{"id":1389,"date":"2020-09-28T11:12:02","date_gmt":"2020-09-28T09:12:02","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1389"},"modified":"2021-05-27T11:36:34","modified_gmt":"2021-05-27T09:36:34","slug":"hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/","title":{"rendered":"Hacker attack on D\u00fcsseldorf University Hospital \u2013 cyber criminals got in through the VPN interface"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1390 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png\" alt=\"SAST Blog: Hacker attack on D\u00fcsseldorf University Hospital \u2013 cyber criminals got in through the VPN interface\" width=\"300\" height=\"206\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD.png 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>In September 2020, the attack made headlines:<\/p>\n<ul>\n<li>Hackers responsible for IT disruption at D\u00fcsseldorf University Hospital.<\/li>\n<li>Hackers under investigation: Woman dead after attack on University Hospital.<\/li>\n<li>Hacker attack on D\u00fcsseldorf University Hospital: Investigation into involuntary homicide opened.<\/li>\n<\/ul>\n<p>A hacker attack can be fatal. Data, goods and assets aren\u2019t the only things to consider: Human lives are at stake where public spaces, in particular public health, is concerned.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>After the fact and while the case is being worked, calls for digital \u201csafe rooms\u201d are increasing. Hospitals and clinics are assets \u2013 critical infrastructure \u2013 requiring particular protection (KRITIS). This means software must be up to date and IT staff must be specialized to be able provide this higher level of IT security.<\/p>\n<h2><strong>What happened at D\u00fcsseldorf University Hospital<\/strong><\/h2>\n<p>The IT outage at D\u00fcsseldorf University Hospital has been proven to be the result of a hacker attack. The perpetrators left a ransom note on a D\u00fcsseldorf Heinrich-Heine University server. In the note, the criminals demanded that the university make contact \u2013allegedly, no ransom money was demanded.<\/p>\n<p>The University Hospital was unable to function for days: Contingency planning was unable to be put into practice, meaning emergency and rescue services could no longer use the hospital. And the most fatal consequence of this was that one patient with an emergency could not be brought in. Instead, she was taken to the hospital in Wuppertal, much further away. There, she died because she was unable to be treated sooner. The German public prosecutor has opened an investigation against any hacker or hackers involved.<\/p>\n<h2><strong>The perpetrators took advantage of a vulnerability in the Citrix VPN software for which a solution had actually already been made available.<\/strong><\/h2>\n<p>D\u00fcsseldorf University Hospital detected the security issues in that application in December 2019 and did take it seriously. The security patch provided was imported on the same day it became available. The university hospital thus believed there to be no indication of a threat. But hackers had already gained access long before the loophole was closed.<\/p>\n<p>BSI President Arne Sch\u00f6nbohm published a statement about this. \u201cWe warned about this vulnerability back in January and provided information about the consequences of such an exploit. Attackers gain unauthorized access to internal networks and systems, and may wait several months before crippling them. Yet again, this incident demonstrates just how seriously this threat must be taken.\u201d<\/p>\n<p><strong>This is why the German Federal Office for Information Security (BSI) has made an urgent call for organizations to import the Citrix updates that have been available since January 2020, as these will close the loophole. However, cyber criminals can still access any internal networks and IT systems which were compromised before installation of the Citrix updates!<\/strong><\/p>\n<h2><strong>What solutions are available to improve your IT system security against a hacker attack like this?<\/strong><\/h2>\n<p>Every time hacker attacks like this become public, the question arises as to how well the IT systems were secured, whether personal data was affected and whether there was unauthorized access to personal data. Where the highly sensitive data in patient records is concerned, it is truly the worst case scenario. For this reason, the German Federal Minister of Health decided on Sep. 18, 2020, to free up an additional EUR 3 billion for improving and protecting their IT systems against cybercrime. And it is crucial to take immediate action here because even just one unsecured interface can be used in a cyberattack to gain access to the sensitive data found in SAP systems.<\/p>\n<p>We consider it the duty of those charge of IT departments to learn what can be learned from yet another incident and to regularly review the existing measures protecting IT and SAP landscapes. The BSI agrees: It advises validating network infrastructures and IT systems again right now to check for anomalies and take appropriate protective measures. In addition, it also suggests involving an external provider specialized in IT security, as needed.<\/p>\n<p>Our recommendation, in turn, is that the sooner you start with an end-to-end strategy, the better a position you will be in to protect your systems against internal and external threats. As a rule, every system is vulnerable. With the right threat-intelligence solution, you make your company a more difficult, more time-consuming and therefore less attractive target. Because attackers are always seeking to perfect their tactics, internal security systems must always be up to date, allowing you to react to threats as they arise in real time. All too often, both internal resources and the required, highly specialized security expertise are lacking.<\/p>\n<h2><strong>Success in three steps:<\/strong><\/h2>\n<ol>\n<li>Begin by analyzing your vulnerabilities.<\/li>\n<li>Next, close loopholes by priority.<\/li>\n<li>Finally, prevent no new vulnerabilities from arising.<\/li>\n<\/ol>\n<p>This may appear complex. But when compared with the damage incurred by a cyberattack, this effort required is no longer a valid objection.