Support from readers like you keeps The Journal open.
You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.
If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.
THE HSE IS “making progress” towards restoring health systems that have been impacted by the cyber attack which hit the health service last week.
The HSE and IT experts have developed a new version of the decryption tool made available in the cyber attack, according to Minister for Health Stephen Donnelly.
A decryption tool that might help the HSE to unlock its IT system following the widespread cyber attack last week is available online.
A new version of the tool has been tested and a “structured and controlled deployment is now underway across the core network and devices across the system”, Donnelly said.
“We are making progress on restoring health systems which is important to our patients who need the services, and also to the staff across the service who are doing ferocious work after 14 months of intense work on Covid-19,” he said.
“The Ministerial Cyber Attack Taskforce continues to meet on a daily basis to review progress with the response to last week’s cyber-attack on the HSE and to co-ordinate ongoing actions across Government. Good progress is being made with the restoration of HSE and hospital IT.”
The National Integrated Medical Imagine System (NIMIS) platform that delivers digital radiology is live again in Beaumont hospital, with progress made in other hospitals.
However, Donnelly said the levels of disruption next week are expected to be similar to this week.
We are making progress on restoring health systems which is important to our patients who need the services, and also to the staff across the service who are doing ferocious work after 14 months of intense work on COVID-19. pic.twitter.com/ahKqbs5j5y
— Stephen Donnelly (@DonnellyStephen) May 22, 2021
Government ministers met today to review progress on Ireland’s response to the cyber attack on the HSE.
Advertisement
Ministers Donnelly, Eamon Ryan, and Heather Humphreys and Minister of State Ossian Smyth were updated on progress made towards restoring HSE and hospital IT systems, which is “essential to the restoration of care for patients and to support the personnel in the front line who are delivering care”, a government statement said.
“The Ministers expressed their particular appreciation for the exceptional efforts of frontline health care workers in the difficult circumstances caused by the cyber-attack,” the statement said.
“The National Cyber Security Centre, the HSE and specialist contractors are continuing to implement a detailed and dedicated operational programme to repair and restore the HSE’s IT systems and network, and are making very steady progress in what is a difficult and complex task.”
Taoiseach Michéal Martin said yesterday that the reason the tool was provided was unknown.
Minister of State Niall Collins said earlier this afternoon that it was “still unclear” why the decryption key was made available.
Speaking on RTÉ Radio One’s Saturday with Katie Hannon, Collins said that work was ongoing to determine whether or not the decryption key is functional.
“The HSE is a hugely complex organisation, there’s over 80,000 devices across the HSE, which have to be checked as part of the whole response to this cyber attack,” Collins said.
The minister said that we need to “have a stepped up public awareness campaign over the next number of days to highlight to people, particularly vulnerable people”, the dangers posed by criminal organisations operating in the cyber sphere.
Vice President of the Irish Hospital Consultants Association (IHCA) Dr Gabrielle Colleran, a consultant radiologist in Holles Street, told RTÉ Radio One that it has been “by far the most difficult eight days” of her time in the HSE since joining the body in 2003.
Healthcare workers in Holles Street were tackling multiple challenges when they came into work last Friday, including disconnected computers, no working phones, and no access to patients’ records.
Dr Colleran said staff were “trying to piece together the picture of the clinical puzzle from conversations with each other”.
Interim measures, such as using mobile phones to communicate and taking notes by hand, were “quickly locking into place to try to keep the show on the road”.
Related Reads
Gardaí urging people to contact them if they believe their data was shared online in HSE hack
Explainer: What is a decryption tool and why would hackers hand it over without receiving a ransom?
HSE ransomware attack began on a single computer when an employee clicked on a link
However, “the reality is it’s so much slower when we are doing things by hand, when we don’t have access to the priors, it’s not the safe, high quality service that we want to provide and it’s much slower”.
Dr Colleran said it is “clear we’re going to have to invest coming out of this and it’s important that we invest not just in the hardware and the software, but in having the local expertise on site”.
“Many [healthcare workers in model three hospitals] have been quite affected by the fact that the expertise is centralised and not local on the ground. So it’s very important that we invest wisely in solutions that work, and solutions that work come from the frontline.”
Sinn Féin spokesperson for health David Cullinane said that “priority has to be to get services back up and running as quickly as possible”.
“We do need to have a conversation about cyber security and funding,” Cullinane said.
“We can’t take our eye off the ball in that area, because if criminal gangs can penetrate our healthcare system like that and almost bring it to its knees at a very vulnerable time, obviously more needs to be done.”
