Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Microsoft Security United States IT

Wyden Says Microsoft Flaws Led to Hack of US Hospital System (bloomberg.com) 39

US Senator Ron Wyden says glaring cybersecurity flaws by Microsoft enabled a ransomware attack on a US hospital system and has called on the Federal Trade Commission to investigate. Bloomberg: In a letter sent Wednesday to FTC Chairman Andrew Ferguson, the Oregon Democrat accused Microsoft of "gross cybersecurity negligence," which he said had resulted in ransomware attacks against US critical infrastructure.

The senator cited the case of the 2024 breach at Ascension, one of the nation's largest nonprofit health systems. The intrusion shut down computers at many of Ascension's hospitals, leading to suspended surgeries and the theft of sensitive data on more than 5 million patients. Wyden said an investigation by his office found that the Ascension hack began after a contractor carried out a search using Microsoft's Bing search engine and was served a malicious link, which led to the contractor inadvertently downloading malware. That allowed hackers access to Ascension's computer networks.

According to Wyden, the attackers then gained access to privileged accounts by exploiting an insecure encryption technology called RC4, which is supported by default on Windows computers. The hacking method is called Kerberoasting, which the company described as a type of cyberattack in which intruders aim to gather passwords by targeting an authentication protocol called Kerberos.

This discussion has been archived. No new comments can be posted.

Wyden Says Microsoft Flaws Led to Hack of US Hospital System

Comments Filter:
  • by Murdoch5 ( 1563847 ) on Wednesday September 10, 2025 @05:09PM (#65651870) Homepage
    I like to Microsoft bash as much as the next Unix / Linux loving nerd, but, is this really their fault? It's possible to deploy containerization security standards on Windows, to make it high security, so, is the real issue the contractor didn't follow smart isolation? There is a real issue with data storage and data handling, but again, is that Microsoft's fault? The data should have been encrypted with something like AES-256-GCM, and every node in the network should have been closed tighter than a nuns nasty, requiring MFA.

    Well blaming Microsoft is usually the right move, in this case it appears to be more of a security blunder by the contractor, hell, why was he even running Windows? QubesOS is an objectively better choice for any high security setting, like a hospital, or health care network.
    • why was he even running Windows?

      This is the "Fox News defense".

      "It's not our fault because if someone's stupid enough to trust us, they deserve what they get."

      • by mackil ( 668039 )

        why was he even running Windows?

        This is the "Fox News defense".

        "It's not our fault because if someone's stupid enough to trust us, they deserve what they get."

        Well to be fair, he is a "Murdoch"

      • No, the same issue could have happened on Linux, or Unix, it doesn't really depend on the OS, it's down to bad practices. Hell, even if the data was secured properly, and or, containerization security practices were deployed it would have been prevented. Windows wasn't at fault, as much as the practices.
    • I like to Microsoft bash as much as the next Unix / Linux loving nerd, but, is this really their fault? It's possible to deploy containerization security standards on Windows, to make it high security, so, is the real issue the contractor didn't follow smart isolation? There is a real issue with data storage and data handling, but again, is that Microsoft's fault? The data should have been encrypted with something like AES-256-GCM, and every node in the network should have been closed tighter than a nuns nasty, requiring MFA.

      Yes this is entirely Microsoft's fault rooted in their failure to ever deploy secure authentication mechanisms. Microsoft has only ever deployed some form of CHAP scheme for authentication well known to be universally vulnerable to offline brute force attacks. Microsoft knows full well most real world passwords lack sufficient entropy to withstand offline attack relative to available processing resources.

      Yet they've persisted for decades all the while failing to deploy alternatives such as ZKP. This isn'

      • I think it's a stretch to blame Microsoft for this, it's really down to the practices IMO. If you run Windows, and want to be secure, deploy VMs entirely to protect yourself, which could have prevented this issue. That being said, I see where Microsoft could be at fault, but who runs Windows in a secure environment, without taking exception extra steps? The contractor failed.
      • by Bahbus ( 1180627 )

        Microsoft has only ever deployed some form of CHAP scheme Yet they've persisted for decades all the while failing to deploy alternatives such as ZKP.

