By Jonathan Mattise

A ransomware attack has prompted a health care chain that operates 30 hospitals in six states to divert patients from at least some of its emergency rooms to other hospitals, while putting certain elective procedures on pause, the company announced.

In a statement Monday, Ardent Health Services said the attack occurred Nov. 23 and the company took its network offline, suspending user access to its information technology applications, including the software used to document patient care.

The Nashville, Tennessee-based company said it cannot yet confirm the extent of any patient health or financial information that has been compromised. Ardent says it reported the issue to law enforcement and retained third-party forensic and threat intelligence advisors, while working with cybersecurity specialists to restore IT functions as quickly as possible. There's no timeline yet on when the problems will be resolved.

Ardent owns and operates 30 hospitals and more than 200 care sites with upwards of 1,400 aligned providers in Oklahoma, Texas, New Jersey, New Mexico, Idaho and Kansas.

All of its hospitals are continuing to provide medical screenings and stabilizing care to patients arriving at emergency rooms, the company said.

“Ardent’s hospitals are currently operating on divert, which means hospitals are asking local ambulance services to transport patients in need of emergency care to other area hospitals,” the company said on its website. “This ensures critically ill patients have immediate access to the most appropriate level of care.”

The company said each hospital is evaluating its ability to safely care for patients at its emergency room, and updates on each hospital's status will be provided as efforts to bring them back online continue.

There was no immediate claim of responsibility for the attack. Ransomware criminals do not usually admit to an attack unless the victim refuses to pay.

A recent global study by the cybersecurity firm Sophos found nearly two-thirds of health care organizations were hit by ransomware attacks in the year ending in March, double the rate from two years earlier but a slight dip from 2022. Education was the sector most likely to be hit, with attack saturation at 80%.

Increasingly, ransomware gangs steal data before activating data-scrambling malware that paralyzes networks. The threat of making stolen data public is used to extort payments. That data can also be sold online. Sophos found data theft occurred in one in three ransomware attacks on healthcare organizations.

Analyst Brett Callow at the cybersecurity firm Emsisoft said 25 U.S. healthcare systems with 290 hospitals were hit last year while this year the number is 36 with 128 hospitals. “Of course, not all hospitals within the systems may have been impacted and not all may have been impacted equally,” he said. “Also, improved resilience may have improved recovery times.”

“We’re not in a significantly better position than in previous years, and it may actually be worse,” he said.

“We desperately need to find ways to better protect our hospitals. These incidents put patients' lives at risk — especially when ambulances need to be diverted — and the fact that nobody appears to have yet died is partly due to luck, and that luck will eventually run out,” Callow added.

Most ransomware syndicates are run by Russian speakers based in former Soviet states, out of reach of U.S. law enforcement, though some “affiliates” who do the grunt work of infecting targets and negotiating ransoms live in the West, using the syndicates’ software infrastructure and tools.

The Kremlin tolerates the global ransomware scourge, in part, because of the chaos and economic damage to the West — and as long its interests remain unaffected, U.S. national security officials say.

While industries across the spectrum have been hit by ransomware, a recent attack on China’s biggest bank that affected U.S. Treasury trading represented a rare attack on a financial institution.

Associated Press technology reporter Frank Bajak contributed to this report.

Share:
More In Technology
Stocks Open Mostly Higher on Strong Tech Earnings
Markets opened mostly higher led by gains in the tech sector on strong Q4 earnings. It comes after a tumultuous January which saw stocks suffer one of their worst months since the early days of the pandemic. Jim Worden, Chief Investment Officer, Wealth Consulting Group joined Cheddar's Opening Bell to discuss early market activity.
Fitness Brand CLMBR Shaking Up The At-Home Fitness Industry
CLMBR is hoping to become the next big thing in connected fitness. The brand offers a high intensity, low impact workout with on-demand, instructor-led classes. Avrum Elmakis, CLMBR's CEO and founder, joined Cheddar to discuss where the company is heading next.
Amazon, Nike Considering Potential Bids For Peloton
Peloton is reportedly drawing interest from multiple suitors. According to the Wall Street Journal, Amazon is considering acquiring the exercise bike company as it looks to expand into the health and wellness technology industry. Hatem Dhiab, managing partner at Gerber Kawasaki, joined Cheddar to discuss Peloton's future and which company might be its best bet as a buyer.
Amazon Shares Jump on Solid Cloud Revenue, Profit From Rivian Stake
Amazon shares jumped north of 13 percent in after-hours trading as the E-commerce giant posted a beat on earnings in its fourth quarter. Amazon saw particular success in its cloud computing business, as well as its stake in EV startup, Rivian after its massive IPO. Deren Baker, CEO, Edge by Ascential joined Cheddar's Opening Bell to discuss.
Google Parent Alphabet Posts Strong Q4 Results, Revenue Growth of 32%
Google parent company Alphabet reporting a beat on its Q4 earnings report, with revenue up 32%. The company's strong quarter was thanks to success in its cloud and advertising businesses, which both saw solid year-over-year growth. Angelo Zino, Senior Industry Analyst, CFRA Research joined Cheddar's Opening Bell to discuss the tech giant's blowout results.
Load More