Comprehensive Ransomware Detection for UK Public Healthcare

    Fast Facts

    • Healthcare remains highly targeted, with high operational risk and long recovery periods.

    • Payment trends are declining, driven by backup readiness and regulatory pressure.

    • NHS-specific strategies now emphasize detection, resilience, and lawful response pathways.

    • Public UK-specific data remains limited; high-profile cases like the Synnovis breach highlight the stakes.

    Ujwal Thapa

    Ujwal Thapa

    Security Researcher

     

    Overview

    Over time, ransomware groups have steadily increased both the scale and sophistication of their operations, targeting industries that have a direct impact on people’s daily lives, such as healthcare, education, logistics, and public services. What began as opportunistic attacks has evolved into a systematic campaign of disruption and extortion, often aimed at critical sectors where downtime can cause real-world harm. The chart below illustrates this trend clearly: each year, the number of ransomware victims continues to climb, with 2025 already surpassing previous years in cumulative incidents.

    image-1

    source: ransomware.live

     

    Ransomware groups have been increasingly targeting critical sectors such as manufacturing, technology, healthcare, business services, and financial institutions, with these five industries emerging as the most frequently attacked in 2025.

    image-3

    source: ransomware.live

    In this blog, we will focus on ransomware activity against the healthcare sector, with particular emphasis on incidents within the United Kingdom. In recent years, hospitals and clinics across the UK have faced a surge in ransomware incidents, a 40% increase in early 2025 compared to the same period in 2024. NHS-affiliated organisations have suffered sharp rises in disruptions due to ransomware, with threat actors often demanding ransoms exceeding £450,000 on average. Healthcare remains one of the most vulnerable domains due to its reliance on interconnected systems, legacy infrastructure, and the life-critical nature of its operations, which leave little tolerance for downtime. Ransomware groups relentlessly target the healthcare sector because they understand how high the stakes are, said Gunter Ollmann, CTO at Cobalt. “Hospitals operate under immense pressure, and even brief disruptions can endanger patients’ lives. That urgency often compels healthcare organizations to pay quickly, making them prime targets for attackers. These aren’t just crimes of opportunity; they’re a stark preview of how cyber warfare could impact critical infrastructure. As of this writing, a total of 6,549 ransomware victims have been recorded globally in 2025, with 438 belonging to the healthcare industry alone. This staggering figure underscores the growing risk to hospitals, clinics, and medical suppliers across both public and private healthcare systems.
    Historically, several ransomware groups, including LockBit3, Incransom, Qilin, and Safepay, have gained notoriety for consistently targeting healthcare organizations. Between 2020 and 2025, a total of 13 healthcare victims in the United Kingdom were identified, impacted by eight distinct ransomware groups such as Qilin, Everest, Incransom, Ransomhouse, Dragonforce, LockBit2, LockBit3, Revil, and Maze. Among these ransomware groups, Qilin and Incransom rank among the top 10 most active ransomware groups, frequently directing their attacks toward the healthcare industry.

    Timeline of Ransomware Attacks on the UK Healthcare Sectors (2020-2025)

    In 2020, Revil attacked Transform Hospital Group Ltd, a UK cosmetic surgery provider, disrupting clinical operations and exposing sensitive patient data, while Maze targeted Hammersmith Medicines Research, a medical trials company, interrupting ongoing research activities and leaking confidential trial data.

    In 2021, LockBit2 breached Day Lewis Pharmacy, one of the UK’s largest pharmacy chains, affecting prescription management systems and compromising internal business records.

    In 2023, NoEscape targeted St Raphael’s Hospice, a charitable care facility, disrupting palliative care services and exposing sensitive patient and staff data.

    In 2024, Incransom launched coordinated attacks on NHS Scotland and Helapet Ltd, disrupting healthcare delivery and the supply of medical consumables. Everest breached Aspen Healthcare, affecting private hospital operations and patient scheduling systems. Ransomhouse hit Royal Star & Garter, a veteran care organization, compromising personal and operational data. Dragonforce attacked Team Locum, a healthcare staffing agency, disrupting workforce placement services. LockBit3 targeted Manchester Fertility and London Vision Clinic, exposing sensitive fertility and vision-care data.

