It’s been a tough month for Lurie Children’s Hospital in Chicago. Struck by an unexpected cyber attack, the hospital was forced to take its networks offline. Now, over a month later, the hospital’s officials have confirmed that the institution’s phone system and access to patients’ electronic medical records are back online.
Dealing with a malicious breach of this nature, was a challenging task. The crippling attack, which the officials blame on a “known criminal threat actor,” caused the hospital to suspend its systems for phone, email, and medical records. This marked the start of a difficult journey to reclaim control over their systems, while dealing with the looming possibility that it may have been a ransomware attack.
Ransomware attacks are among the predominant cybersecurity threats today. Cybercriminals execute these attacks by locking valuable data, files, or vital information, demanding a ransom for their release. Although the hospital didn’t confirm if this was a ransomware attack, it had all the typical signs. The FBI is probing into the matter further, highlighting the severity of the issue.

➜ Complex Environments are a Cyber Criminal’s Playground
Hospitals like Lurie Children’s, which treated about 260,000 patients last year, are attractive prey for such attackers due to their high dependence on technology.
The healthcare sector has found itself repeatedly in the crosshairs of cybercriminals due to the sensitive nature of the data it holds. The Lurie Children cyber attack incident is more than just a one-off anomaly—it is a symptom of systemic vulnerabilities that demand our immediate attention.
The Pervasive Nature of Vulnerabilities
Cybersecurity in healthcare is akin to safeguarding a fortress with millions of entry points. Electronic health records, patient billing, and staff communications are just the tip of the iceberg. The sheer volume and constant evolution of connected devices create a pervasive network of potential vulnerabilities. The attack on Lurie Children’s Hospital exposed this vulnerability, showcasing how intruders can exploit a single point of failure to cascade chaos throughout an entire institution.
Education as the Best Preventative Medicine
The path towards resilience involves more than just technological fortification—it demands a cultural shift. Hospitals must invest not only in the latest cybersecurity solutions but also in the education of their staff. Cyber hygiene must become as ingrained in hospital culture as the principles of medical care.
The Role of Regulatory Bodies
Regulatory bodies, such as the Health Insurance Portability and Accountability Act (HIPAA), have laid down guidelines and frameworks to protect patient information. However, the evolving landscape of cyber threats requires a nimble approach to compliance. The Lurie Children’s Hospital cyber attack serves as a clarion call for these entities to reassess and update their cybersecurity protocols continually.
➜ Impact of Lurie Children’s Hospital Cyber Attack Continues
Adjusting to this unexpected threat, the hospital has taken a cautious approach to restoring its systems. Their recovery process involves meticulous verification and testing of each system before bringing them back online. As the hospital stated, “As an academic medical center, our systems are highly complex and, as a result, the restoration process takes time.”
In fact, as of the recent update, MyChart, the portal that enables patients and parents to access medical records and correspond with healthcare providers, is still offline. For now, the focus is on fully restoring all systems and preventing such incidents in the future.
Certainly, the incident at Lurie Children’s Hospital is a stark reminder of the growing importance of cybersecurity in the healthcare sector and businesses alike. Private data is, unfortunately, becoming currency which reinforces how important it is to keep safe.
As we move further into the digital age, NOYNIM IT Solutions keeps on the forefront of cyber security threats in order to keep our clients safe. If you want to have a conversation about your cyber security posture, reach out to us today!
