<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Pilbeam Engineering</title><link>https://www.pilbeams.net/</link><description>Recent content on Pilbeam Engineering</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Wed, 13 May 2026 18:00:00 -0500</lastBuildDate><atom:link href="https://www.pilbeams.net/index.xml" rel="self" type="application/rss+xml"/><item><title>Surviving Ransomware, Part 1</title><link>https://www.pilbeams.net/posts/surviving-ransomware---part-1/index/</link><pubDate>Wed, 13 May 2026 18:00:00 -0500</pubDate><guid>https://www.pilbeams.net/posts/surviving-ransomware---part-1/index/</guid><description>&lt;img src="https://www.pilbeams.net/posts/surviving-ransomware---part-1/index/dataspace.jpeg" alt="Featured image of post Surviving Ransomware, Part 1" /&gt;&lt;h2 id="the-story-as-of-2018"&gt;The Story as of 2018
&lt;/h2&gt;&lt;p&gt;The healthcare industry was, and largely still is, a magnet for cyber attack. Patients trust their doctor&amp;rsquo;s office, their psychiatrist, their parent&amp;rsquo;s nursing home, with some of the most sensitive data that exists about them. That trust is not always honored &amp;ndash; not always through malice, but sometimes through neglect, underfunding, or simple ignorance of the risk.&lt;/p&gt;
&lt;p&gt;Healthcare companies do not always do the utmost to protect it&amp;hellip;or if they do, it isn&amp;rsquo;t good enough. The following posts are my recollection of the events that occurred, my involvement with them, and the lessons learned.&lt;/p&gt;
&lt;h2 id="my-role"&gt;My Role
&lt;/h2&gt;&lt;p&gt;I worked as a Systems Engineer for a small 2-hospital system in Upstate New York at the time. Largely a traditional Cisco network / Windows server shop, with the challenges of small teams, small budgets, and no acceptable downtime.&lt;/p&gt;
&lt;p&gt;Annual risk assessments covered most risks we were aware of, but the spectre of non-compliant deployments would become a nightmare from which it took a long time to recover.&lt;/p&gt;
&lt;p&gt;In March, during one of our weekly technical meetings, the &amp;lsquo;Manager&amp;rsquo; provided a list of open ports on the hospital firewall, and what they went to. I glanced over it, looking mainly for any server related items. As I recall, a couple had already been flagged to be disabled.&lt;/p&gt;
&lt;p&gt;One of them, which I took no note of at the time, was port 3389, the Windows Remote Desktop port. It went to an IP I was unfamiliar with. Most of this was the purview of the Network Engineer, and I saw my participation as a way to see if we had disabled or shut down any servers that might still have ports open.&lt;/p&gt;
&lt;h2 id="the-attack"&gt;The Attack
&lt;/h2&gt;&lt;p&gt;My phone rang and buzzed a couple of times before I woke up enough to notice it. ~1 AM, March 18th, 2018 - the morning after St. Patrick&amp;rsquo;s day.&lt;/p&gt;
&lt;p&gt;The message - we&amp;rsquo;ve been attacked.&lt;/p&gt;
&lt;p&gt;Adrenaline pumping, I jumped out of bed, told my wife what had happened, and quickly dressed. A 15-minute drive in, I moved toward the datacenter &amp;ndash; my office was in there too, which I&amp;rsquo;d never loved, but that night I was glad for the short walk. One of our PC Technicians and our IT Director were there already, and I was briefed on what we knew so far.&lt;/p&gt;
&lt;p&gt;PCs throughout the organization were displaying text files on their desktop, one for every ransomed file as I recall. We did not know in the moment whether the attack was finished, ongoing, or if data was being exfiltrated. The Director asked our PC Technician if he would please disconnect our Internet uplink to try to mitigate further damage to the system.&lt;/p&gt;
&lt;p&gt;I immediately began a check on all of the server level systems, crafting a list of all physical and virtual machines, as our Systems Administrator who worked with me arrived. We tackled the list together, quickly assessing based on a visual check whether a server had been touched or not. I was thrilled to see that my recently built set of Microsoft Exchange servers had survived intact, and promptly shut them down in case processes were running inside our network that could corrupt them.&lt;/p&gt;
&lt;p&gt;When all was done and checked, almost all of our 200+ server instances were ransomed. Databases not working, web services down, file shares completely useless. Almost every PC was similarly affected.&lt;/p&gt;
&lt;p&gt;Incredibly, our MEDITECH Magic environment (a very old EMR that ran in a unique emulation mode on modern Windows OSes) was untouched. We shut it down as a safety precaution.&lt;/p&gt;
&lt;p&gt;Our Director reached out to our third-party cybersecurity vendor, who dispatched their response team. For the moment, having assessed the damage and saved what we could, we stopped. The servers we had built, patched, argued over budget for, and depended on every single day &amp;ndash; gone, or as good as. It had taken hours. It had taken us years.&lt;/p&gt;</description></item></channel></rss>