it and restore its systems. In the meantime, many hospitals are diverting ambulances to other health care facilities "to ensure emergency cases are triaged immediately."

Ascension: 'We do not have a timeline' for networks to be restored after cyberattack (1)

“Systems that are currently unavailable include our electronic health records system, MyChart (which enables patients to view their medical records and communicate with their providers), some phone systems, and various systems utilized to order certain tests, procedures and medications," Ascension's statement said.

Appointments that are "temporarily paused" during the outage will be rescheduled, and Ascension is urging patients who seek treatment at this time to:

  • Bring notes detailing their symptoms and medical history to appointments.
  • Bring a list of current medications and the prescription numbers or the prescription bottles to appointments so refills can be manually called in to pharmacies.

Employees noticed the computer network problems about 7 a.m. Wednesday, said three workers who spoke on the condition of anonymity out of fear of job repercussions.

"There was a security concern, so they shut down the system," one physician told the Free Press at the time. "It's affecting everything."

Ascension, which also owns 40 senior living facilities, said it is working withMandiant, a cybersecurity consulting company, to investigate and help determine what information, if any, was compromised in the cyberattack.

More:Cyberattack hits Ascension hospitals' computer networks: 'It's affecting everything'

More:Increasingly common, health care cyberattacks now even target patients with ransom

"Should we determine that any sensitive information was affected, we will notify and support those individuals in accordance with all relevant regulatory and legal guidelines," Ascension said in a statement.

CNN reported Friday that Black Basta ransomware was involved in the Ascension cyberattack, which involved hackers who tried to lock the health system's computer network and steal its data.

Cyberattacks are becoming increasingly common in health care, often affecting protected health information along with other data, such as account numbers, Social Security numbers, phone numbers and addresses.

In April, Cherry Street Services Inc., also known as Cherry Health, alerted 180,747 Michigan residents that their personal information had been compromised in a ransomware attack that occurred Dec. 21.

"Third-party forensic experts were retained to assist in an investigation of the nature and scope of the breach," said Danny Wimmer, press secretary for state Attorney General Dana Nessel. "While unable to pinpoint (the) root cause of the breach, through the investigation, Cherry was able to discern the types of data compromised: full name, address, date of birth, phone number, health insurance information, patient ID number, provider name, service date, diagnosis/treatment information, prescription information, financial account information and/or Social Security numbers, and the identity of the persons impacted."

And more than 1 million Michiganders wereaffected by a cybersecurity breachatWelltok Inc., a software company contracted to provide communication services for Corewell Health's southeastern Michigan properties, along with a healthy lifestyle portal for Priority Health, an insurance plan owned by Corewell. Though the breach occurred in May 2023, it wasn't until November 2023 that people were notified.

Aransomware attack led McLaren Health Care to take down the computer networkat its 14 Michigan hospitals in late August and early September 2023, affecting about 2.5 million patients. The health system acknowledged that the attack also could have leaked some patient data onto the dark web. A ransomware gang known asBlackCat/AlphVclaimed responsibility, posting online that it stole six terabytes of McLaren's data.

In late August 2023, the University of Michiganshut down its campus computer networkafter a hacker got access to the personal information of students and applicants, alumni and donors, employees and contractors, as well as the personal health information of research study participants, and patients of the University Health Service and the School of Dentistry.

In Michigan, Ascension has 15 acute-care hospitals, but is in the midst of trying to close deals that wouldsplit off eight of its southeastern Michigan hospitalsand combine them with Detroit-based Henry Ford Health. Additionally, three of its hospitals in mid-Michigan and northeastern Michigan, along with a stand-alone emergency center and nursing home,are to be acquiredby Midland-based MyMichigan Health.

If those deals are completed, only the following Ascension Michigan hospitals will remain as part of the health system's national holdings:

  • Ascension Allegan Hospital in Allegan
  • Ascension Borgess Hospital in Kalamazoo
  • Ascension Borgess-Lee Hospital in Dowagiac
  • Ascension Borgess-Pipp Hospital in Plainwell

Contact Kristen Shamus: kshamus@freepress.com. Subscribe to the Free Press.

Ascension: 'We do not have a timeline' for networks to be restored after cyberattack (2024)

FAQs

Ascension: 'We do not have a timeline' for networks to be restored after cyberattack? ›

Ascension does not yet have a timeline for restoring its systems but said that it expects both the restoration and investigation processes to take time to complete. Upon discovery, Ascension engaged Mandiant to assist in the investigation process and alerted its business partners of the incident.

