WASHINGTON – When unauthorized software found its way onto the network of a small Tennessee hospital, the culprits didn't ask for ransom. They didn't steal records.
What they did was silently harness computing power for a moneymaking task.
The task was to "mine" digital currency, and the culprits did it by yoking together a quiet army of infected computers to generate a stream of money.
It is a trend that coincides with the dizzying trajectory of many digital currencies, which skyrocketed in 2017, dipped early this year and recovered in the past several days.
Cybersecurity experts call it "cryptojacking" — hijacking computers to produce digital currency, like Bitcoin, Litecoin and Monero that have been in the news.
Infected networks or computers perform double duty, conducting normal functions (perhaps a bit more slowly) while also obeying remote commands to do calculations that generate digital currency for the criminals, or wrongdoers, who may be company insiders. As many as 24,000 patients of the Decatur County General Hospital in Parsons, Tenn., were notified in a Jan. 24 letter from the hospital that a server had been compromised, the HIPAA Journal reported.
"The unauthorized software was installed to generate digital currency, more commonly known as 'cryptocurrency,' "the hospital told patients, adding that it had no indication that intruders sought patient data like Social Security numbers or clinical and insurance information.
An Israeli firm, Radiflow, reported last week that a large European wastewater site had five of its servers infected by "cryptojacking" malware.