DCH cyberattack impacts area ambulance service


THE CYBER ATTACK AT DCH IN
TUSCALOOSA HAVING FAR-REACHING
EFFECTS. IAN: NEW AT 6:00 WVTM 13’S CHIP
SCARBOROUGH TAKES A LOOK AT HOW
AMBULANCE SERVICE IN THE AREA IS
HAVING TO ADJUST. CHIP: IT’S BEEN A BUSY WEEK FOR
THOSE WHO PROVIDE AMBULANCE
SERVICE IN AND AROUND
TUSCALOOSA. A CYBERATTACK AT DCH REGIONAL
MEDICAL CENTER HAS FORCED
NON-CRITICAL TRANSPORTS TO BE
DIVERTED TO BIRMINGHAM.>>SO THAT AFFECTS AMBULANCE
RESPONSE IN THE CITY BECAUSE
THOSE UNITS ARE OUT OF SERVICE
LONGER. SO WE PUT ON EXTRA UNITS TO
AUGMENT THAT RESPONSE. CHIP: SO ON A TYPICAL DAY,
NORTHSTAR AMBULANCE TYPICALLY
TRANSPORTS ABOUT 10 PATIENTS OUT
OF TOWN. RIGHT NOW THOUGH WITH THE DCH
INCIDENT, IT’S ABOUT 30. NORTHSTAR HAS DONE A REALLY GOOD
JOB OF ADAPTING TO THE
SITUATION. BRINGING IN UNITS FROM OTHER
COUNTIES AND I THINK THEY’VE PUT
ON SOME LONGER SHIFTS. CHIP: THE RANSOMWARE ATTACK
IMPACTS DCH LOCATIONS IN
TUSCALOOSA, NORTHPORT, AND
FAYETTE. THE HOSPITALS ARE STILL OPEN,
TREATING EXISTING PATIENTS, AND
ACCEPTING NEW PATIENTS WHO ARE
CRITICAL, BUT NO OTHERS UNTIL
THE ISSUE IS RESOLVED.>>IF YOU HAD THE OPTION OF
GOING TO A CLINIC OR GOING TO
YOUR DOCTOR’S OFFICE, THAT WOULD
PROBABLY BE YOUR BEST OPTION
RIGHT NOW.>>AS THE FBI AND SECRET SERVICE
INVESTIGATE WHAT HAPPENED AT
DCH, AMBULANCE PROVIDERS ARE
PREPARED TO CONTINUE THEIR EXTRA
DUTIES AS LONG AS THEY’RE
NEEDED. IN TUSCALOOSA, CHIP SCARBOROUGH,
WV

1 thought on “DCH cyberattack impacts area ambulance service

  1. anybody can go on a website like arin.net ariin that's the American registry of Internet numbers I think it stands for or ipv4 info.com in similar sites and look up even just by the broad category they're looking for like an ambulance company with the word ambulance or say they know the company they put that in the search, they can find anything like that if they want. And when they do, they get an IP range of ipv4 addresses that they can then proceed to port scan all day long even if it takes them days to complete a huge range of them and then find vulnerabilities with stuff like metasploit and related tools like that or just make up their own custom scripts. It sounds like what they're doing here is sending so many requests to the servers that it shuts them down. Is typically takes more than one machine so it would be some kind of coordinated attack meaning I would expect any way that more than one person is behind this attack.

Leave a Reply

Your email address will not be published. Required fields are marked *