    In 2025, Qilin attacked London Women’s Clinic, a fertility and women’s health center, disrupting appointment systems and patient confidentiality. NRS Healthcare was listed as a victim of a Ransomhub ransomware group, impacting operations related to health and mobility equipment supply.

    Ransomware Groups Targeting Healthcare

    Multiple ransomware-as-a-service (RaaS) operations have targeted healthcare organizations.
    Ransomware attacks on healthcare organizations are not just IT security events—they are public health emergencies. These intrusions can lead to delayed diagnostics, disrupted treatments, and real-world harm to patients.

    According to Infosecurity Magazine, in June 2024, London hospitals experienced a devastating ransomware attack linked to the Qilin group, which forced the cancellation of over 1,500 operations and appointments, including organ transplants and cancer surgeries across multiple NHS Trusts. The attack disabled Synnovis systems, a key diagnostics partner for several NHS Trusts, forcing clinicians to delay urgent procedures. According to officials, the incident contributed to at least one patient death due to delays in receiving critical blood test results. Additionally, Halcyon states that the harm wasn’t only operational. Qilin also leaked personal and clinical data of over 900,000 individuals, including NHS numbers, contact details, and test results tied to STIs and cancer diagnoses. To date, many affected patients have not received full disclosure on the nature of the breach or what data was compromised.

    Globally, such attacks continue to threaten lives and compromise care delivery. A report by VOA News in early 2025 outlined ransomware incidents involving death threats to staff, endangered patients, and tens of millions of dollars in damages to hospital systems. The convergence of cybercrime and patient safety has made ransomware one of the most dangerous threats to public health in the digital age.

    Understanding the tactics, techniques, and procedures (TTPs) used by these actors is no longer optional it's essential for healthcare systems seeking to defend both infrastructure and patient lives.

    Common Attack Patterns

    Analysis of major ransomware families reveals consistent patterns across the attack lifecycle. Nearly all major groups employ vulnerability scanning during reconnaissance, use both phishing and vulnerability exploitation for initial access, and leverage native Windows tools for execution and lateral movement.

    The most commonly observed techniques include:

    Initial Access: Exploitation of public-facing applications (particularly VPN and remote access solutions) and spearphishing attachments remain the primary entry vectors. Unpatched vulnerabilities in systems like Microsoft Exchange, Fortinet VPNs, and Citrix gateways continue to provide easy access.

    Execution: Command interpreters, particularly Windows Command Shell and PowerShell, are universally utilized. Adversaries leverage native APIs and Windows Management Instrumentation (WMI) to execute payloads while blending with legitimate administrative activity.

    Defense Evasion: Registry modification to disable security tools, clearing Windows event logs, and using obfuscated or packed payloads help attackers avoid detection. Disabling Windows Defender and other endpoint protection is nearly universal.

    Credential Access: LSASS memory dumping to extract credentials enables lateral movement and persistence. Tools like Mimikatz, ProcDump, and custom variants are consistently employed.

    Discovery: Extensive reconnaissance using built-in Windows utilities (net.exe, nltest, systeminfo) maps the environment before final payload deployment.

    Lateral Movement: Network share discovery and access via SMB, along with Remote Desktop Protocol abuse, facilitate movement to high-value targets.

    Impact: Shadow copy deletion, backup removal, and service stopping prepare systems for encryption. The final ransomware payload typically uses strong encryption algorithms (AES, RSA, ChaCha20) to lock files.

    Logpoint Detection Coverage by Threat Actor

    Looking at historical patterns and recent trends, ransomware groups are expected to intensify their focus on the healthcare sector in the coming years. Given the sector’s critical role and dependence on continuous operations, organizations must remain vigilant and proactively identify early indicators of compromise. In this section, we’ll dive deeper into the Tactics, Techniques, and Procedures (TTPs) commonly used by ransomware groups targeting healthcare, and explore how these can be effectively detected using Logpoint SIEM.