The HSE has received a High Court injunction to stop data that might have been stolen during the attack being used illegally.
The injunction requires anyone possessing the HSE data to return it and not to disclose, trade, or deal in the information.
The public has been advised to be cautious of call and text scams by fraudsters taking advantage of fear around the attack on the HSE.
Readers like you are keeping these stories free for everyone...
A mix of advertising and supporting contributions helps keep paywalls away from valuable information like this article.
Over 5,000 readers like you have already stepped up and support us with a monthly payment or a once-off donation.
To embed this post, copy the code below on your site
Close
31 Comments
This is YOUR comments community. Stay civil, stay constructive, stay on topic.
Please familiarise yourself with our comments policy
here
before taking part.
@Random_paddy: apparently this hack started with someone clicking something they shouldn’t have. So the issue there is training.
To protect themselves completely, the HSE needs to lock down their systems so that eg none of their computers have WiFi or USB, and Internet is only available on some computers which have no connection to the rest of their systems. They also would need to either ban remote working, or secure the home networks of their remote employees. But that still won’t protect them against inside jobs or some inherent vulnerabilities of all computer systems.
@Random_paddy: IT security is as good as anywhere. Not much you can do when a staff member hands control of his machine to those intent on causing harm/making money. From what the HSE said regarding this staff member and their ‘broken’ PC, its fairly obvious the HSE were not deliberately targeted, the scammers just got extremely lucky and met the right tool. Staff member ‘inadvertently’ downloaded ransomware and attempted to rectify the issue themselves rather than contacting their IT Dept. In their attempt to save themselves the embarrassment of having to explain what they were doing to download ransomware, they literally cost the taxpayers of this country millions and exposed their most personal records to the dark net. The scammers must have near wet themselves with excitement when they realised what network that PC was linked to.
@Tommy Roche: A logical explanation. Had to switch off listening to Ms Shorthall pontificating. Good that Niall Collins pointed out that when she was in the hot seat she jumped ship.
@Thomas Smyth: It was the employee who compromised the machine whilst they were connected to the HSE network. I realise many are hoping the blame will go up the ladder within the HSE, but in this case the blame will fall entirely where it should. There are of course innocent ways a machine could become infected with ransomware, but all of them involve downloading a file(.exe, jpg, MP3, etc) over the internet from an untrusted source. That’s a huge no-no for an employee with login privileges to the organizations internal network. If you want to download pics of the latest erotic adventures of Sharon the Sheep, at least do it in the privacy of your own home, on your own internet connection.
@Tommy Roche: People seem to have a notion here that the “Employee” simply clicked a link and the whole system was compromised, I would not believe that notion for one second.. Firstly one can assume that if the employee was general staff then not a hope they had access to the complete network because if so the whole HSE IT team should be sent packing… This for me at least stinks of the HSE IT team not have a bulls notion and regardless of an employee doing what they did, at least have a DR backup for crying out loud…
@Random_paddy: all the regulars here last week complaining about the people replying to the phishing mail that the company sent about pay rise….now you see how important it is that they should just not clicked on those links. Fffs
@Dave: He initially clicked something, or downloaded something that resulted in ransomware being installed on his machine. The machine froze, a screen popped up warning the machine was infected and showed a number to call for ‘technical support’ The employee actually phoned and spoke to the scammers. They asked him to allow remote access so that they could diagnose and fix the problem, which he did. If this had been a normal home PC the scammers would have rooted around for a bit, say they had found the problem and state a fee to fix it. The person would pay the fee and the scammers would delete the ransomware. In rooting around this machine they found they had stumbled into something huge that could pay off big time.
@Eoin Fitzgerald: They inadvertently hooked into the feasibility study and schematics for the Children’s Hospital and thought, ‘By the Beard of Tsar Nicholas, ve cannot disrupt zis system any more than it already is …. Give zem ze incription key, and be done wiz it ..’
@Divad Nayr: I would not believe a word of what is being said, an employee clicked a link, the whole system was compromised and then all of a sudden a decryption was received,,,, Ya right.
Training helps but some of these fake messages/sites can be incredibly realistic. I’d love to think that I would not be caught out but I probably would.
Maybe it’s cause the whole idea was to get peoples data and then get paid for not releasing it and they have the data now ,so they give them key so they can get their systems back but they still have the data so they still have to pay for it not to be released or not pay and they put it out their
There is understandably awful lot of debate around the circumstances of this hack, network security, alleged user training failures, including am alleged employee with computer issues clicking on a link offering help etc.
