Menu
Sign In Search Podcasts Libraries Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The Claire Byrne Show

The true impact of the HSE “Conti” ransomware attack

12 May 2026

Transcription

Chapter 1: What is the main topic discussed in this episode?

1.887 - 6.548 Claire Byrne

The Clare Byrne Show on Newstalk. With Aviva Insurance.

0

9.481 - 33.767 Jess Kelly

On the morning of May 14th, 2021, Conti Ransomware infiltrated the HSE IT system. And this cyber attack led to all IT systems within the service shutting down, forcing staff to revert back to pen and paper. And it impacted people right across the country. It was the largest known attack against a health service system in history. And it occurred during the pandemic, if you remember back.

0

33.747 - 38.813 Jess Kelly

to 2021 and the cost of it is estimated to be around 102 million euro.

0

Chapter 2: What happened during the Conti ransomware attack on the HSE?

38.933 - 60.48 Jess Kelly

Newstalk's tech correspondent Jess Kelly is here now to look back at the true impact of this cyber attack and ask why it's front of mind as Ireland prepares for the EU presidency. Jess, you're taking us back to dark days now because do you remember at that point where we were with the unmentionable at the time with the pandemic, let's just say it,

0

60.46 - 64.745 Jess Kelly

It just felt like the end of days then when the ransomware attack happened on top of it.

0

64.965 - 83.768 Unknown

It did, because again, to try and wind your mind back, the vaccine rollout programme was kind of gaining a bit of momentum. We were in between lockdowns. It felt like maybe there's a bit of light at the end of the tunnel here. We just need to keep calm, carry on. But there was still a level of apprehension in the air.

0

83.748 - 106.718 Unknown

However, on the faithful day, the 14th of May, I remember listening to news talk. The news kicked off at seven o'clock and it was that HSE services are down. So not only was HSE.ie down, but I spoke subsequently to staff members who told me they were locked out of not only their email accounts, but their devices in their entirety.

0

106.698 - 126.938 Unknown

patients were showing up for scheduled appointments and there was no way to track, well, Clare Byrne is here, she's meant to be here because the systems were down. Some hospitals had shimmied away from the traditional paper records in favour of digital systems. There were some instances where the paper records couldn't be found at the right time.

126.978 - 151.771 Unknown

There was also, as you said, pandemic measures in place in hospitals. So the hospitals were already juggling an awful lot the health system was juggling an awful lot and then this spanner was thrown into the works which caused chaos not only in the immediate term but also for a long period of time afterwards as well So what do we know now about what exactly happened? It all started very simply.

152.111 - 177.576 Unknown

And this is something that I think made a lot of us sit up straight. So the attack itself, the ransomware was executed on the 14th of May. However, the cyber attackers infiltrated the system on the 18th of March. And they gained access to the system because somebody opened an email. As simple as that. As simple as that. Somebody, it was a phishing attempt

177.556 - 198.418 Unknown

I believe that it was made to look like it was from a legitimate, you know, they had no reason to doubt the legitimacy of the email, opened an attachment and this invisible bit of piece of ransomware just gained access to the system. What's fascinating about this though, and this is where I love the details, I'm a details person. So the email was opened on the 18th of March.

198.878 - 218.028 Unknown

The first movement by the attackers within the HSE digital infrastructure didn't happen until the 7th of May. So why were they sitting in there for so long? Because even though huge holes were found in the HSE cyber integrity, they didn't want to trip any wires.

Chapter 3: How did the ransomware attack impact healthcare operations in Ireland?

218.068 - 235.495 Unknown

So the attackers gain access to the system and they lie in wait. They make sure that there's no alarms or triggers or tripwires set off in the immediate term. Once they know they have access to the system, then on the 7th of May, they start to explore.

0

235.555 - 256.951 Unknown

And if you can picture, kind of like Pac-Man, the way he just goes around the system, down the little corridors and so on, that's what this ransomware enabled them to do. So on the 8th of May then, they compromised six voluntary and one statutory hospital. And it wasn't until the 12th of May that they browsed folders and opened files on the HSE system.

0

257.412 - 267.073 Unknown

And this was not only the inconvenient side of the lockdown of the HSE files, but think of the level of data that hospitals have.

0

267.093 - 268.296 Jess Kelly

That they had access to, yeah.

0

268.276 - 291.008 Unknown

It was significant. But then, as we know, as I said, on the 14th, this Conti ransomware was executed. So ransomware, we've spoken so many times on the station over the years about different kinds of cyber attack. So there's the annoying text messages and the annoying scam emails. There's people infiltrating Instagram and WhatsApp and other social profiles. This is a next level up.

291.068 - 306.248 Unknown

So Conti is a piece of software that is remotely and invisibly installed. And ransomware is what it sounds like. So it has the potential to lock down an entire system in lieu of payment.

306.481 - 329.299 Unknown

Now, there's a whole side to the cyber terrorism world that is very, very murky, because not only do you have serious, sophisticated gangs who do this every single day of the week, you also have this thing called ransomware as a service, where you have people who could be sitting in their bedroom or in their mother's living room and will go onto the dark web

329.279 - 355.557 Unknown

purchase this software and execute it themselves and they're not sophisticated and they are not used to doing this and they could accidentally delete the entire system even if you do pay the ransom. So it took a little while to try and identify who and what was behind this particular attack because the fingerprints of it were kind of hard to detect to begin with

355.537 - 374.521 Unknown

A war room was put together a few years ago on Tech Talk. I went down to the National Emergency Coordination Centre, which is where different bodies come together. So obviously you had the HSE, you had the National Cyber Security Centre, you had Angarda Síochána, you had the government, you had everybody coming together to try and put a bit of a response in place.

Comments

There are no comments yet.

Please log in to write the first comment.