Is Ascension still hacked? ›

Ascension continues to work with industry-leading cybersecurity experts to investigate the recent ransomware attack and to rebuild and restore our systems securely. While this process continues in earnest, our hospitals and facilities remain open and are providing care.

What are the 5 stages of cyber security? ›

It involves the identification, protection, detection, response, and recovery stages to ensure effective cybersecurity measures. This holistic approach enables organizations to proactively assess and address potential risks and vulnerabilities, as well as respond and recover from cyber incidents.

What are the 7 stages of cyber security? ›

The Cyber Kill Chain is divided into seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control (C2), and actions on objectives. This article describes what each of these steps entails, including the preventive measures that network defenders can take in each stage.

What is the recovery stage of a cyber attack? ›

5. Recovery. This is the process of restoring and returning affected systems and devices back into your business environment. During this time, it's important to get your systems and business operations up and running again without the fear of another breach.

Is it safe to download Ascension WoW? ›

Ascension WoW is very easy to setup. Our launcher has been virus scanned and is completely safe to install. If your anti-virus gives you a false positive, rest assured it is in fact a false positive, or perform additional scans yourself!

Did Henry Ford Hospital buy Ascension? ›

The joint venture isn't a merger or acquisition and no cash transaction will take place, according to a Henry Ford spokesperson.

What is level 7 in cyber security? ›

The Bachelor of Science in Network Cybersecurity is a full Level 7 award that can be awarded to learners on successful completion: Certificate in Network Cybersecurity. Certificate in Data Cybersecurity.

What are the 3 C's of cyber security? ›

The 3 Cs of Enterprise Security: Communicate, Coordinate and Collaborate. As technology continues to evolve and become more interconnected, the line between cyber and physical security is increasingly blurred.

What are the 3 P's of cyber security? ›

No matter what your level of cybersecurity knowledge and experience, understanding these critical three P's (patches, passwords, phishing) can help lead to comprehensive protection.

What tool is used to lure an attacker? ›

A honeypot is a security mechanism that creates a virtual trap to lure attackers. An intentionally compromised computer system allows attackers to exploit vulnerabilities so you can study them to improve your security policies.

What are the 5 C's of cyber security? ›

This article discusses and explains the 5 C's of cybersecurity—Change, Continuity, Cost, Compliance, and Coverage—highlighting their importance in modern-day digital defense mechanisms.

Which type of hacker represents the highest risk? ›

Black hat — people who hack for personal gain.

How long does IT take for a company to recover from a cyber attack? ›

Smaller companies with high levels of preparedness can often recover within a few days. Larger companies that are less prepared should plan to be down for weeks or even months. While the average attack disrupts for about 21 days, your preparedness and response plan affects this duration.

What are the aftermath of cyber attack? ›

System outages: Hackers can cripple your IT infrastructure, leaving you without access to critical systems and data. This can lead to delayed deliveries, cancelled appointments, and frustrated employees and customers. Data loss: Compromised data can render essential information inaccessible.

What is the average time to resolve a cyber attack? ›

In most cases, companies reacted quickly, by taking the cyber attack under control. Further on, it took the organizations 33 days on average to complete the forensic investigation of the attacks. The longest the companies needed, was the time to notify about the cyber incident, which took 60 days on average.

What is the most hacked platform? ›

Facebook accounts are the most hacked accounts on the internet in the United States, according to new research by VPN Central.

What is the biggest hacker in among us? ›

As told, Sire Sirol is one of the biggest hackers in Among Us. He makes an appearance in one of Thresher's lobbies and hacks EEEEEEE (sus). He then hacks the lobby and even Thresher the cannot withstand it. The two go into a code battle and sire sirol is kicked out.

Who owns Ascension health? ›

What is a purple hacker? ›

Experts employed by companies to test and improve their cybersecurity. Purple hat hackers. Low. Self-trainers who hack their own systems to learn in a controlled environment.

Top Articles
Latest Posts
Article information

Author: Tuan Roob DDS

Last Updated:

Views: 6509

Rating: 4.1 / 5 (42 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Tuan Roob DDS

Birthday: 1999-11-20

Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

Phone: +9617721773649

Job: Marketing Producer

Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.