The reasons behind this entire fiasco comes down to an issue which will be familiar to many and will likely offend people that are working in IT, but here goes…
In many companies and organisations, when a user reports an issue to their IT department, which may be one person or an entire team, the response is pretty much universal…
We are flat out, we have logged your issue and will get back to you and or someone to have a look when we get a chance…hours or even days go by and nothing gets done…
Maybe they just feel sorry for how absolutely pathetic their victim is – maybe one of their consciences cracked under the massive weight of outright pity
Don’t believed this was caused by someone just clicking on a mail. Far easier to blame an employee than blame the failures of their it system, just like in any plane crash the pilot always gets the blame and never the plane,
US to deploy two nuclear submarines in response to 'highly provocative' comments from Russia
Updated
2 hrs ago
27.6k
89
Visa cards
Customers report problems trying to pay with Visa cards at tills
16 mins ago
1.3k
Youghal
Ukrainians leave jobs and pets behind as they’re forced to leave Co Cork hotel
23 hrs ago
62.1k
Your Cookies. Your Choice.
Cookies help provide our news service while also enabling the advertising needed to fund this work.
We categorise cookies as Necessary, Performance (used to analyse the site performance) and Targeting (used to target advertising which helps us keep this service free).
We and our 214 partners store and access personal data, like browsing data or unique identifiers, on your device. Selecting Accept All enables tracking technologies to support the purposes shown under we and our partners process data to provide. If trackers are disabled, some content and ads you see may not be as relevant to you. You can resurface this menu to change your choices or withdraw consent at any time by clicking the Cookie Preferences link on the bottom of the webpage . Your choices will have effect within our Website. For more details, refer to our Privacy Policy.
We and our vendors process data for the following purposes:
Use precise geolocation data. Actively scan device characteristics for identification. Store and/or access information on a device. Personalised advertising and content, advertising and content measurement, audience research and services development.
Cookies Preference Centre
We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent. You may exercise your right to consent, based on a specific purpose below or at a partner level in the link under each purpose. Some vendors may process your data based on their legitimate interests, which does not require your consent. You cannot object to tracking technologies placed to ensure security, prevent fraud, fix errors, or deliver and present advertising and content, and precise geolocation data and active scanning of device characteristics for identification may be used to support this purpose. This exception does not apply to targeted advertising. These choices will be signaled to our vendors participating in the Transparency and Consent Framework. The choices you make regarding the purposes and vendors listed in this notice are saved and stored locally on your device for a maximum duration of 1 year.
Manage Consent Preferences
Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
Social Media Cookies
These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then these services may not function properly.
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not be able to monitor our performance.
Store and/or access information on a device 149 partners can use this purpose
Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.
Personalised advertising and content, advertising and content measurement, audience research and services development 195 partners can use this purpose
Use limited data to select advertising 158 partners can use this purpose
Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Create profiles for personalised advertising 119 partners can use this purpose
Information about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Use profiles to select personalised advertising 120 partners can use this purpose
Advertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Create profiles to personalise content 51 partners can use this purpose
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Use profiles to select personalised content 48 partners can use this purpose
Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Measure advertising performance 177 partners can use this purpose
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Measure content performance 78 partners can use this purpose
Information regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Understand audiences through statistics or combinations of data from different sources 111 partners can use this purpose
Reports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Develop and improve services 116 partners can use this purpose
Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
Use limited data to select content 51 partners can use this purpose
Content presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Use precise geolocation data 65 partners can use this special feature
With your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.
Actively scan device characteristics for identification 36 partners can use this special feature
With your acceptance, certain characteristics specific to your device might be requested and used to distinguish it from other devices (such as the installed fonts or plugins, the resolution of your screen) in support of the purposes explained in this notice.
Ensure security, prevent and detect fraud, and fix errors 122 partners can use this special purpose
Always Active
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.
Deliver and present advertising and content 126 partners can use this special purpose
Always Active
Certain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.
Match and combine data from other data sources 94 partners can use this feature
Always Active
Information about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.
Link different devices 67 partners can use this feature
Always Active
In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).
Identify devices based on information transmitted automatically 116 partners can use this feature
Always Active
Your device might be distinguished from other devices based on information it automatically sends when accessing the Internet (for instance, the IP address of your Internet connection or the type of browser you are using) in support of the purposes exposed in this notice.
Save and communicate privacy choices 103 partners can use this special purpose
Always Active
The choices you make regarding the purposes and entities listed in this notice are saved and made available to those entities in the form of digital signals (such as a string of characters). This is necessary in order to enable both this service and those entities to respect such choices.
have your say