Over 95% of services and devices disrupted by HSE cyberattack fully restored
Gardai have carried out a major operation targeting the gang behind the ransomware attack on the Health Service Executive in May Picture: Peter Byrne/PA
Over 95% of all servers and devices disrupted by the cyberattack on the Health Service Executive (HSE) in May have been fully restored.
Acute services are now âalmost fully restoredâ, along with community and corporate service.
âMost of our priority systems are back online on local sites, including radiology and diagnostic systems; maternity and infant care; patient administration systems; chemotherapy; radiation oncology; radiotherapy and laboratories,â a spokesperson for the HSE said.
Restoration is âtechnically challengingâ and needs to be completed âin a very safe wayâ but IT teams continue to work âaround the clock seven days a weekâ to restore all servers and devices, the spokesperson added.
At present, less than 10 site-specific instances of systems remain to be brought back online and all enterprise systems are operational.
The majority of HSE staff have access to email, but work is ongoing regarding enabling access to historical emails.
âThere still remain small, residual problems in some areas,â the spokesperson added.
GardaĂ have carried out a major operation targeting the gang behind the ransomware attack on the Health Service Executive (HSE).
The operation is expected to have a major impact on the gang, with gardaĂ saying 753 attempts were made by ICT systems to connect domains that had been seized by the force.Â
A spokesman said on Sunday: âA significant disruption operation which targeted the IT infrastructure of a cyber crime group has been conducted by the Garda National Cyber Crime Bureau (GNCCB).
âThe Garda National Cyber Crime Bureau have seized several domains used in this and other ransomware attacks.â
The ransomware attack on the HSE, which occurred in May, caused major disruption to the health service.
HSE chief Paul Reid said in June that it had had a âdevastating impactâ and cost the health service millions of euros.
On Sunday, the garda spokesman said the seizure of the websites had âdirectly preventedâ other ransomware attacks across the world.
A so-called âsplash screenâ has been used on the web domains by gardaĂ to warn any potential victims that it is likely that their system has been attacked by ransomware.
GardaĂ are also working with other police agencies as part of the wider operation.
âA process has also commenced between the Garda Siochana and their law enforcement partners at Europol and Interpol to provide the details of the visiting URLs to the member countries to ensure that the infected systems are appropriately decontaminated,â the spokesman said.
He added that the operation will have a major impact on the cyber crime gang.
âTo date a total of 753 attempts were made by ICT systems across the world to connect to the seized domains.
âIn each instance, the seizure of these domains by the GNCCB investigation team is likely to have prevented a Conti ransomware attack on the connecting ICT system, by rendering the initially deployed malware on the victimâs system as ineffective.â