        While Microsoft themselves have not implemented ZKP specifically (yet), the rest of your statement(s) is false. Whether you like it or not, they've deployed plenty of other options. Windows supports FIDO2, EAP-TLS, Kerberos, Passkeys, etc. None of these are CHAP scheme, nor does it seem like the hospital used *any* of them. Plus, while Microsoft doesn't natively support ZKP (yet), they are working on it, and in the meantime there are 3rd party vendors that can implement it.

        It's up to the IT staff to actuall

        • by Bahbus ( 1180627 )

          And now that I'm thinking about this story and remembering some of it, they were using Kerberos, and this malware was targeting it, but Microsoft released guidelines months beforehand on how to prevent Kerberoasting from succeeding. If they would have implemented the guidelines, the hack would have failed. Why was RC4 still enabled? They could turn it off at anytime (and a future update did default it to off). Why weren't they using gMSA or dMSA? No one seems to know. Either way, the hack was preventable, M

    • by gweihir ( 88907 )

      Yes. it is Microsofts fault. Something sold commercially as a "modern" OS must be able to survive reasonably well (unless misconfigured) when connected to the Internet. And still using RC4 these days? That is negligence that could not be any more gross.

      • by Bahbus ( 1180627 )

        The hospital could have turned Rc4 off at any time.

      • I partially agree with you, except, the failure wasn't due to Microsoft, it was due to a bad setup and operating procedures. Let's just stick with Windows, you can use it securely, using VMs as hard isolation boundaries, and you should be doing that. Look at QubesOS, using VMs to isolate domains, and you can do the same thing in effect on Windows, have one VM that handles email, have another that has secure file access, and another for personal anything. Then the host system is basically just a VM host,
        • by gweihir ( 88907 )

          You know, that you even need that VM isolation (and I agree, Windows needs it) is a rather strong sign of fundamental unfitness for purpose. You do not need that isolation on Linux, the xBSDs or any commercial Unix. Only Windows is so fragile and insecure that it basically has become a best practice to do VM-based isolation. for it.

  • by oldgraybeard ( 2939809 ) on Wednesday September 10, 2025 @05:18PM (#65651878)
    "encryption technology called RC4"
  • Don't be silly (Score:4, Informative)

    by malvcr ( 2932649 ) on Wednesday September 10, 2025 @05:32PM (#65651902)

    This is an infrastructure design and monitoring mistake. Can't be traced to just Microsoft, it is a very simple way to avoid responsibilities.

    An institution as important as a hospital, must have a partitioned network, with security levels that avoid a mistake in a zone to destroy the work of another one. And the data and related processes must be organized accordingly with their importance and sensitivity.

    Also, good and enough contingency plans must exist.

    Everything else is to play as children with sand.

  • What a clown. He can't be that stupid.

    The fine senator should be suing Ascension for not solely using Apple products, like he does.

    • What a clown. He can't be that stupid.

      Yes, yes he can.

      Remember that most politicians are usually from legal or business backgrounds and have little to no training or hands on knowledge of IT and related fields. Given Wyden's background as a privacy/data security advocate he is probably better educated on the subject than many of his peers but he still doesn't have hands on experience with Cybersec and IT related fields and is just going by what his staff has briefed him on. Sadly the "experts" on most congresscritter's staffs probably got the

      • Given Wyden's background as a privacy/data security advocate he is probably better educated on the subject than many of his peers but he still doesn't have hands on experience with Cybersec and IT related fields and is just going by what his staff has briefed him on.

        And yet, every agency in the US Federal government subscribes to every product currently offered by Microsoft.

  • https://www.microsoft.com/en-u... [microsoft.com]

    Wyden is just another old man who should be shoved out the Capitol exit and into a wood chipper so that younger people whose brains are not yet failing can take on the job of leadership. The spray of his corpse can be used to feed failing grass in DC, shoveled and spread by National Guardsman ashamed of what their government has made them do.

  • how easy is it to hack epic mychart?

  • Whenever his software didn't work right, he would immediately insist, in all seriousness, that it was because of "a Microsoft bug." But upon further investigation, it never actually was.

    Microsoft has had, and dealt with, plenty of bugs. But if you're going to blame Microsoft, you'd better be sure of your facts.

