Mississippi medical center closes all clinics after ransomware attack
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户给的原文是关于密西西比大学医学中心(UMMC)遭受勒索软件攻击的事件。首先,我得通读全文,抓住关键点。 文章提到UMMC关闭了所有诊所,因为遭受了勒索软件攻击。该机构有超过10,000名员工,运营着七家医院、35个诊所和200多个远程医疗点。攻击导致IT系统瘫痪,无法访问电子病历。虽然取消了门诊和日间手术,但医院服务仍在进行中。 UMMC正在与CISA和FBI合作调查事件,并激活了应急计划。他们关闭了所有网络系统,评估影响。官员们确认正在与勒索软件团伙沟通,并考虑下一步行动。目前没有勒索软件组织认领此次攻击,但数据可能已被窃取作为筹码。 现在需要将这些信息浓缩到100字以内。重点包括:UMMC因勒索软件攻击关闭诊所、IT系统瘫痪、取消部分服务、继续医院运作、与执法机构合作调查、数据可能被窃取等。 接下来,组织语言,确保简洁明了。例如:“密西西比大学医学中心因勒索软件攻击关闭所有诊所及IT系统,导致电子病历无法访问。取消部分医疗服务但医院运作继续。正与FBI等合作调查,并与黑客沟通。” 这样既涵盖了主要事件,又控制在字数内。 </think> 密西西比大学医学中心因勒索软件攻击关闭所有诊所及IT系统,导致电子病历无法访问。取消部分医疗服务但医院运作继续。正与FBI等合作调查,并与黑客沟通。 2026-2-20 12:0:30 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

The University of Mississippi Medical Center (UMMC) closed all its clinic locations statewide on Thursday following a ransomware attack.

UMMC has over 10,000 employees and, as one of the largest employers in Mississippi, operates seven hospitals, 35 clinics, and more than 200 telehealth sites statewide. The medical center includes the state's only children's hospital, only Level I trauma center, only organ and bone marrow transplant program, and the only Telehealth Center of Excellence, one of two across the United States.

As revealed on Thursday afternoon, the cyberattack took down many of its IT systems and blocked access to the Epic electronic medical records. While UMMC cancelled outpatient and ambulatory surgeries/procedures and imaging appointments, officials said hospital services continue via downtime procedures.

Wiz

UMMC is now investigating the incident with assistance from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the FBI.

"We have activated our Emergency Operations Plan and are working with authorities including the FBI and Homeland Security, who are helping us to evaluate this situation and determine next steps," the UMMC said.

When this article was published, the UMCC's website was still down, and officials said that the hospital had shut down all IT systems while they assessed the attack's impact.

"We are still evaluating the extent of systems impacted. As a precaution, we have shut down all our network systems and will conduct risk assessments before bringing anything back online. In-person class schedules remain normal," they said.

Officials confirm ransomware attack 

Hospital officials have also revealed during a press conference on Thursday afternoon that they are communicating with the ransomware operation behind the attack and working with authorities on the next steps, according to The Daily Mississippian.

"The attackers have communicated to us and we are working with the authorities and specialists on next steps. We do not know how long this situation may last," said LouAnn Woodward, the dean of the school of medicine at UMMC.

"Patients in our hospital and our emergency department are being cared for. Clinical equipment and operations remain functional. We are using our downtime procedures. For our students, in-person classes will continue as scheduled."

"All of our equipment works. All of our patients are being taken care of safely. There will be no patient impact as a result of this downtime," Dr. Alan Jones, associate vice chancellor for health affairs at UMMC, told reporters.

No ransomware group has claimed responsibility for this attack, as they're likely still negotiating with the UMMC and want to pressure it into paying an extortion demand.

However, with ransomware involved, data may have also been stolen and will be used as additional leverage to convince the hospital to pay.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/
如有侵权请联系:admin#unsafe.sh