lex-man wrote: Errkal wrote: lex-man wrote: Errkal wrote:
lex-man wrote:They just hit ip addresses until they find a vulnerable target.
The NHS sites inside its own network isolated from the Internet, they connect via a number of very restricted gateways, some trusts have internet gateways but most dont, so this is more targetted than that.
Do you work in it for the NHS because that wasn't my experience?
Yup, IT for like 11 years or so.
Where I worked two and a half years ago all of our front facing machines had internet access. It was all replaced by visualised desktops running off servers but still very much hooked up to the internet.
The guardian article mentions that it the mail sever was the first place to get hit.
In a message to a Guardian reporter, one NHS IT worker said: “At approximately 12.30pm we experienced a problem with our email servers crashing. Following this a lot of our clinical systems and patient systems were reported to have gone down.
They also mention it wasn't an attack targeting the NHS specifically.
https://www.theguardian.com/society/201 ... ber-attack
“This attack was not specifically targeted at the NHS and is affecting organisations from across a range of sectors.
So I still stand by my comment.
They have internet access, because n3 goes to the web via some gateways, what I mean is a trusts networks is a secured network within n3 that is a secured network from the internet, you can get to the web getting getting in is very hard. So this would need to be more targeted to get someone to start something that lets you in.
You can direct host vpn, web servers via n3, trusts have their own internet lines for them but they aren't use for internet usually, N3 is.