    Therefore, early detection and behavioral visibility are essential. In the following sections of this blog, we will outline how these malicious activities can be detected using Logpoint SIEM along with hunting queries. These detections are designed to help analysts identify early indicators of compromise, spot adversary behavior in progress, and accelerate incident triage with actionable insights.

     

    Required log sources:

    To follow up on the threat hunting and detection approach below, the following log sources must be configured.

    1. Windows

    2. Windows Sysmon

    Microsoft provides extensive logging across its services. Organizations must actively enable and configure the appropriate logging to achieve operational visibility. Organizations can use the Logpoint Windows Logs Configuration guide to choose which event logs to enable and collect based on specific detection needs.

    1. IDS/IPS

    2. Firewall

    All alert rules are included in Logpoint’s latest release, as well as the Logpoint Help Center. Please ensure you have installed the latest Alert Rules version.

     

    Key Threat Groups Targeting UK Healthcare

    The following ransomware groups have either directly impacted UK healthcare organizations or exhibited TTPs that closely mirror attacks on the sector. Each group brings a distinct blend of techniques from phishing and RDP brute-forcing to advanced credential theft and data exfiltration. By examining their methods, UK defenders can better prioritize detection and response using the mapped Logpoint alert rules.

    QILIN

    Qilin (also called Agenda) is a cross-platform Golang/Rust ransomware-as-a-service (RaaS) group active since 2022, known for double extortion, encrypting files, and exfiltrating data for leverage. It has aggressively targeted healthcare. In June 2024, Qilin affiliates hit Synnovis, a UK pathology services provider for multiple London NHS hospitals, demanding a $50 million ransom to withhold ~400 GB of patient data. The attack severely disrupted blood testing and patient care; NHS officials later revealed it contributed to a patient’s death due to delayed lab results. Qilin leaked sensitive data of ~900,000 patients (e.g., STI and cancer test results with personal identifiers) when the ransom wasn’t paid. The U.S. HHS warned in 2024 that Qilin targets the health sector worldwide, noting its role in the UK Synnovis attack that caused canceled surgeries and organ transplants in London.

    Common initial access vectors include phishing emails, exploiting exposed VPN/RDP/Citrix gateways, and even infostealer-derived credentials. After ingress, affiliates use tools like Cobalt Strike beacons for persistence, then move laterally with remote monitoring and management (RMM) tools, PsExec/SMB, or SSH to spread the payload. In one documented variant (“Qilin.B”), the malware attempts to evade defenses by terminating security processes, clearing Windows event logs, and deleting Volume Shadow Copies to inhibit backups. Qilin ransomware can also disable services and even load vulnerable drivers to bypass endpoint protections. Its encryption uses robust ciphers (ChaCha20, AES, RSA-4096) and can be tuned for speed or thoroughness by affiliates.
    Once inside, Qilin typically performs credential harvesting, dumping LSASS memory, or accessing saved credentials to expand its foothold. They conduct network discovery and privilege escalation using built-in Windows tools, and laterally move via PsExec or RMM platforms. Before deploying ransomware, they often disable event logging, tamper with PowerShell logs, and delete shadow copies to inhibit recovery. Data encryption and exfiltration follow shortly after.

