A previously unseen malware is being blamed for an attack on a London hospital that forced the facility to shut down a segment of its systems for a few days as a precautionary measure.
Barts Health NHS Trust, a conglomerate of five hospitals in London employing a staff of 15,000, was hit in January by the malware attack, which managed to circumvent the facility's anti-virus software, according to a report on ZDNet.
Although administrators at Barts Health said patient data was not accessed, the facility's pathology system was offline for a few days.
While previous reports said it was unclear how the Trojan had gotten into the hospital's network, an update from 1 March board minutes revealed that four of the hospital group's five facilities were affected. While the hospital's AV software was up to date, the incident involved "a new virus not seen previously".
The investigation continues.
Tony Rowan, chief security consultant at SentinelOne told SC Media UK: "Truly “new” malware is relatively rare but, on a daily basis, we see hundreds of thousands of modified or obfuscated malware samples. The clear objective of this process is to bypass the legacy AV tools that are primarily based on detecting known-bad malware based on their signatures. Yet again, we see from this incident at Barts that the signature based approach is very limited and needs replacing with methods capable of detecting the attributes and behaviours of malware, rather than depending entirely on “knowing” the sample from other affected sites."