Lessons from a Ransomware Attack

A Lagos hospital shares how they survived a ransomware attack; practical lessons every healthcare leader in Nigeria can use to stay prepared.

hooked

Nigerias hospitals are increasingly going digital, but that makes them targets for cybercriminals. Patient records hold sensitive personal and financial data that on the dark web can be “worth more than credit cards”. Attacks on health facilities are growing: INTERPOL reports that over half of African nations saw cyberattacks on critical infrastructure in 2024, and cybersecurity experts note that healthcare is now “a juicy target” in Nigeria's rising cybercrime landscape. In this interview, we speak with Mr. Chinwe Okoroafor, IT Director at Green Valley Hospital, Lagos, about a recent ransomware attack on her hospital; what happened, how the team responded, and the lessons learned for other healthcare leaders.

Q&A with Mr. Chinwe Okoroafor, IT Director, Green Valley Hospital (Lagos)

Q: Can you walk us through what happened when the ransomware hit your hospital?
A: It was early on a Wednesday morning when our staff found computers locked, with a note demanding Bitcoin payment. Our electronic medical records (EMR) and scheduling systems went offline. In our case, emmergency patients had to be referred to other nearby clinics for a while. The attackers knew hospitals operate 24/7 and often feel pressured to pay the ransom quickly to restore care, so they expected we'd pay to avoid disrupting patient care.

Q: What did you and your team do right away once you realized it was a ransomware attack?
A: First we isolated the issue. We literally pulled network cables and took affected workstations and even had to take our server offline to prevent the malware from spreading further, just as recommended by cybersecurity authorities. Next, we convened our emergency response team and notified hospital leadership. We then contacted external help: we notified regulators and quickly called ClarenSec's incident response team, who came in that evening to help with forensic analysis and recovery. While they began collecting forensic logs, we focused on restoring critical systems safely. For example, instead of even considering paying the ransom, we began recovering from our backups, as we were prepared for the incident and have been planing our response to a potential incident for months.

Q: What mistakes or gaps in preparation did you discover during the response?
A: In hindsight, we found several issues. A server hadn't been patched for months, so the malware exploited an old vulnerability. Also, some of our backup files were on a drive still connected to the network, and those got encrypted too. We realized we hadn't properly segmented certain parts of our network. also, a vendor machine was accessible from outside. We also hadn't drilled our incident plan; staff were confused about who to call and how to communicate, which cost us precious time. In short, we learned that assumptions about security can lead to dangerous blind spots.

Q: How has this experience changed your approach to IT security and incident preparedness?
A: We took it as a wake-up call. First, we overhauled our backup strategy: we now keep daily encrypted backups and store copies offline/offsite (in line with best practices), and we test restoring from them regularly. Second, we patched every system and improved our patching schedule so we don't fall behind again. We added network segmentation so that a breach in one segment can't spread hospital-wide. We also tightened access controls and required stronger passwords and multi-factor authentication wherever possible. Importantly, we revamped our training: we now run quarterly phishing drills for all staff, reminding them that most breaches start with a single click. We documented clear response playbooks (even simple written flowcharts of who does what) as recommended by experts, and we're now holding regular tabletop drills to practice them. Finally, we've kept working with ClarenSec: they ran a security assessment for us after the incident and helped update our policies. All these steps are guided by a checklist of actions to make sure we don't make the same mistakes again.

Q: What practical advice would you give other hospitals and clinics based on what you learned?
A: My advice is to be proactive. Don't wait until an attack happens. First, ensure you have reliable, tested backups stored offline, that way you can restore your systems without considering a ransom payment.
Second, keep all systems and medical devices patched and up to date, and limit who can access critical data (use least-privilege accounts and segment the network).
Third, train every staff member regularly - phishing attacks are getting sophisticated, and studies show staff errors cause the vast majority of breaches.
Fourth, have an incident response plan in place. Define who does what, how to communicate internally, and run tabletop exercises so everyone knows the drill.
Finally, don't try to handle it entirely alone: engage outside help early if needed. Reach out to cybersecurity professionals (like ClarenSec) and report incidents to the proper authorities.

Key Takeaways for Healthcare Leaders

  • Maintain regular, tested backups of all critical data. Store at least one copy offline or offsite so you can recover systems without paying attackers.
  • Keep software and medical devices fully patched and limit user permissions. Isolate and segment networks to prevent malware from spreading across the facility.
  • Train and test staff frequently. Teach every clinician and clerk to recognize phishing emails and suspicious activity, since human error is a leading cause of breaches.
  • Document and practice your incident response plan. Define clear roles and communication steps, and run drills so the whole team acts quickly and confidently if an attack occurs.
  • Work with experts and authorities. Don't battle ransomware alone; involve a trusted security firm or government response team early, and follow their guidance instead of paying a ransom.

Mr. Okoroafor sums it up for hospital leaders; “don't wait for a crisis before you act”. Cybersecurity readiness is as vital as any medical emergency plan. By building defenses now, with strong backup routines, trained staff, and clear plans, hospitals protect patients and maintain trust. Healthcare providers in Nigeria and West Africa can turn to partners like ClarenSec for expert assessments, training, and support to strengthen their security. After all, in healthcare IT security, proactive security saves lives and resources down the line.

Related Posts

So 1234 Is Your EMR Password? Don't Lose Your License.

July 1, 2025

Using weak passwords, posting patient data on WhatsApp, simple habits can lead to serious data breaches in hospitals. This post explores common EMR mistakes by doctors and ...

Read More

Starting Your Cybersecurity Program: First Steps for Hospitals

June 10, 2025

Healthcare data is extremely valuable to attackers. Studies note that electronic patient records and protected health information (PHI) are often more lucrative than other data. Yet...

Read More

Building a Security-Aware Culture: Training and Awareness

June 24, 2025

Technology alone can't secure a hospital; people play a critical role. This post examines how Nigerian healthcare organizations can foster a culture of security awareness through targeted staff training...

Read More