    Logpoint Alert Rules for Qilin Ransomware

    MITRE Tactic

    Detection Rule

    Description

    Lateral Movement

    RDP Login from Localhost Detected

    Flags suspicious remote desktop sessions, often abused by Qilin post-VPN compromise

    Possible Inbound Spamming Detected

    Captures possible phishing delivery infrastructure when deployed internally

    Credential Access

    LSASS Memory Dump Detected

    Detects credential theft via memory scraping

     

    LSASS Access from Non System Account Detected

    Flags unauthorized access to sensitive credential stores

    Discovery

    System Network Connections Discovery

    Aligns with Qilin's lateral mapping activity

     

    Reconnaissance using Windows Binaries Detected

    Detects LOLBins (living-off-the-land binaries) used for internal scanning

    Defense Evasion

    Eventlog Cleared Detected

    Triggers on actions like wevtutil used to wipe forensic logs

    Clearing of PowerShell Logs Detected

    Monitors attempts to suppress audit trails of malicious script execution

    Impact

    Shadow Copy Deletion Using OS Utilities Detected

    Captures use of vssadmin or wmic to prevent recovery

    High Volume of File Modification or Deletion in a Short Span

    Detects when 30 file modifications or deletions occur within 1 minute. A large number of file changes indicates ransomware activity.

     

    Everest Group

    Everest is a Russian-speaking ransomware and extortion group active since 2020, known for data theft and for selling network access (it functions partly as an initial access broker). The group specifically threatens the healthcare sector: in 2024, the U.S. HHS warned that Everest was “increasingly targeting” health care, often by stealing credentials and using common remote access tools to infiltrate networks. While no major NHS breaches are public, U.S. authorities note Everest has increasingly targeted healthcare globally (at least 20 healthcare victims by mid-2024). The gang typically gains initial access by stealing or purchasing valid credentials (acting as an initial access broker), then uses tools like ProcDump (against the LSASS process) to grab user passwords and Cobalt Strike beacons to expand their foothold. They exfiltrate sensitive data (e.g., patient records) for leverage and can deploy ransomware to encrypt systems, often deleting backups to hinder recovery.

    Logpoint Alert Rules for Everest Group

    MITRE Tactic

    Logpoint Alerts

    Description

    Initial Access

    RDP Login from Localhost Detected

    Identifies suspicious remote desktop activity from internal sources

    Credential Access

    LSASS Access from Non System Account Detected

    Detects unauthorized credential dumping attempts

     

    Password Dumper Activity on LSASS

    Identifies known credential theft tool behaviors

    Persistence

    Suspicious Admin Account Creation Detected

    Flags the creation of unauthorized administrative accounts

    Impact

    1. Shadow Copy Deletion Using OS Utilities Detected

    2. High Volume of File Modification or Deletion in Short Span

    Identifies attempts to prevent system recovery

     

    INC Ransom (Incransom)

    INC Ransom has grown bolder in 2024 and 2025, with signs that they’re actively probing the UK’s public health systems. They use brute-force techniques to crack passwords and move laterally across systems using tools like PsExec. Once inside, they often upload data to cloud storage services before encrypting anything.

    INC Ransom, a Russian ransomware group – struck UK healthcare in late 2024, hitting Alder Hey Children’s and Liverpool Heart & Chest NHS trusts and leaking patient data. According to Trend Micro, this group favors known vulnerabilities and phishing for initial access (for example, exploiting a Citrix ADC VPN flaw CVE-2023-3519). Once inside, they harvest credentials (using tools like Mimikatz or dumping backup passwords) and move laterally via PsExec, RDP or even remote tools like AnyDesk and TightVNC. INC Ransom is known to disable antivirus services and delete Volume Shadow Copies to impede system recovery. Finally, they deploy their AES-based ransomware (often in a “fast encryption” mode) to lock files.

     

    Logpoint Alerts for INC Ransom 

    MITRE Tactic

    Logpoint Alerts

    Description

    Credential Access

    Password Spraying Attack Detected

    Identifies brute force attempts across multiple accounts

    Defense Evasion

    Windows Defender Antivirus Disable Detected

    Flags attempts to disable endpoint protection

    Exfiltration

    Exfiltration over Cloud Application Detected

    Detects data transfer to cloud storage services (Mega, Dropbox)

    Impact

    Shadow Copy Deletion Using OS Utilities Detected

    Identifies backup destruction before encryption

     

