Anatomy of a Breach

Anatomy of a Breach: Hollywood Presbyterian — The Hospital That Paid $17,000 in Bitcoin to Get Its Systems Back

> series: anatomy_of_a_breach —— part: 086 —— target: hollywood_presbyterian —— ransom: 40_bitcoin —— systems_down: 10_days<span class="cursor-blink">_</span>_

Hedgehog Security 28 February 2016 13 min read

A hospital. Ten days without systems. $17,000 in Bitcoin to get them back.

In February 2016, Hollywood Presbyterian Medical Center in Los Angeles was infected with Locky ransomware that encrypted servers, workstations, and medical systems across the hospital. Staff were unable to access electronic health records, email, or laboratory results. Some patients were diverted to other hospitals. The hospital reverted to paper records and fax machines — essentially operating as it would have in the 1980s.

After over a week of disruption, CEO Allen Stefanek authorised payment of the 40 Bitcoin ransom (approximately $17,000 at the time) — describing it as 'the quickest and most efficient way to restore our systems.' The decryption key was provided and systems were restored. The payment, while modest compared to later ransomware demands, set a precedent: hospitals would pay because they could not afford not to. Healthcare — with its life-or-death dependence on system availability, its legacy infrastructure, and its limited IT budgets — was the perfect ransomware target. CryptoLocker had created the template; Hollywood Presbyterian proved it worked against healthcare.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Life-or-death urgency, legacy systems, limited budgets.

Patient Safety Creates Urgency to Pay
When a hospital's systems are encrypted, patient care is directly at risk. Clinicians cannot access medical histories, allergies, medications, or test results. The urgency to restore systems — measured in patient safety, not just business continuity — creates enormous pressure to pay. This makes healthcare the most lucrative ransomware target. Our <a href="/blog/sector-under-the-microscope-healthcare">healthcare sector analysis</a> examines this vulnerability.
Legacy Systems and Flat Networks
Hospitals run legacy medical systems that cannot be easily patched, on flat networks with minimal segmentation. The same conditions that enabled <a href="/blog/anatomy-of-a-breach-nhs-trust-fines-2011">repeated NHS data losses</a> also create ideal conditions for ransomware propagation. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses network segmentation and legacy system isolation.
The Ransom Was Rational
At $17,000, the ransom was a fraction of the cost of continued downtime — estimated at hundreds of thousands of dollars per day in diverted patients, cancelled procedures, and staff overtime. The economic calculus made payment the rational choice, which is exactly why ransomware works. The defence is preventing the encryption from happening in the first place.
Foreshadowing the NHS WannaCry Attack
Hollywood Presbyterian in 2016 foreshadowed what would happen to the UK's NHS in May 2017 when WannaCry ransomware encrypted systems across multiple trusts. The warning signs were clear: healthcare infrastructure was vulnerable, the attack model was proven, and the sector had not prepared. <a href="/cyber-essentials">Cyber Essentials</a> provides the baseline controls that reduce ransomware risk.

Prevention is cheaper than paying the ransom.

For UK healthcare organisations, the Hollywood Presbyterian attack was a direct warning. The controls that prevent ransomware are the same controls this series has advocated for eight years: prompt patching (Cyber Essentials Danzell mandates 14-day patching), email security and staff awareness (social engineering assessments), network segmentation to limit propagation (infrastructure testing), immutable offline backups that are regularly tested, MFA on all remote access, and continuous SOC monitoring for healthcare that detects ransomware deployment before encryption completes.

UK Cyber Defence provides the incident response capability when ransomware strikes — including forensic investigation, containment, recovery support, and negotiation advice. Because the $17,000 ransom that Hollywood Presbyterian paid was the opening bid. By 2025, ransomware demands against healthcare organisations would reach millions.


$17,000 in 2016. Millions in 2025. Is your healthcare organisation prepared for ransomware?

<a href="/cyber-essentials">Cyber Essentials</a> reduces ransomware risk. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> validates segmentation. <a href="https://www.socinabox.co.uk/sectors/gp-surgeries">SOC in a Box for Healthcare</a> detects ransomware deployment.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles