Cyber attack on AIIMS Delhi's servers originated in China, say gov.sources
- Of the 40 physical servers, five were compromised by hackers.
- On November 23, AIIMS Delhi announced a server failure for the first time.
- According to AIIMS officials, the e-Hospital data has been recovered.
The major medical institute in Delhi's internet services were severely damaged by a cyberattack that originated in China, according to the FIR. According to senior officials from the Ministry of Health and Family Welfare, Government of India (MoHFW), hackers successfully gained access to five out of 40 physical servers, and the data from all five servers has since been securely recovered.
'Chinese nationals attacked the server at the AIIMS in Delhi, according to the FIR. Five physical servers out of 100 (40 physical, 60 virtual) were successfully breached by the hackers. Had the damage not been limited, it would have been far worse. The five servers' data has now been successfully retrieved 'according to a Ministry of Health and Family Welfare source (MoHFW).
The first server outage was revealed by AIIMS Delhi on November 23. Two of the analysts tasked with keeping an eye on the security of the systems have also been suspended due to the alleged cybersecurity breach. Authorities at AIIMS have said that the e-Hospital data has been recovered. The eHospital data has been updated on the servers.
The network is being cleaned up prior to the services being restored. The process is taking some time because of the amount of data and the multiple servers and computers needed for medical services. To ensure cyber security, steps are being made. The manual mode is still used for all hospital services, including outpatient, inpatient, laboratories, etc.
The attack on the computer system of the AIIMS Delhi was being investigated by a different division of the Delhi Police earlier this month. According to official sources, a team from the Central Forensic Lab (CFSL) has been dispatched to investigate the AIIMS Delhi server that has been targeted to ascertain the point of origin of the malware attack.