Ransomware stings Odisha's hospital computers, govt on toes

Attack affects e-medicine services and payment to ASHA workers

Image: Shutterstock
Image: Shutterstock
Nirmalya Behera Bhubaneswar
Last Updated : May 17 2017 | 9:14 PM IST
Odisha became the victim of WannaCry ransomware which attacked the Berhampur City Hospital's information management system affecting e-medicine services and payment to ASHA workers.

The state government has confirmed the attack from the malware. Odisha is the latest entrant to the list of states that have been attacked by ransomware. The sting of Wannacry has kept the state government officials on toes.

Chandra Sarathi Behera, minister for electronics & information technology after reviewing the incident despatched a technical team to the spot to examine the issue. The team comprises officials from International Institute of Information Technology (IIIT)-Bhubaneswar, Odisha Computer Application Center and National Informatics Centre.

Sources, said the hacker has allegedly demanded $300 to restore the access to the hospital's system. The essential data of the hospital's email id is also believed to be hacked.

"The medical authorities were reportedly using Windows 7 which was not updated. We are awaiting for the report to confirm whether it was pirated or not", said Behera.

To protect the computers from the malware, the state government also held discussions with the district collectors via video conferencing today. Besides, toll-free numbers will be set up to create awareness on the virus and provide suggestions.

There are reports that computers at Purusottampur hospital are also affected by the malware Wannacry that has infected lakhs of systems in around 150 nations, holding computer data to ransom at hospitals, telecommunication companies and other agencies.

The Odisha government has already issued a 20-point advisory for its departments and for general users to safeguard their cyber space.

The advisories include keeping anti-virus software up to date on all systems, installing security patches update to Windows System as mentioned in Microsoft Security Bulletin MS17, disable macros in Microsoft Office products.

It also asked to disable remote desktop connections, employ least privileged accounts, ensure use of pop-up blockers and ad-blockers in browsers for better security and removal of "mssecsvc.exe" and "tasksche.exe", if found in the Windows Directory.

One subscription. Two world-class reads.

Already subscribed? Log in

Subscribe to read the full story →
*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

Next Story