    I wouldn't be surprised if this company didn't ignore multiple explicit scary popups when they clicked options to enable the insecure protocols. The healthcare industry, which I've worked in for more

    • Whenever his software didn't work right, he would immediately insist, in all seriousness, that it was because of "a Microsoft bug." But upon further investigation, it never actually was.

      I've heard of people going bonkers and blaming the compiler or even the processor. In my experience when Microsoft is blamed it turns out more often than not to be the case. Of course YMMV. In any event rarely do such externalities matter. Even where a problem is caused by something else your customers still expect you to provide a working product so it is always your fault and your problem no matter what. I recall years ago a hardware vendor borked a few versions of their network drivers. Running our

      • What facts are in doubt in this case?

        Well, to start with, the claim was that

        The hackers employed a technique known as “Kerberoasting,” which exploits an insecure encryption technology from the 1980s known as “RC4” that is still supported by Microsoft software in its default configuration

        But Microsoft's own blogs claim that RC4 was disabled in Edge and Internet Explorer in 2016. https://blogs.windows.com/msed... [windows.com]
        It was eliminated from Active Directory and Kerberos in 2022. https://www.dell.com/support/k... [dell.com]
        That year, it was also removed from the SSL/TLS stack. https://support.microsoft.com/... [microsoft.com]?

        So it's not at all clear that the claim is true or has merit.

        • The hackers employed a technique known as âoeKerberoasting,â which exploits an insecure encryption technology from the 1980s known as âoeRC4â that is still supported by Microsoft software in its default configuration

          But Microsoft's own blogs claim that RC4 was disabled in Edge and Internet Explorer in 2016. https://blogs.windows.com/msed [windows.com]...
          It was eliminated from Active Directory and Kerberos in 2022. https://www.dell.com/support/k [dell.com]...
          That year, it was also removed from the SSL/TLS stack. https://support.microsoft.com/ [microsoft.com]...?

          So it's not at all clear that the claim is true or has merit.

          Kerberoasting is independent of RC4. For example hashcat supports brute forcing AES as well. The problem is entropy not algorithm selection.

          • According to the article, the attack specifically relied on RC4.

            According to Wyden, the attackers then gained access to privileged accounts by exploiting an insecure encryption technology called RC4, which is supported by default on Windows computers.

            • According to the article, the attack specifically relied on RC4.

              I fail to see the relevance. If not RC4 it would have been AES. Disabling RC4 does NOT solve the problem.

              • No, the two are not equivalent in security, not even close.

                https://docs.datadoghq.com/sec... [datadoghq.com]

                • No, the two are not equivalent in security, not even close.

                  Your reference is irrelevant, you still don't understand the problem. Hashcat isn't breaking RC4 what it is actually doing is running a dictionary attack. It doesn't matter how shitty RC4 is when the weakest link is entropy not crypto.

                  See RFC4757 section 2.

                  "The RC4-HMAC string to key function is defined as follows:
                  String2Key(password)
                  K = MD4(UNICODE(password))"

                  The key to the HMAC or the stream cipher is the goddamn windows password (NTOWF). This means if you take an HMAC or encrypt a known plaintext with

                  • That 1000x cost in resources isn't as insignificant as you make it out to be. Password cracking is *all* about the cost.

                    • That 1000x cost in resources isn't as insignificant as you make it out to be. Password cracking is *all* about the cost.

                      Password cracking is all about results. 1000x is thermal noise in regimes where exponents protect systems. So a password takes hours instead of minutes or days instead of hours and you have to throw more cores at the problem than you would otherwise. At the end of the day outcomes and expenditures do not meaningfully change.

                    • Your effort estimates are incorrect. To crack an AES 256 password would take many years, not just hours. https://www.progress.com/blogs... [progress.com]. By contrast, RC4 takes minutes to hours to crack.

  • ...are a problem that doesn't get enough attention. Script kiddies (and/or nation state actors) buy ads with popular brand keywords, impersonate the brands, and attack users with fake virus-warning popups (which induce users to install real malware), or pretend to sell products that they're never going to ship, etc, etc.

    I wonder if the attack in this case was from an ad, or just from a random organic search result. The malicious ads are extra irritating because it makes the search engine a part of the attac

"Oh dear, I think you'll find reality's on the blink again." -- Marvin The Paranoid Android

Working...