    RansomHouse

    RansomHouse is a relatively new (first noted in 2022) cybercrime group that often forgoes traditional encryption in favor of straight data theft and extortion. They have attacked hospitals and health services abroad, for example, the cyberattack on Hospital Clinic de Barcelona in 2023 was attributed to RansomHouse. RansomHouse typically breaches targets by leveraging weak or leaked credentials: in many cases, they access networks via exposed Remote Desktop/Server gateways using compromised logins. Once in, they focus on credential access and persistence. Investigations reveal heavy use of Mimikatz (to dump passwords from memory) and built-in tools like PowerShell for downloading additional malware and utilities. RansomHouse operators will disable security software (e.g., turning off Windows Defender’s real-time protection) to avoid detection, then proceed to broaden their access – installing remote management tools (like TeamViewer or other RATs) and scanning the network (they commonly run Advanced IP Scanner for mapping the environment). Instead of encrypting everything, they concentrate on stealing large volumes of data: they often compress archives of data with tools such as 7-Zip (sometimes hiding them in innocuous directories like “Pictures” or “Documents”) before exfiltration. Because RansomHouse might not trigger a “file encryption” alert, defenders must rely on catching those earlier steps. Logpoint alert rules that detect unusual administrative logins, LSASS/Mimikatz usage, or atypical bulk file transfers can provide early warning to stop RansomHouse before sensitive NHS data is stolen.

     

    Logpoint Alert Rules for RansomHouse 

    MITRE Tactic

    Logpoint Alerts

    Description

    Credential Access

    Mimikatz Command Line Detected

    Identifies the execution of credential theft tools

     

    LSASS Access from Non System Account Detected

    Flags unauthorized memory access for credential extraction

    Discovery

    Reconnaissance using Windows Binaries Detected

    Detects network and system enumeration activities

    Impact

    Shadow Copy Deletion Using OS Utilities Detected

    Captures backup deletion before ransomware deployment

    Exfiltration

    RClone Utility Execution

    Detects use of cloud synchronization tools for data theft

     

    DragonForce

    DragonForce started as a hacktivist collective (notably DragonForce Malaysia, known for pro-Palestine campaigns) but has recently transformed into a hybrid ransomware cartel blending political and financial motives. By 2025, DragonForce had launched multi-extortion attacks on various sectors, from government agencies to commercial retailers, and is noted for targeting law firms and medical organizations as well. This group uses a mix of methods to infiltrate victims. Frequently, they send phishing emails carrying malware or exploit unpatched vulnerabilities (such as the Log4j “Log4Shell” flaw) to get an initial foothold. In other cases, they’ve leveraged stolen credentials to brute-force RDP or abuse VPN access points, similar to other ransomware actors. Once inside a network, DragonForce deploys a suite of offensive tools: Cobalt Strike beacons for command-and-control, Mimikatz to steal passwords, and scanning tools like Advanced IP Scanner or PingCastle to map out the Active Directory environment. They also install backdoors or use remote admin software to ensure persistence. DragonForce’s operations are characterized by a “triple threat” approach; they encrypt data, steal and leak sensitive information, and have even used DDoS attacks or website defacements to pressure victims. For NHS defenders, this means not only watching for classic ransomware signs (e.g., LSASS Dump Detected, spikes in file encryption activity, Shadow Copy removal) but also keeping an eye on service availability and external communications. Unusual outbound traffic or sudden service disruptions could indicate DragonForce’s involvement, and early alerts (for instance, detecting a mass account compromise or malicious PowerShell usage) are crucial to mitigate the impact on healthcare services.

