Ransomware
LabCorp Ransomware Attack β Sample Collection and Test Results Disrupted
Primary Source βIncident Details
On 14 July 2018, LabCorp β one of the world’s largest clinical laboratory networks, processing approximately 2.5 million patient specimens per week β suffered a SamSam ransomware attack that disrupted sample testing and data systems across its network. LabCorp detected the attack and immediately took offline various systems as a containment measure. The ransomware affected approximately 7,000 of LabCorp’s 60,000 computers. LabCorp disclosed the attack in an SEC 8-K filing on 16 July 2018. The company began restoring systems from backups over the following days, with most systems restored within a week. LabCorp stated patient test results and the integrity of patient data were not compromised. No ransom was paid. The attack disrupted test processing for physicians and healthcare providers who rely on LabCorp for routine and urgent clinical testing. LabCorp’s New York network was among the most heavily affected areas. The SamSam ransomware group was responsible for numerous other high-profile attacks including the City of Atlanta, Allscripts, and multiple hospitals. LabCorp had separately suffered a data breach in 2019 via the American Medical Collection Agency (AMCA) vendor breach, making it one of the few major healthcare companies to be simultaneously affected by both ransomware and third-party data breach incidents within a short time period.
Technical Details
- Initial Attack Vector
- Ransomware (SamSam variant) infected LabCorp's network; the attack vector was consistent with SamSam group's known techniques of exploiting exposed RDP endpoints or leveraging JBOSS server vulnerabilities to gain initial access and then deploy ransomware across the network
- Vendor / Product
- Laboratory Corporation of America Holdings (LabCorp) IT infrastructure
- Malware Family
- SamSam ransomware
Timeline
- 2018-07-14 Breach occurred
- 2018-07-16 Publicly disclosed