1.2027180-3416313060
A picture shows the exterior of The Royal London Hospital in London on May 14, 2017. The unprecedented global cyberattack has hit more than 200,000 victims in scores of countries, Europol said on May 14, 2017, warning that the situation could escalate when people return to work. In Britain, the attack disrupted care at National Health Service facilities, including The Royal London Hospital, part of the largest NHS Trust in England. / AFP / Niklas HALLE'N Image Credit: AFP

The heart sinks whenever Amber Rudd, the British Home Secretary, talks about anything to do with computers. On Saturday, in the wake of the malware attack that had crippled hospital IT systems in the United Kingdom, she was on Radio 4’s Today programme: “We are ahead of this [attack] with the National Cyber Security Centre (NCSC), the advice is available,” she pronounced proudly, as though putting “national” and “cyber” on something automatically granted it authority. “Patients have been inconvenienced,” she conceded, “but no patient data has been accessed and the NHS [National Health Service] is brilliantly managing through this.”

The lack of access to patient data doesn’t apply just to the hackers, of course; NHS staff couldn’t get at it, either, because many NHS hospitals and general physicians had been hit by “ransomware” — a specific species of malware that encrypts all the files on your machine using a military-grade cipher, and demands payment in the practically untraceable currency bitcoin to a website on the hidden Tor network. As a business, ransomware works: The number of attacks worldwide has been going up exponentially in the past few years, so that at one point recently, a substantial proportion of Tor sites were just payment sites automatically generated by ransomware.

Ransomware is an idea first developed more than 20 years ago and reverses the usual form of hacking — where the threat comes from others having access to data. Ransomware’s threat is that nobody can access your data, including you. It’s now commonplace; you can buy kits online to spread it virally.

The British hospitals hit by this latest attack, which weaponised a flaw in Microsoft’s Windows operating system revealed in February, are hopelessly outgunned. They’re running Windows XP, an operating system first released in September 2001, and which Microsoft itself gave up supporting in 2014. It has been kept on life support by extra payments to the company, but the Department of Health stopped making those in 2015.

More generally, a survey by Sky News’s Nick Stylianou of NHS trusts’ spending on securing data found that seven of them, serving more than two million people, spent nothing, and the average spend across 92 trusts that replied was just £22,000 annually (Dh104,161). (Another 43 trusts couldn’t specify their costs.) That’s paltry in the face of concerted hacking efforts.

All that made the events of the past few days a disaster waiting to happen. For all the Tories’ droning on about not wanting a coalition of chaos, they’ve overseen exactly that in the health service, where computing departments are fragmented nationally due to the franchised nature of health trusts and underinvestment is rife.

The problem is that hardly anyone will acknowledge that — even inside the NHS. A couple of weeks ago, I was wandering the halls of the Olympia conference centre in London, at the E-Health conference, looking for a hospital that would admit to having been hit by ransomware. (I’m writing a book about hacking incidents, and ransomware is one of the topics.) I came across Gary, who works for Nouveau, a computer security company. Though the conference was busy, Gary’s stand was quiet. Attendees — almost all from the NHS — were gathering around uplifting talks about “customer focus” and “rapid response” and “patient-centred working”, and oohing at stands offering to “use the cloud to unlock the power of your data”.

I explained my mission to Gary, who expressed frustration: The scale both of risk and complacency around computer security in the NHS was so clear to him, but the people in charge of the departments, and the executives above them, wouldn’t listen. “It’s going to happen more and more,” he said.

This latest attack is high profile but only because it has hit so many trusts at once. In fact, ransomware has been hitting hospitals regularly for some time now. An FOI enquiry by RES published in February found that 88 of the UK’s 260 NHS trusts had been hit by ransomware between mid-2015 and the end of 2016. Imperial College Healthcare suffered 19 attacks in 12 months. When Papworth hospital was hit in autumn 2016, its four IT staff worked from 1am to 9pm on a Sunday to restore the systems from backups; it had no budget to pay the ransom (and wouldn’t want to).

“If we’d been doing a heart operation on a Sunday, it would have been a huge problem,” Jane Berezynskyj, Papworth’s IT director, later said.

Public services aren’t disproportionately targeted by hackers; if anything, they tend to offer less interesting pickings to profit-seeking hackers than smaller commercial outfits. But they constitute low-hanging fruit for ransomware in particular.

Rudd can burble as much as she wants, but the £1 billion put into the NCSC is a fraction of the amount needed to upgrade the NHS’s IT systems. The next government should acknowledge that fact. Hacking is a constant, evolving threat; organisations that don’t upgrade their protection are picked off — either through intentional targeting or because their defences are lower. The last weekend could have been worse. Unless someone grasps the nettle of essential spending to upgrade the NHS’s computer systems, it will be. We just don’t know when.

— Guardian News & Media Ltd

Charles Arthur is writing a book on hacking incidents to be published in 2018.