Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Inside a Hospital Ransomware Attack: Lessons from the Front Lines

Commvault
03/12/2026
7
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Immediate network isolation is critical when ransomware is suspected—cutting connections aggressively is safer than attempting quick fixes while the attack scope remains unknown.
  • Hospital recovery is not simply rebooting servers; clinical dependencies like patient identity systems, lab interfaces, and pharmacy workflows must be restored in careful sequence to maintain patient safety.
  • ANSSI responders identified the attack signature and patient zero within 30 minutes, demonstrating how external incident response expertise dramatically accelerates crisis clarity.
  • Full recovery took approximately one month for essential functions, with complete infrastructure reconstruction requiring years—far exceeding leadership's initial one-week expectations.
  • Post-crisis security transformation included EDR deployment, mandatory security reviews for all projects, regular crisis simulations, and a cultural shift where all staff actively report suspicious activity.

This compelling episode of the STRIVE podcast presents a first-hand account of a ransomware attack on a French hospital group, told by Guillaume, an infrastructure manager who lived through the crisis. The attack struck on a Sunday morning while Guillaume was on vacation, beginning with frantic calls from colleagues reporting widespread server failures and strangely renamed files across the environment. What initially seemed like a backup problem quickly revealed itself as a full-scale ransomware incident affecting approximately 300 servers across a four-hospital territory group. The conversation provides an unfiltered look at the chaos of the first hours: the initial shock and disbelief, the critical decision to immediately isolate the network rather than attempt quick fixes, and the challenge of organizing panicked team members into functional roles. Guillaume describes the emotional toll of maintaining composure while discovering each new layer of damage, noting the constant urge to scream that had to be suppressed to effectively lead the response. A pivotal moment came when ANSSI (France's national cybersecurity agency) responders arrived and within 15-30 minutes identified the attack signature, located patient zero, and established a clean restoration timeline. The episode details the painstaking recovery process: validating that backups were uncompromised, ensuring servers were malware-free before restoration, and critically, coordinating with clinical departments to maintain patient safety during degraded operations. Laboratory systems, pharmacy interfaces, and patient identity management all required careful sequencing. The financial and operational impact extended far beyond IT: cancelled chemotherapy appointments, patient diversions to other hospitals, and a full month before essential functions resumed—with complete reconstruction taking years. Post-crisis improvements included mandatory security reviews for all projects, EDR deployment, regular crisis simulations validated by ANSSI, and a transformed security culture where even non-technical staff now instinctively report suspicious emails rather than clicking them.

Chapters

0:00 - Introduction and Crisis Overview
2:37 - Discovering the Attack
5:28 - Network Isolation Decision
6:28 - Crisis Management Organization
11:56 - Communication and Coordination
14:21 - Service Restoration Process
17:21 - ANSSI Response and Forensics
18:59 - Financial and Patient Impact
21:21 - Team Solidarity During Crisis
25:52 - Post-Crisis Security Improvements

Key Quotes

0:00 "Il faut vraiment se maîtriser pour ne pas hurler à chaque moment, pour ne pas hurler même sur celui à qui on a donné une fonction ou une mission et qui, dans la panique, n'arrive même pas à la faire."
5:28 "Il faut couper le réseau parce qu'en fait, on ne sait pas ce qui est en train de se passer. On ne comprend pas. On ne sait pas s'il y a des fuites."
7:02 "Est-ce qu'on va s'en sortir? Et puis, quel délai? Surtout parce que c'est un hôpital et que derrière, il y a la gestion du patient."
14:17 "Un reboot de serveur, qui est quelque chose de complètement banal dans la vie courante, là, c'est une victoire."
17:49 "Ils sont arrivés, ils ont débarqué, l'air de rien. En un quart d'heure, une demi-heure, ils savaient quel type d'attaque avec la signature du virus."
Categories:
  • » Webinar Library » Commvault
  • » Data Protection
Channels:
News:
Events:
Tags:
  • ransomware incident response
  • healthcare cybersecurity
  • crisis management
  • business continuity
  • disaster recovery
  • ANSSI
  • hospital IT infrastructure
  • EDR deployment
  • security awareness training
  • degraded operations
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Inside a Hospital Ransomware Attack: Lessons from the Front Lines

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version