USC’s Keck Medical Center Reports Ransomware Attack

Sept. 26, 2016
The Los Angeles-based Keck Medical Center, part of the University of Southern California, has confirmed that two if its servers were hit with ransomware last month, leading to encrypted files that employees could not access.

The Los Angeles-based Keck Medical Center, part of the University of Southern California, has confirmed that two if its servers were hit with ransomware last month, leading to encrypted files that employees could not access.

According to a statement from the organization released last week, “The attack was quickly contained and isolated to prevent the spreading of malware to other servers.” Data from the encrypted servers was fully restored within several days and no ransom was paid, according to the organization. Officials stated that there is no evidence that data was retrieved or accessed as a result of this ransomware.

“Typically, ransomware is used to deny users access to their information in order to quickly extract money from the data owners—not to steal data. However, as a precaution, we are providing this notice to patients or other individuals whose health or other personal information was in the encrypted folders.”

What’s more, the infected servers do not store Keck's electronic medical record (EMR). Instead, many of the encrypted folders are departmental files that contain internal operational documents such as templates, training manuals, and human resource materials. Sensitive data did however include demographic information, date of birth, identifiable health information, including treatment and diagnosis for some patients, and in some cases, social security numbers.

Regarding the ransomware crisis that is continuing to plague healthcare and other industries, the issue of paying the ransom or not has been a hot one. Recently, the Tulsa, Okla.-based Saint Francis Health System decided not to act on a ransom demand when it was victimized by a breach earlier this month in which approximately 6,000 names and addresses were compromised.

Sponsored Recommendations

The Race to Replace POTS Lines: Keeping Your People and Facilities Safe

Don't wait until it's too late—join our webinar to learn how healthcare organizations are racing to replace obsolete POTS lines, ensuring compliance, reducing liability, and maintaining...

Transform Care Team Operations & Enhance Patient Care

Discover how to overcome key challenges and enhance patient care in our upcoming webinar on September 26. Learn how innovative technologies and strategies can transform care team...

Prior Authorization in Healthcare: Why Now?

Prepare your organization for the CMS 2027 mandate on prior authorization via API. Join our webinar to explore investment insights, real-time data exchange, and the benefits of...

Securing Remote Radiology with the Zero Trust Exchange

Discover how the Zero Trust Exchange is transforming remote radiology security. This video delves into innovative solutions that protect sensitive patient data, ensuring robust...