US healthcare operator DCH Health System has announced that it has purchased a decryption key from ransomware attackers in order to expedite recovery. SC Media reported last week that DCH was Forced to turn away certain patients following the ransomware infection.
"We have successfully completed a test decryption of multiple servers, and we are now executing a sequential plan to decrypt, test and bring systems online one-by-one," said in an updated news release. "This will be a deliberate progression that will prioritise primary operating systems and essential functions for emergency care. DCH has thousands of computer devices in its network, so this process will take time."
Meanwhile, DCH is also using its own backup files to rebuild its systems and restore its services.
The attack took place on Oct. 1, and quickly disrupted access to computer systems at the health care provider’s three locations: DCH Regional Medical Center in Tuscaloosa, Northport Medical Center and Fayette Medical Center. At of 1 p.m. Eastern Time on Monday, Oct. 7, the health care provider was still diverting ambulances carrying all but the most critical patients to other hospitals. Walk-ins are also still being treated.
"We cannot provide a specific timetable at this time, but our teams continue to work around the clock to restore normal hospital operations, as we incrementally bring system components back online across our medical centers. This will require a time-intensive process to complete, as we will continue testing and confirming secure operations as we go," the Oct. 5 update continues.
Although DCH’s latest update merely states that it "obtained" a decryption key from the attackers, the company acknowledged that it did in fact pay the cybercriminals in an additional statement read to SC Media by Brad Fisher, corporate director of marketing/communication.
"We worked with law enforcement and IT security experts to assess all options in executing the solution we felt was in the best interest of our patients. This included purchasing the decryption key from the attacker to expedite system recovery and help ensure patient safety," said Fisher.
DCH has not disclosed how much the attackers demanded or the amount that was paid.
The malware strain involved in this incident has been confirmed as Ryuk. Brett Callow, spokesman at anti-malware firm Emsisoft, noted in emailed comments’s that "Ryuk’s code typically results in there being some data loss even if the ransom is paid." Callow also added that in a "small number of cases," decryption tools can recover data encrypted by Ryuk, provided it hasn’t been corrupted.
Earlier this month, the FBI issued a new public service announcement regarding the ongoing ransomware epidemic, emphasising that attacks are becoming more targeted since early 2018, with losses increasingly significantly in that time.
The original version of this article was published on SC Media US.