     

    Logpoint Alert Rules for DragonForce 

    MITRE Tactic

    Logpoint Alerts

    Description

    Privilege Escalation

    Password Dumper Activity on LSASS

    Identifies credential theft for privilege escalation

    Credential Access

    LSASS Memory Dump Detected

    Detects memory scraping for credential extraction

    Impact

    1. High Volume of File Modification or Deletion in a Short Span

    2. Shadow Copy Deletion Using OS Utilities Detected

    3. Eventlog Cleared Detected

    1. Flags mass encryption activity

    2. Identifies recovery prevention techniques

    3. Detects forensic evidence destruction

     

    Maze

    Maze was a pioneer of “double extortion” ransomware, first observed in 2019. The group not only encrypted files but also exfiltrated sensitive data, threatening to publish it, a tactic that many others (including REvil and LockBit) later adopted. Maze actors typically gained access through methods like malicious email attachments, exposed RDP servers, or exploit kits dropping malware (sometimes using the IcedID trojan as a foothold). After infiltration, they would perform internal reconnaissance and escalate privileges, often deploying tools such as Cobalt Strike and even Metasploit frameworks for lateral movement and credential harvesting. Maze was known to use PowerShell scripts for data theft (copying data to an attacker-controlled FTP server) before encryption. Like most ransomware, Maze also took steps to evade recovery; for instance, it would delete system Shadow Copies (Windows backup snapshots) so that files couldn’t be easily restored. It even logged a Windows event (ID 1102/104) by clearing logs, which a Logpoint alert rule like Eventlog Cleared Detected would flag. Although Maze disbanded by late 2020, its impact – including attacks on healthcare organizations internationally- demonstrated the need for comprehensive monitoring (phishing detection, abnormal admin tool use, backup deletion events, etc.) in NHS networks.

     

    Logpoint Alert Rules for Maze Ransomware

    MITRE Tactic

    Logpoint Alerts

    Description

    Credential Access

    LSASS Access from Non System Account Detected

    Flags unauthorized credential access

    Defense Evasion

    Eventlog Cleared Detected

    Detects attempts to remove forensic evidence

    Impact

    1. Auditd High Volume of File Modification or Deletion in Short Span

    2. High Volume of File Modification or Deletion in Short Span

    Detects when 30 file modifications or deletions occur within 1 minute. A large number of file changes indicates ransomware activity.

     

    Shadow Copy Deletion Using OS Utilities Detected

    Captures recovery prevention activities

     

    LockBit 2.0

    LockBit 2.0 – which emerged in mid-2021 – became one of the most prolific ransomware threats worldwide. Affiliates using LockBit have attacked organizations across critical sectors, including financial services, government, and healthcare. Common initial access vectors include stolen remote desktop credentials or unpatched vulnerabilities in VPN and server software. Once in, LockBit operators often use credential-stealing tools (e.g., dumping Windows credentials from memory via Mimikatz) and built-in admin utilities for lateral movement, such as RDP or SMB/PsExec. They typically execute scripts to disable security features, clear Windows event logs, and delete system shadow copies before commencing the file encryption spree – behavior that Logpoint’s Eventlog Cleared Detected and Shadow Copy monitoring rules are designed to catch Notably, LockBit was suspected in the 2022 attack on an NHS IT supplier that disrupted NHS 111 services, underscoring the need for alerts on unusual admin activity and high file modification volumes.

     

    LockBit 3.0 (aka “LockBit Black”) debuted in 2022 with even more advanced extortion tactics, introducing cryptocurrency options (like Zcash) and even a criminal “bug bounty” program to improve its malware. This variant was confirmed to be behind the August 2022 ransomware attack on Advanced, a software provider for NHS 111, where hackers exploited a single-factor login to open an RDP session and deploy LockBit malware. Like its predecessor, LockBit 3.0 affiliates use a variety of techniques for entry (phishing, exploiting known bugs, or using leaked passwords) and then employ tools to steal credentials (dumping LSASS memory, running Mimikatz) and spread across the network. They aggressively impair defenses, for example, stopping antivirus services, wiping event logs, and deleting backups – before encrypting files on a large scale. Logpoint’s detection content can help spot these steps (e.g., alerts for cleared logs, disabled security services, Shadow Copy Deletion, and spikes in file modifications) so that NHS security teams can intervene before encryption causes widespread downtime.