<\/p>\n<p>Are you interested in learning more about data security in SAP landscapes? Feel free to visit our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">just get in touch<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1092\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/04\/Matthias-Anst\u00f6tz-244x300.jpg\" alt=\"Matthias Anst\u00f6tz (SAST SOLUTIONS)\" width=\"244\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/04\/Matthias-Anst\u00f6tz-244x300.jpg 244w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/04\/Matthias-Anst\u00f6tz.jpg 297w\" sizes=\"auto, (max-width: 244px) 100vw, 244px\" \/><br \/>\n<strong>Matthias Anst\u00f6tz (SAP Security Consultant, SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>This might also be of interest:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/09\/23\/sap-security-rest-easy-with-a-threat-intelligence-solution\/\">SAP security: Rest easy with a threat intelligence solution<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/\">SAP home goes rogue \u2013 preventable attack vectors through the SAP GUI<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In September 2020, the attack made headlines: Hackers responsible for IT disruption at D\u00fcsseldorf University Hospital. Hackers under investigation: Woman dead after attack on University Hospital. Hacker attack on D\u00fcsseldorf University Hospital: Investigation into involuntary homicide opened. A hacker attack can be fatal. Data, goods and assets aren\u2019t the only things to consider: Human lives [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,156,58,114,117],"class_list":["post-1389","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-cyber-security","tag-real-time-monitoring","tag-threat-detection","tag-vulnerability-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker attack on UKD \u2013 cyber criminals got in through the VPN interface<\/title>\n<meta name=\"description\" content=\"Fatal consequences of a hacker attack in the health care system: In addition to data and assets, human lives are at risk. IT systems must be better secured!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker attack on UKD \u2013 cyber criminals got in through the VPN interface\" \/>\n<meta property=\"og:description\" content=\"Fatal consequences of a hacker attack in the health care system: In addition to data and assets, human lives are at risk. IT systems must be better secured!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-28T09:12:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-27T09:36:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD.png\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Hacker attack on UKD \u2013 cyber criminals got in through the VPN interface\" \/>\n<meta name=\"twitter:description\" content=\"Fatal consequences of a hacker attack in the health care system: In addition to data and assets, human lives are at risk. IT systems must be better secured!\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Hacker attack on D\u00fcsseldorf University Hospital \u2013 cyber criminals got in through the VPN interface\",\"datePublished\":\"2020-09-28T09:12:02+00:00\",\"dateModified\":\"2021-05-27T09:36:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/\"},\"wordCount\":876,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Real-time monitoring\",\"Threat Detection\",\"Vulnerability Assessment\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/\",\"name\":\"Hacker attack on UKD \u2013 cyber criminals got in through the VPN interface\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png\",\"datePublished\":\"2020-09-28T09:12:02+00:00\",\"dateModified\":\"2021-05-27T09:36:34+00:00\",\"description\":\"Fatal consequences of a hacker attack in the health care system: In addition to data and assets, human lives are at risk. IT systems must be better secured!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/09\\\/28\\\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker attack on D\u00fcsseldorf University Hospital \u2013 cyber criminals got in through the VPN interface\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacker attack on UKD \u2013 cyber criminals got in through the VPN interface","description":"Fatal consequences of a hacker attack in the health care system: In addition to data and assets, human lives are at risk. IT systems must be better secured!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/","og_locale":"en_US","og_type":"article","og_title":"Hacker attack on UKD \u2013 cyber criminals got in through the VPN interface","og_description":"Fatal consequences of a hacker attack in the health care system: In addition to data and assets, human lives are at risk. IT systems must be better secured!","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/","og_site_name":"SAST BLOG","article_published_time":"2020-09-28T09:12:02+00:00","article_modified_time":"2021-05-27T09:36:34+00:00","og_image":[{"width":700,"height":481,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD.png","type":"image\/png"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"Hacker attack on UKD \u2013 cyber criminals got in through the VPN interface","twitter_description":"Fatal consequences of a hacker attack in the health care system: In addition to data and assets, human lives are at risk. IT systems must be better secured!","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD.png","twitter_misc":{"Written by":"securityblog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Hacker attack on D\u00fcsseldorf University Hospital \u2013 cyber criminals got in through the VPN interface","datePublished":"2020-09-28T09:12:02+00:00","dateModified":"2021-05-27T09:36:34+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/"},"wordCount":876,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png","keywords":["Cyber Attack","Cyber Security","Real-time monitoring","Threat Detection","Vulnerability Assessment"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/","name":"Hacker attack on UKD \u2013 cyber criminals got in through the VPN interface","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png","datePublished":"2020-09-28T09:12:02+00:00","dateModified":"2021-05-27T09:36:34+00:00","description":"Fatal consequences of a hacker attack in the health care system: In addition to data and assets, human lives are at risk. IT systems must be better secured!","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/09\/Motiv_SAST-Healthcare_Bild_UKD-300x206.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/09\/28\/hacker-attack-on-ukd-cyber-criminals-got-in-through-the-vpn-interface\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Hacker attack on D\u00fcsseldorf University Hospital \u2013 cyber criminals got in through the VPN interface"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1389"}],"version-history":[{"count":10,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1389\/revisions"}],"predecessor-version":[{"id":1666,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1389\/revisions\/1666"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}