Computer virus slows hospital, diverts ambulances

A hospital in Geogia blamed a computer virus for system interruptions and outages over three days last week:

Gwinnett Medical Center on Friday confirmed it has instructed ambulances to take patients to other area hospitals when possible after discovering a system-wide computer virus that slowed patient registration and other operations at its campuses in Lawrenceville and Duluth. Staff members discovered the virus Wednesday afternoon and have been working since then with outside I.T. experts to fix the problem, spokeswoman Beth Okun said. In the meantime, the health system has been forced to switch back to paperwork.

Emergency and trauma patients had to be diverted away from Wednesday until Friday afternoon.

VXLAN Traffic Trombone

I like the name given by one of the commenter’s on blog.scottlowe.org; it describes the traffic route in the following VXLAN example diagram

VXLAN traffic trombone

Note that even though the Windows-based workload inside the VXLAN segment now resides on a completely separate VTEP (ESXi 2, in this case), the traffic from the Linux-based workload outside the VXLAN segment continues to move through VSE 1. That’s because VSE 1 is still the Layer 3 default gateway for the IP subnet inside the VXLAN segment. Therefore—and this is where I was wrong earlier—Layer 3 connectivity is not broken, but it does have to “horseshoe” across to the other data center and then back again, as illustrated above. This is the classic traffic pattern that we see with other overlay technologies, like OTV.

Humor: Pentest Storytelling

From Bruce Schneier’s blog an unverified story about breaking into banks and then asking them to pay for consulting. Warning, this is generally considered illegal (due to lack of formal pre-authorization) and could easily lead to arrest.

Spoiler alert: Women are characterized as emotional, unstable and irrational. Men are characterized as cool under pressure and smooth. So the story is clearly embellished from a particular bias.

Also strange is how the story starts out bold on technology attacks, to a point of being unsatisfactorily vague and boastful (I expected him next to say he also was in the special forces and has traveled to Mars), but then shifts into a physical assessment description that is laden with pre-authorization, deniability and constant worry to prove their innocence.