     

    Logpoint Alert Rules for LockBit Ransomware 

    MITRE Tactic

    Logpoint Alerts

    Description

    Initial Access

    Possible Inbound Spamming Detected

    Identifies phishing campaigns and malicious email delivery

    Credential Access

    LSASS Memory Dump Detected

    Detects credential extraction techniques

    Lateral Movement

    RDP Connection from Domain Controller

    Flags suspicious remote desktop activity from critical systems

    Impact

    Shadow Copy Deletion Using OS Utilities Detected

    Identifies backup destruction

    1. Auditd High Volume of File Modification or Deletion in Short Span

    2. High Volume of File Modification or Deletion in Short Span

    Detects when 30 file modifications or deletions occur within 1 minute. A large number of file changes indicates ransomware activity.

     

    REvil (Sodinokibi)

    REvil (aka Sodinokibi) was one of the most notorious ransomware gangs globally until 2021, known for massive breaches like the Kaseya software supply-chain attack. In the UK, REvil’s tactics hit home when they targeted a cosmetic surgery chain (“The Hospital Group”) in 2020, stealing 900GB of patient photos and data for extortion. REvil typically infiltrated networks via phishing emails or by exploiting server vulnerabilities, and in some cases by abusing trusted remote access tools. Once inside, they would secure higher privileges by dumping credentials from memory. Unit 42 analysts observed REvil using Mimikatz and the ProcDump tool to copy the LSASS process and extract account passwords. The group was also adept at network reconnaissance (using utilities like Advanced IP Scanner and BloodHound) and lateral movement using RDP with stolen credentials or deploying Cobalt Strike beacons. Before launching file encryption, REvil operators commonly cleared Windows event logs and deleted Volume Shadow Copies to frustrate incident responders. These steps closely align with Logpoint’s alerts (for example, detecting an LSASS Dump attempt or an Eventlog Cleared event), which are critical for catching REvil’s activity in its early stages. REvil’s double-extortion playbook – encrypting data and leaking stolen files highlights why UK healthcare organizations must monitor both system behaviors and outbound data flows.

     

    Logpoint Alert Rules for REvil (Sodinokibi)

    MITRE Tactic

    Logpoint Alerts

    Description

    Persistence

    Scheduled Task Creation Detected

     

    Detects the creation of scheduled tasks for maintaining access

    Credential Access

    LSASS Memory Dump

    Detects credential theft via memory dumping

    Defense Evasion

    Suspicious Windows Defender Registry Keys Modification

    Identifies attempts to disable security tools, like disabling Windows Defender functionalities using the registry.

    Process Hollowing Detected

    Identifies code injection into legitimate processes

    Impact

    Shadow Copy Deletion Using OS Utilities Detected

    Captures backup destruction

     

    Logpoint's Extensive Ransomware Research and Resources

    Understanding ransomware threats requires continuous research and analysis of emerging attack patterns. Logpoint has published extensive research on numerous ransomware families and malware strains, providing detailed technical analysis, TTPs mapping, and actionable detection strategies.

    Comprehensive Ransomware Coverage

    Our security research team has produced in-depth analyses covering a wide range of ransomware operations and related threats, which are mentioned below.

    Ransomware-as-a-Service (RaaS) Operations
    Historical and Wiper Ransomware
    Vulnerability Exploitation Leading to Ransomware
    Initial Access and Delivery Mechanisms
    Defense Evasion Techniques

    These resources provide security teams with detailed technical intelligence, MITRE ATT&CK mappings, indicators of compromise (IOCs), and ready-to-deploy alert rules for Logpoint Customer. Each blog post includes practical detection strategies that can be immediately implemented in Logpoint deployments to strengthen defenses against specific threats.

    Implementation Best Practices for UK Healthcare

    Deploying Logpoint detection capabilities in the NHS and UK healthcare requires a context-aware approach based on operational realities.

    1. Focus on Critical Systems

    Prioritize monitoring of EPRs, imaging systems (e.g., PACS), pharmacy platforms, and emergency infrastructure. Apply the most critical alert rules to these assets to maximize early warning capabilities.

