Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Bots attack London vaccine appointments

COVID-19 vaccine related phishing campaigns on the rise
March 24, 2021

An online site used to book COVID-19 vaccines in the London area was attacked by bots, as thousands attempted to register for their vaccine appointments. According to the London Free Press, just before 10:15 a.m., the Middlesex-London Health Unit tweeted the booking system had experienced challenges. “We have addressed the issues and will continue to monitor the booking system closely,” the organization claimed.

Chris Mackie, medical officer of health for London and Middlesex County, said, "The site was attacked by bots this morning. Problem is now fixed. Appointments are still available for those over 75 years. If you have trouble, please be patient and try again.” 

Mackie also claimed the attack was with the same kind of tool used to target sites such as Ticketmaster in order to snatch up large blocks of tickets. “That meant that the website slowed down for a number of people,” he said. When asked if it was possible that someone could be selling those blocks of tickets, Mackie said there wasn't any evidence indicating that one person was booking many appointments. 

According to Edward Roberts, Application Security Strategist, Imperva, “Since February, Imperva Research Labs has monitored an unprecedented 48.8% increase in bad bot traffic on healthcare websites. It was an early indicator that a bot-driven disruption on a COVID-19 vaccine appointment site would happen eventually – especially as the vaccine became available to the general public. While there are many ‘helpful bots’ being deployed to assist people with identifying available appointments, it’s important to remember that when a site is polluted with bots, it slows web performance and makes it harder for legitimate users to access the information or services they need."

Roberts adds, "While large retail pharmacies and health systems might have the infrastructure to sustain higher volumes of traffic, smaller institutions and local governments may not. Maintaining uptime becomes a critical challenge as an influx of bot traffic and human traffic can cause a site to slow down considerable or crash. For organizations managing appointment booking sites, it’s important to monitor and analyze traffic sources, investigate traffic spikes, and proactively block hosting providers and proxy servers known to be used by malicious actors. Managing bot traffic must be a critical consideration for the State and local county to ensure citizens can access the tools they need to book their appointment.”

Joseph Carson, chief security scientist and Advisory CISO at Thycotic, a Washington D.C. based provider of privileged access management (PAM) solutions, says, “The latest cyberattack targeting the COVID-19 booking system in London, Ontario, causing several disruptions in the ability to distribute vaccines, is a reminder that some cybercriminals do not care who the victims are or what impact they cause.  This is also a reminder on the importance of strong access security controls to ensure only authorized people can access and to prioritize DDoS protection.  Becoming resilient to cyberattacks must remain a top priority for all services.”

Dirk Schrader, Global Vice President, Security Research at New Net Technologies (NNT), a Naples, Florida-based provider of cybersecurity and compliance software, explains that there are some good tools and services to mitigate this kind of bot attack. "It seems that the Middlesex-London Health Unit resorted to one of them quickly. The particular difficulties here are:

  1. The accuracy needed to distinct bot traffic from regular traffic as no one really wants to block a human from getting an appointment.
  2. The accuracy of the cleanup of appointments made before the solution was in place, for that same reason.
  3. The motives of the cyber crooks behind the bot attack.

Schrader adds, "If this is motivated by financial gains, that is to ‘sell’ an appointment, the fraudulent part is yet to come as cross checks about eligibility will likely cancel the actual vaccination and the person who ‘bought’ it ends up being the framed one. If the motive is of financial nature, we will - most likely – also see a range of websites offering ‘appointment services’ just to collect names, email addresses, credit cards and other PII/PHI or to distribute malware. Unfortunately, the chances are high that such a watering hole attack will be quite successful, given the anxiety related to the topic. The administration needs to continue in their efforts to report openly and swiftly about such scenarios, especially if the motive is to create distrust and unrest.”

Overall, ensuring a fair and stable vaccine registration process is driven by technology, and ultimately, the availability and integrity of these services, says Jack Mannino, CEO at nVisium, a Falls Church, Virginia-based application security provider. "Denial of Service attacks and exploited business logic flaws can make it difficult or impossible to book an appointment. As these services are being rapidly developed and deployed, these risk scenarios must be baked into threat models and proactive controls must be baked into production implementations.”

 

KEYWORDS: bots COVID-19 cyber security healthcare security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-attack

    London Stock Exchange Denies Cyber Attack

    See More
  • capitol-riot-iStock-1354773822.jpg

    Parliaments under attack worldwide — Extremism, riots, vaccine mandates and violence

    See More
  • security-executive-freepik2.jpg

    DHS announces two senior cybersecurity appointments

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing