Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Medicine Security

NotPetya Outbreak Left Merck Short of HPV Vaccine Gardasil (securityledger.com) 63

chicksdaddy shares a report from The Security Ledger: The NotPetya malware infection shut down pharmaceutical giant Merck's production of the pediatric vaccine GARDASIL last June, forcing the company to borrow the drug from a stockpile maintained by the U.S. Centers for Disease Control and Prevention to meet demand, The Security Ledger reports. The anecdote was contained in a quarterly filing by Merck with the U.S. Securities and Exchange Commission (SEC) on Friday. That filing also showed that the company continues to suffer financial fallout from the outbreak of the NotPetya malware in June, reducing both sales and revenue for the quarter by hundreds of millions of dollars. In its quarterly 8-k filing, Merck said that revenue for the quarter was "unfavorably impacted" by around $135 million due to "lost sales in certain markets related to the cyber-attack." Sales in the third quarter of 2017 were also reduced by around $240 million, which Merck chalked up to production shutdowns resulting from NotPetya. In a chilling insight into the extent of the disruption the malware caused to Merck's operations, the company disclosed that part of its quarterly losses were linked to the interruption of its production of GARDASIL, a vaccine used to prevent Human Papillomavirus (HPV) which is linked to certain cancers and other diseases. To make up for what it described as "overall higher demand than originally planned," Merck was forced to borrow the vaccine from a stockpile maintained by the U.S. Centers for Disease Control (CDC), the company said.
This discussion has been archived. No new comments can be posted.

NotPetya Outbreak Left Merck Short of HPV Vaccine Gardasil

Comments Filter:
  • by nospam007 ( 722110 ) * on Saturday October 28, 2017 @05:44AM (#55449277)

    They are good in fighting human viruses just not in fighting cyber ones.

  • by Gravis Zero ( 934156 ) on Saturday October 28, 2017 @05:48AM (#55449285)

    Security isn't flashy or cool but when everything comes to a grinding halt because of malware then you have earned it because you refused to invest in basic security.

    No tears shall be shed for the PHBs at Merck.

    • You leave your door unlocked. Someone steals your TV. 100% your fault?

      • That's an incomplete analogy. If you leave your door unlocked overnight, that's one thing but due to the speed of travel and automation with the internet, it's more like you left your door unlocked for 800 years. Finally after 800 years, someone steals your TV and you are shocked that such a thing could happen when the truth is that it was inevitable.

  • Sounds like an animals rights group that is against humans keeping domesticated animals for companionship.

    Or an upsetting comment made to a doggie.
  • by Anonymous Coward

    outbreak of the NotPetya malware

    as if it were a papillomavirus, not a weapon employed by humans, or human organizations like the state of Russia. Maybe we should stop speaking of "computer viruses" altogether. It fosters this image that fighting malware is like pest control, it obscures the human interests behind them. Malware doesn't just "break out" autonomously.

  • If anything at all, this should cause a criminal investigation against those responsible, as gross negligence was clearly involved.

    • If anything at all, this should cause a criminal investigation against those responsible, as gross negligence was clearly involved.

      But in the meantime, let's ignore the Greed within the Banking Industrial Complex that will all but guarantee another financial meltdown.

      Too Big To Fail? More like Too Big to be Negligent. Even if the activity were criminal, there won't be a fucking thing done about it.

  • by Beeftopia ( 1846720 ) on Saturday October 28, 2017 @10:53AM (#55449957)

    I've seen this myself. Managers wave it off with an "It'll be fine" brush off. IT workers just want to get their deliverable done and out the door. Until you have a group that is a first class citizen in your organization, and is concerned with security, these sorts of thing will remain common occurrences.

    • by Anonymous Coward

      Agree. I work for a 50000+ employees pharmaceutical company that have absolutely not clue about IT security. The office environment is in relatively good shape but the production/automation area is in a bad place. Unpatched win XP boxes are running critical processes. I think it may be related to the very strict change control in pharma. It causes fear of change and updating. And results in low security level.

  • by Anonymous Coward

    0.0.0.0 1dnscontrol.com
    0.0.0.0 aica.co.jp
    0.0.0.0 an-crimea.ru
    0.0.0.0 ankerch-crimea.ru
    0.0.0.0 argumenti.ru
    0.0.0.0 argumentiru.com
    0.0.0.0 bg.pensionhotel.com
    0.0.0.0 blog.fontanka.ru
    0.0.0.0 caforssztxqzf2nm.onion
    0.0.0.0 calendar.fontanka.ru
    0.0.0.0 fontanka.ru
    0.0.0.0 grupovo.bg
    0.0.0.0 i24.com.ua
    0.0.0.0 imer.ro
    0.0.0.0 ks.ua
    0.0.0.0 mediaport.ua
    0.0.0.0 most-dnepr.info
    0.0.0.0 novayagazeta.spb.ru
    0.0.0.0 online812.ru
    0.0.0.0 osvitaportal.com.ua
    0.0.0.0 otbrana.com
    0.0.0.0 pensionhotel.com
    0.0.0.0 pensionhotel.cz
    0.0.0.0

  • I guess spending anything up to, say, 130 Millions for security is well spent money, don't you agree?

What is research but a blind date with knowledge? -- Will Harvey

Working...