    2. Understand Normal Operations

    Healthcare runs 24/7 with on-call access and emergency overrides. Establish environment-specific behavioral baselines for:

    • Domain admin logins during night shifts

    • Use of remote access tools by authorized clinicians

    • Medical device access patterns

    This reduces false positives while retaining sensitivity to anomalous behavior

    Data Privacy Considerations

    Ensure SIEM, EDR, NDR, and UEBA solutions implement data minimization and pseudonymization of PII.

     

    Retain only the metadata needed for detection, and follow ICO and NHS data retention guidance when storing or exporting logs.

    3. Implement Layered Detection

    A single log source rarely tells the full story. Combine multiple perspectives for a defense-in-depth approach:

    • Network Monitoring:
      Detect lateral movement (e.g., SMB, RDP) and large outbound transfers (e.g., cloud exfiltration tools).

    • Endpoint Detection:
      Catch local behaviors like LSASS dumping, shadow copy deletion, or suspicious PowerShell execution.

    • Log Analysis:
      Identify attack chain progression—event log clearing, privilege escalation, or unauthorized scheduled tasks.

    • User & Entity Behavior Analytics (UEBA):
      Spot outliers like weekend data access by HR accounts or repeated login attempts from unusual devices.

    4. Tune for Healthcare Use Cases

    Adjust thresholds and filters to match real-world needs: allow trusted remote access tools used by IT and vendors, suppress alerts during maintenance windows, and monitor high-risk departments.

    5. Pair Detection with Response

    Detection is only useful when paired with a timely, structured response. Here are a few recommendations for early detection and response.

    • Define clear escalation workflows from SOC to IT ops and clinical management.

    • Develop pre-approved ransomware playbooks for response containment and communication.

    • Run regular tabletop exercises simulating attacks on EPRs or diagnostic systems.

    • Establish cross-functional communication channels to involve clinicians early without disrupting care.

    6. Fix Common Weak Spots

    • Patch Management:
      Prioritize updates for exposed systems (Citrix ADC, RDP, VPNs, web servers, medical devices)

    • Network Segmentation:
      Separate patient care systems from corporate IT and third-party vendors. Enforce least-privilege networking.

    • Access Control:
      Deploy MFA for all privileged and remote access. Use JIT (Just-in-Time) access and enforce least-privilege policies.

    • Backup Strategy:
      Maintain immutable, offline backups. Validate restoration workflows regularly. Monitor for ransomware attempts to encrypt or disable backup services.

    7. Conduct Security Awareness Training Regularly

    Social engineering remains one of the most common entry points for ransomware attacks, particularly in healthcare, where staff face immense pressure and handle high volumes of email communication. As noted by CISA, Continuous user education and simulated phishing exercises significantly reduce the risk of user-initiated compromise.

    • Train Staff Continuously: Focus on phishing, smishing, pretexting, and handling suspicious emails.

    • Run Role-Based Simulations: Use phishing simulations tailored to clinical, administrative, and IT roles to identify at-risk staff.

    • Reinforce Reporting Paths: Ensure all employees can report suspected attacks easily, e.g., via Outlook plugin or NHS internal reporting channels.

    • Response Procedures: Train users on disconnecting from the network and notifying IT/SOC in suspected incidents.

    Conclusion

    The threat landscape facing healthcare continues to evolve, with ransomware groups becoming increasingly sophisticated and brazen. However, by implementing comprehensive detection capabilities mapped to known adversary techniques, healthcare organizations can significantly improve their security posture.

    The Logpoint OOTB alert rules provided in this guide offer coverage across the complete attack lifecycle, from initial compromise through final impact. When combined with security best practices, staff training, and robust incident response capabilities, these detections form a critical component of healthcare cybersecurity defense.

    Protection of patient data and continuity of care depend on proactive security measures. By understanding adversary TTPs and deploying targeted detection capabilities, UK healthcare organizations can better defend against the ransomware threat and fulfill their duty of care to patients.