Skip to main contentSkip to navigationSkip to navigation

Cyber-attack set to escalate as working week begins, experts warn

This article is more than 6 years old

Europol and NHS fear further disruption when workers switch on computers for first time since spread of ransomware

Health and security chiefs have warned of possible fresh disruption from the global cyber-attack when workers switch on their computers for the first time at the start of the working week.

Europol, the pan-EU crime-fighting agency, said the threat was escalating and predicted the number of “ransomware” victims was likely to grow across the private and public sectors.

One in five NHS Trusts was hit by the “WannaCry” attack on Friday. Operations planned for Monday have been cancelled at several major hospitals, with patients facing disruption to their treatment because computers used to share patients’ test results and scans with doctors remain frozen.

The National Cyber Security Centre warned that more cases of the ransomware were expected to come to light beyond the NHS and “possibly at a significant scale”. However, it stressed there were software updates that were easy to install and can prevent the spread of the malware which requests victims pay $300 or risk losing all their files.

Many of England’s 8,000 GP surgeries could be affected for the first time on Monday. “Some parts of the NHS will not have clocked there is an issue,” a spokeswoman for NHS Digital told the Guardian. “If that is going to happen, it is more likely to be primary care trusts.”

Surgeries were sent a bulletin on Sunday advising them what to do if they discovered their computers had been hacked and how to get support from NHS Digital and the National Cyber Security Centre.

Some planned operations are being cancelled at Barts Health NHS trust which operates five London hospitals where computers remain down. GPs have been asked not to request non-urgent scans and tests and some emergency cases are being diverted to nearby hospitals.

“Where we need to cancel planned appointments, we will be contacting patients directly to make them aware,” said a spokesman for the trust which operates the Royal London and Whipps Cross Hospitals as well as St Bartholemew’s, Mile End Hospital and Newham University Hospital. “It is possible that we will not be able to contact all patients that we need to speak to, so we apologise if we are unable to proceed with your treatment once you arrive at hospital.”

The attack has hit companies and other organisations, from Russia to Australia, and Europol estimates there have been 200,000 victims in at least 150 countries.

“I am worried about how the numbers will continue to grow when people go to work and turn their machines on on Monday morning,” said Rob Wainwright, the Europol director.

The hackers remain undetected but are believed to have so far gathered only $42,000 in ransom payments from about 100 victims. This is expected to rise as the malware threatens that the ransom will double if victims fail to pay $300 in bitcoin currency within three days. It threatens files will be deleted if there is no payment within seven days.

Organisations across the globe, including investigators from Britain’s National Crime Agency (NCA), are involved in what Europol described as a complex international investigation.

“Cyber criminals may believe they are anonymous but we will use all the tools at our disposal to bring them to justice,” said Oliver Gower, of the NCA.

In a blog post yesterday, Microsoft’s president, Brad Smith, appeared to acknowledge that the ransomware attack used a hacking tool built by the US National Security Agency, which leaked online in April. He said governments should “treat this attack as a wake-up call” and “consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits”.

The NSA and White House did not immediately respond to requests for comment about the Microsoft statement.

Cyber security experts said the malware could spread through computers with unpatched versions of Microsoft Windows. They have urged users to only run their computers in safe mode until they have checked that the update blocking the ransomware is installed.

Six NHS Trusts were still affected 24 hours after the attack amid concerns that their networks were left vulnerable because they were using outdated Windows XP software and also because security upgrades issued last month had not been installed.

NHS services were affected over the weekend, with ambulances diverted away from some A&E units. Photograph: Andy Rain/EPA

A computer security expert credited with stopping the spread of the ransomware on Saturday by activating a digital “kill switch” warned on Sunday that a fresh attack was likely.

The expert, known only as MalwareTech on Twitter, said hackers could upgrade the virus. “Version 1 of WannaCrypt was stoppable but version 2.0 will likely remove the flaw,” he said on Twitter. “You’re only safe if you patch ASAP.”

He won praise on Sunday from the head of Europol’s European cybercrime centre, Steven Wilson: “He made a significant step in slowing the advance of this malware.”

In Scotland, where 11 health boards and the ambulance service were hit, the justice secretary, Michael Matheson, said more than 120 public bodies were being contacted to ensure their defences were adequate. He said NHS systems in Scotland were expected to be recovered by Monday and reassured patients with appointments they should attend as planned.

It emerged over the weekend that NHS Digital emailed 10,000 individuals in NHS organisations last month warning them to protect themselves against the specific threat of ransomware and included a software patch to block such hacks on the majority of systems. However, it would not work with outdated Windows XP systems that still run on about 5% of NHS devices.

NHS Digital said it did not yet know how many organisations installed the update and this would be revealed in a later analysis of the incident.

The hack sparked a bitter political row, with Labour blaming the Conservatives for cutting funding for NHS infrastructure.

The shadow health secretary, Jon Ashworth, on Sunday demanded the publication of the Department of Health’s “risk register” to show how seriously the government had taken a potential cyber-attack.

“If the Conservative prime minister thinks they were taking it seriously, then she shouldn’t have any problem in publishing that register,” he said.

He accused the government of “huge investment cuts in the infrastructure of the NHS” and said £1bn had been taken out in the last year.

He said “a big priority” of Labour’s promise to spend an extra £10bn on NHS infrastructure would “go to investing in cyber security and upgrading our IT”.

On Saturday, the Liberal Democrat home affairs spokesman, Brian Paddick, said: “A combination of warnings and plain common sense should have told ministers that there is a growing and dangerous threat to our cyber security.”

Amber Rudd, the home secretary, who is leading the response to the attack, said: “I don’t think it’s to do with ... preparedness. There’s always more we can all do to make sure we’re secure against viruses, but I think there have already been good preparations in place by the NHS to make sure they were ready for this sort of attack.”

More on this story

More on this story

  • Operations cancelled as Hunt accused of ignoring cyber-attack warnings

  • Ransomware attack 'like having a Tomahawk missile stolen', says Microsoft boss

  • What is WannaCry ransomware and why is it attacking global computers?

  • To prevent more cyberattacks, we need real tech experts in government

  • NHS cancer patients hit by treatment delays after cyber-attack

  • Surf fan who loves pizza: anonymous hero who halted cyber-attack

  • 'Accidental hero' halts ransomware attack and warns: this is not over

  • Who is to blame for exposing the NHS to cyber-attacks?

Most viewed

Most viewed