The Ransomware Crisis: Part I

EDITOR’S NOTE: Following last week’s global cyberattack that spread through approximately 150 nations, particularly impacting the U.K.’s National Health Service, Edward Roche, in association with RACmonitor, is producing a series on the need for healthcare facilities in the U.S. to protect themselves from cybercriminals, demanding ransom for patient records. This is the first in a series of stories on the ransomware crisis.

The world is now witnessing one of the largest ransomware attacks in history. Computers all over the world have been hit, particularly in the United Kingdom. Healthcare providers, including both large and small hospitals and medical practices, have been a significant focus of the attacks.

In the U.S., the Department of Homeland Security has mobilized a full task force. The President of the United States issued an executive order on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” It is rumored that some of the tools used were taken from the infamous “Vault 7” materials stolen from the Central Intelligence Agency’s Center for Cyber Intelligence. These tools – malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems amounting to several hundred million lines of computer code – spread quickly across the Internet. It is impossible to determine the identity of the attacker, or even if the attacker was a human or an artificial intelligence algorithm that is out of control.

When the information system of a healthcare provider is infected with ransomware, a special computer virus will encrypt most if not all of its electronic medical records (EMR) data. In order to get the electronic “key” to “unlock” the data, a ransom must be paid. Often, even when the ransom is paid, the decryption key does not work, and the data needs to be restored from backup or paper records. The costs to the attacked healthcare provider may go far beyond the financial outlay of the ransom, putting at risk its ability to provide patient care, its ability to collect revenue, its reputation in the community, and even exposing it to legal liability for putting highly confidential patient data in jeopardy.

The Illusion of Effective Security

We can be sure that every organization under attack believes it has in place a full panoply of safeguards, firewalls, consultants, defensive software, and possibly even cyber insurance, all aimed at keeping out of harm’s way should an incident occur. And it all may still fail. Whatever is in place, no matter how advanced, may be unable to withstand the onslaught of specially designed hacking tools paid for at great expense by the American taxpayer and intended originally to safeguard security, not obliterate it.

Where does that leave us today? At a minimum, healthcare organizations are and should be doing the following:

  • Reviewing their policies and procedures in place to see if they are up to date with the latest cyber threats;

  • Learning what financial resources are in place in case it is necessary to make a giant and unexpected cash payment;

  • Making sure their IT systems and applications are up to date and properly patched to guard against known ransomware exploits;

  • Maintaining off-site backups to allow replacement of corrupted or stolen operational data; and

  • Examining the role of law enforcement and even national security experts in helping solve the problem.

Yet even these relatively technical and defensive steps will not resolve the problem, because the reality is that in the United States, we have built a giant, loosely integrated Medicare and Medicaid billing system that has so many points of vulnerability, they could not be counted.

Clear and Present Danger

The United States operates the world’s most complex claims processing system. For Medicare alone, around 5 million claims are processed every day. But instead of having a single integrated information system, the U.S. government has fallen into the habit of outsourcing much of its critical information infrastructure to third-party private subcontractors.

So, how does it work?  Each healthcare provider – and there are more than 5,000 hospitals alone in the U.S. – operates an information system that keeps track of its service delivery and billing. When claims are ready for the government, they are filed not with the government, but with a subcontractor. These subcontractors in turn must process these billions of claims and then pass them along to the the next level of process, also paid subcontractors. Finally, once the claims are electronically organized, they are transmitted to the federal government.

The problem with this arrangement is that at every level there is potential vulnerability. There are over one million Medicare providers. There may be exceptions, but we can assume that every one of these providers is operating an information system. Consequently, if only one out of a million information systems becomes infected with ransomware, the whole system could be taken down.

This infection would then hitch a ride on the Medicare claims that are filed. They would travel up the system to the next level of claims processing, usually the giant claims clearinghouses. These also would become infected. Finally, the malware would be sent directly into the heart of the federal government’s claims processing system.

If this happened, the entire Medicare system could be held hostage in a massive, unprecedented ransomware attack. 

So ask yourself – out of the more than one million providers, what is the chance that at least one provider-operated computer will become infected?

The odds are good – for the extortionist – but this is not such great news for the rest of us.

Facebook
Twitter
LinkedIn

Edward M. Roche, PhD, JD

Edward Roche is the director of scientific intelligence for Barraclough NY, LLC. Mr. Roche is also a member of the California Bar. Prior to his career in health law, he served as the chief research officer of the Gartner Group, a leading ICT advisory firm. He was chief scientist of the Concours Group, both leading IT consulting and research organizations. Mr. Roche is a member of the RACmonitor editorial board as an investigative reporter and is a popular panelist on Monitor Mondays.

Related Stories

Leave a Reply

Please log in to your account to comment on this article.

