What Happened
On November 26, 2022, the University of Perpetual Help Dalta Medical Center (UPHDMC) was hit by a ransomware attack using the Lockbit 3.0 strain. The attack encrypted the institution's servers, causing their databases to become unavailable.
Lockbit 3.0 is one of the most prolific ransomware variants globally, known for its speed of encryption and double-extortion tactics (threatening to both encrypt and leak stolen data).
How Ransomware Attacks Work
Ransomware like Lockbit 3.0 typically enters an organization through one of three vectors:
- Phishing emails — a staff member clicks a malicious link or opens an infected attachment, which downloads the ransomware
- Exposed Remote Desktop Protocol (RDP) — attackers scan the internet for servers with RDP (port 3389) open and use brute-force or stolen credentials to log in
- Unpatched vulnerabilities — known security flaws in VPNs, firewalls, or web applications that haven't been updated
Once inside, the ransomware spreads laterally across the network, encrypting every system it can reach. Lockbit 3.0 specifically uses a "double extortion" model — encrypting data AND threatening to publish it if the ransom isn't paid.
Impact
The ransomware infection caused:
- Unavailability of critical databases
- Disruption to medical center and university operations
- Potential exposure of patient records and institutional data
- Need for full incident response and system recovery
NPC Involvement
The National Privacy Commission (NPC) issued a formal order to UPHDMC requiring the institution to:
- Notify all affected data subjects of the breach
- Submit proof of notification to the NPC's Compliance and Monitoring Division
- Submit a full breach report within fifteen (15) days
How to Prevent This
- 1.Maintain offline backups (3-2-1 rule) — keep 3 copies of data, on 2 different media types, with 1 copy offline/offsite. Test restoring from backups regularly
- 2.Disable RDP or restrict it to VPN-only access — never expose Remote Desktop directly to the internet. If remote access is needed, use a VPN with MFA
- 3.Segment your network — separate medical/student systems from staff workstations so ransomware cannot spread from one infected computer to all servers
- 4.Deploy endpoint detection and response (EDR) — tools like CrowdStrike, SentinelOne, or the free Microsoft Defender for Endpoint can detect and block ransomware behavior before encryption completes
- 5.Patch all internet-facing systems within 48 hours — VPNs, firewalls, and web servers are the first targets. Subscribe to vendor security advisories
- 6.Train all staff on phishing recognition — conduct simulated phishing exercises quarterly. Even one untrained employee can be the entry point
- 7.Block macro-enabled Office documents — most phishing payloads arrive as Word or Excel files with malicious macros. Disable macros by default via group policy
Sources & References
- [1]National Privacy Commission — NPC Order: In re University of Perpetual Help Dalta Medical Center (NPC-BN-22-208)
- [2]Manila Bulletin — Ransomware attacks in the Philippines surge by almost 60% in 2022 — references UPHDMC incident