Thousands of patient files held to ransom in Hong Kong

By

SynoLocker flaw exploited.

Extortionists have encrypted data on more than 10,000 patients and various research projects at a Hong Kong hospital using a flaw in network attached storage maker Synology's software, and are demanding a ransom to return access.

Thousands of patient files held to ransom in Hong Kong

The South China Morning Post reported that the Centre for Liver Health and Institute of Digestive Disease at the Prince of Wales Hospital had been hit by blackmailers who are demanding 0.6 Bitcoin (approximately A$372 presently) to decrypt the scrambled files.

Hong Police said the extortionists used the SynoLocker ransomware to encrypt the files on two servers.

Synolocker screenshot via Geekzone / Michael Murphy

A spokeswoman for the faculty said that while staff could no longer access the patient data as well as some research and teaching materials, it did not appear that information had been stolen.

The faculty has disconnected the servers from the network and has notified the Hong Kong privacy commissioner of the attack.

Synology has acknowledged the vulnerabilities in its DiskStation Manager software that the SynoLocker extortionists are exploiting, telling users to upgrade to the latest 5.0 version that has patched them.

"Based on our current observations, this issue only affects Synology NAS servers running some older versions of DSM (DSM 4.3-3810 or earlier), by exploiting a security vulnerability that was fixed and patched in December, 2013. At present, we have not observed this vulnerability in DSM 5.0."

- Synology statement 4 August 2014

Update 10:14am: A spokesperson for Synology told iTnews that SynoLocker encrypts user files and lock people out who don’t pay the extortion fee.

“So far, we have seen a number of people say they’ve paid the ransom, on Twitter,” the spokesperson said.

“The incentive [to pay the ransom] is equally appalling, apparently, if you don’t within a certain number of days, the ransom doubles,” the spokesperson added.

He reiterated that the vulnerability is preventable with software updates.

Users around the world are currently reporting SynoLocker attacks but it isn't clear if there is a way to decrypt the files without paying the ransom.

Synology suggests that victims who have had their files encrypted contact them on security@synology.com.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

NSW Police to embark on $126m IT overhaul

NSW Police to embark on $126m IT overhaul

CBA looks to GenAI to assist 1200 'security champions'

CBA looks to GenAI to assist 1200 'security champions'

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

WestJet probes cyber security incident

WestJet probes cyber security incident

Log In

  |  Forgot your password?