Malware sends operators back to manual communication Staff at New Zealand’s St John’s Ambulance service were forced to coordinate emergency call-outs using manual radio systems last week after computers systems were hit by a mystery ‘virus’.The disruption reportedly began on Wednesday when an unidentified piece of malware started affecting the systems used across the country for paging and radio communications with ambulances in the field, sending staff back to manual radio contact.By Friday morning, engineers at what is the country’s main ambulance service had finally managed to restore these systems without identifying how the malware got inside the organisation’s security controls.“Anti-virus software protected the systems but as a result of the virus it impacted on some of the system’s services, mainly those related to paging and radio. Back-up systems immediately took over when it was detected and the workload was managed manually,” said ambulance communications chief, Alan Goudge to a New Zealand news source. Exactly why some systems were downed while others survived is unclear but the fact that several centres were affected would suggest that the malware had the ability to spread within a network, which points to a worm component on one network segment.Unnamed sources are now blaming an infection introduced by way of a USB stick. If so this will be only the latest organisation to be embarrassed by what are often quite basic but fast-spreading pieces of malware. A month ago the Creech US Air Force in Nevada used to direct drone attacks against militants in Afghanistan was left red-faced by reports that non-critical computers had been hit by a worm. The malware turned out to be a simple keylogger for stealing gaming passwords and user names transferred on to the network from a portable storage device. In 2008, the NHS in the UK got its own warning on the potential for trouble with the news that three London hospitals had to be shut for a period after record and admissions systems were disrupted by malware. Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe