Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / SECURITY / Conti ransomware syndicate behind attack on Irish health service

Conti ransomware syndicate behind attack on Irish health service

May 17, 2021 by cbn Leave a Comment

The devastating ransomware attack on the Irish Health Service Executive (HSE), was the work of the Conti ransomware gang, also known as Wizard Spider, according to reports.

The Irish National Cyber Security Centre (NCSC), which is leading on triage and investigation, said it had activated its incident response procedures and was providing ongoing support to the HSE. It said that it had also detected suspicious activity on the network of the Department of Health (DoH) but that it had been able to stop this attack before the ransomware executed. It believes the attempted attack was part of the same campaign.

“There are serious impacts to health operations and some non-emergency procedures are being postponed as hospitals implement their business continuity plans,” the NCSC said in a statement.

More details of the incident began to emerge over the weekend of 15 and 16 May 2021, as hospitals around the country reported disruption to patient services on a massive scale, after news broke of the initial attack on the morning of Friday 14 May. A full breakdown of current disruptions can be found here, note Ireland’s Covid-19 vaccination programme is proceeding as normal.

A purported screenshot of the ransom note received by the HSE – which was published by Bleeping Computer – suggests that the Conti crime gang (which turned over UK retailer FatFace earlier this year) accessed HSE’s networks at the end of April.

The note said the gang had encrypted file servers and SQL servers, and downloaded over 700GB of personally identifiable information (PII) including, among other things, the addresses and phone numbers of patients, doctors and nurses, payroll information and employment contracts. The gang is supposedly demanding a ransom of $19,999,000.

The Conti ransomware first emerged about 12 months ago and shares similarities with other ransomware families which have been used extensively against healthcare organisations, such as Ryuk – indeed, Cybereason research highlights a clear link between Ryuk and Conti, Wizard Spider having enthusiastically switched from Ryuk to Conti as its ransomware of choice.

As is now almost standard practice, the gang runs double extortion tactics, naming and shaming its victims and leaking their data on the dark web if they don’t play ball.

Peter Mackenzie, manager of Sophos’s Rapid Response team, said: “Sophos Rapid Response has been involved in 10 Conti ransomware incidents so far and from our investigations it is clear that Conti ransomware has undergone rapid development in the last 12 months.

“Conti is a human-led ‘hands-on-keyboard’ ransomware that encrypts data and spreads across a target system at high speed. It is also what is known as a ‘double extortion’ ransomware that steals and threatens to expose information as well as encrypting it. The Conti News site has published data stolen from at least 180 victims so far. 

“Sadly, the healthcare sector is a prime target for adversaries because reliability of services and care can, quite literally, be a matter of life or death. The sector also holds vast amounts of personal, confidential and highly sensitive information,” said Mackenzie.

Sophos’ most recent State of Ransomware report found that 34% of healthcare organisations had experienced some form of ransomware attack since the beginning of the Covid-19 pandemic, and that one in three of those had paid a ransom. Of those that were not hit, 41% were resigned to it being “only a matter of time” before they were, and 55% believed ransomware attacks were now too sophisticated to stop.

“Adversaries targeting healthcare know they are hitting where it hurts, hoping for a large payout as their victims want to prioritise patient privacy and care,” said Mackenzie.

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: SECURITY

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • How Azure Cobalt 100 VMs are powering real-world solutions, delivering performance and efficiency results
  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,322)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in