Featured Webcasts

Enhancing Outcomes with CDI-Coding-Quality Collaboration in Acute Care Hospitals

Enhancing Outcomes with CDI-Coding-Quality Collaboration in Acute Care Hospitals

Join Angela Comfort, DBA, MBA, RHIA, CDIP, CCS, CCS-P, as she presents effective strategies to strengthen collaboration between CDI, coding, and quality departments in acute care hospitals. Angela will also share guidance on implementing cross-departmental meetings, using shared KPIs, and engaging leadership to foster a culture of collaboration. Attendees will gain actionable tools to optimize documentation accuracy, elevate quality metrics, and drive a unified approach to healthcare goals, ultimately enhancing both patient outcomes and organizational performance.

November 21, 2024
Comprehensive Inpatient Clinical Documentation Integrity: From Foundations to Advanced Strategies

Comprehensive Outpatient Clinical Documentation Integrity: From Foundations to Advanced Strategies

Optimize your outpatient clinical documentation and gain comprehensive knowledge from foundational practices to advanced technologies, ensuring improved patient care and organizational and financial success. This webcast bundle provides a holistic approach to outpatient CDI, empowering you to implement best practices from the ground up and leverage advanced strategies for superior results. You will gain actionable insights to improve documentation quality, patient care, compliance, and financial outcomes.

September 5, 2024
Advanced Outpatient Clinical Documentation Integrity: Mastering Complex Narratives and Compliance

Advanced Outpatient Clinical Documentation Integrity: Mastering Complex Narratives and Compliance

Enhancing outpatient clinical documentation is crucial for maintaining accuracy, compliance, and proper reimbursement in today’s complex healthcare environment. This webcast, presented by industry expert Angela Comfort, DBA, RHIA, CDIP, CCS, CCS-P, will provide you with actionable strategies to tackle complex challenges in outpatient documentation. You’ll learn how to craft detailed clinical narratives, utilize advanced EHR features, and implement accurate risk adjustment and HCC coding. The session also covers essential regulatory updates to keep your documentation practices compliant. Join us to gain the tools you need to improve documentation quality, support better patient care, and ensure financial integrity.

September 12, 2024

Trending News

Featured Webcasts

Patient Notifications and Rights: What You Need to Know

Patient Notifications and Rights: What You Need to Know

Dr. Ronald Hirsch provides critical details on the new Medicare Appeal Process for Status Changes for patients whose status changes during their hospital stay. He also delves into other scenarios of hospital patients receiving custodial care or medically unnecessary services where patient notifications may be needed along with the processes necessary to ensure compliance with state and federal guidance.

December 5, 2024
Navigating the No Surprises Act & Price Transparency: Essential Insights for Compliance

Navigating the No Surprises Act & Price Transparency: Essential Insights for Compliance

Healthcare organizations face complex regulatory requirements under the No Surprises Act and Price Transparency rules. These policies mandate extensive fee disclosures across settings, and confusion is widespread—many hospitals remain unaware they must post every contracted rate. Non-compliance could lead to costly penalties, financial loss, and legal risks.  Join David M. Glaser Esq. as he shows you how to navigate these regulations effectively.

November 19, 2024
Post Operative Pain Blocks: Guidelines, Documentation, and Billing to Protect Your Facility

Post Operative Pain Blocks: Guidelines, Documentation, and Billing to Protect Your Facility

Protect your facility from unwanted audits! Join Becky Jacobsen, BSN, RN, MBS, CCS-P, CPC, CPEDC, CBCS, CEMC, and take a deep dive into both the CMS and AMA guidelines for reporting post operative pain blocks. You’ll learn how to determine if the nerve block is separately codable with real life examples for better understanding. Becky will also cover how to evaluate whether documentation supports medical necessity, offer recommendations for stronger documentation practices, and provide guidance on educating providers about documentation requirements. She’ll include a discussion of appropriate modifier and diagnosis coding assignment so that you can be confident that your billing of post operative pain blocks is fully supported and compliant.

October 24, 2024
The OIG Update: Targets and Tools to Stay in Compliance

The OIG Update: Targets and Tools to Stay in Compliance

During this RACmonitor webcast Dr. Ronald Hirsch spotlights the areas of the OIG’s Work Plan and the findings of their most recent audits that impact utilization review, case management, and audit staff. He also provides his common-sense interpretation of the prevailing regulations related to those target issues. You’ll walk away better equipped with strategies to put in place immediately to reduce your risk of paybacks, increased scrutiny, and criminal penalties.

September 19, 2024

Trending News

Happy National Doctor’s Day! Learn how to get a complimentary webcast on ‘Decoding Social Admissions’ as a token of our heartfelt appreciation! Click here to learn more →