ANESTHESIOLOGY Daily News
  • Meeting Info
  • Sessions
  • Claim CME
ANESTHESIOLOGY Daily News
Day
Friday
Saturday
Sunday
Monday
Tuesday
Topics
Ambulatory Anesthesia
Cardiac Anesthesia
Diagnostic POCUS
Enhanced Recovery After Surgery (ERAS)
Fundamentals of Anesthesiology
Geriatric Anesthesia
Neuroanesthesia
Obstetric Anesthesia
Opioid Crisis
Pain Medicine
Pediatric Anesthesia
Perioperative Medicine
Physician Well-Being & Burnout
Professional Issues
Regional Anesthesia & Acute Pain
Safety & Quality
Technology
Workforce Shortages
Archive
2024
2023
2022
2021
2015-2020
Resources
  • Meeting Info
  • Sessions
  • Claim CME
Topics
  • Ambulatory Anesthesia
  • Cardiac Anesthesia
  • Diagnostic POCUS
  • Enhanced Recovery After Surgery (ERAS)
  • Fundamentals of Anesthesiology
  • Geriatric Anesthesia
  • Neuroanesthesia
  • Obstetric Anesthesia
  • Opioid Crisis
  • Pain Medicine
  • Pediatric Anesthesia
  • Perioperative Medicine
  • Physician Well-Being & Burnout
  • Professional Issues
  • Regional Anesthesia & Acute Pain
  • Safety & Quality
  • Technology
  • Workforce Shortages
By Day
  • Friday
  • Saturday
  • Sunday
  • Monday
  • Tuesday
Archive
  • 2024
  • 2023
  • 2022
  • 2021
  • 2015-2020
Facebook iconTwitter X icon LinkedIn iconInstagram iconBluesky
Oct 13th, 2025

Are you afraid of code dark?

As cyberattacks increase and intensify, anesthesiologists should be prepared to identify warning signs, pivot processes, and survive the aftermath.


From left to right: Lindsey Rutland, MD, FASA, Anthony Fritzler, MD, FASA, Olga Leavitt, MD, and Sagar Mungekar, MD
From left to right: Lindsey Rutland, MD, FASA, Anthony Fritzler, MD, FASA, Olga Leavitt, MD, and Sagar Mungekar, MD

Today, a single medical record has a black market value of at least $250, according to IBM. This steep payout, plus the expanded ease with which hackers can initiate a cyberattack, has led to a rise of security breaches in hospital systems in the United States. In fact, Sagar Mungekar, MD, said: “It’s not a matter of if it will happen, but when it will happen.”

“Code dark” refers to a specific cyberattack that is done on purpose and with malice or malintent, according to Sunday’s panel “Code Dark: Hospital System Cyberattack Preparation and Management.”

Dr. Mungekar, session moderator and an Assistant Professor, Vice Chair of Data Analytics, and Cardiothoracic Anesthesiologist at Rutgers Health Robert Wood Johnson Medical School in New Jersey, led a succinct review of elements to consider before, during, and after a code dark event. He posed questions to three panelists, who supplied attendees with their firsthand knowledge and experience.

Panelists Olga Leavitt, MD, and Lindsey Rutland, MD, FASA, both work in hospitals that underwent a cyberattack. Dr. Leavitt is a Pediatric Anesthesiologist and Vice Chair of Operations at the Ann & Robert H. Lurie Children’s Hospital of Chicago. Dr. Rutland is a Pediatric Anesthesiologist at Dell Children’s Hospital in Austin, Texas.

Anthony Fritzler, MD, FASA, a Pediatric Anesthesiologist at Akron Children’s Hospital in Ohio, has not personally witnessed a cyberattack, but he is the department lead of his organization’s preparedness plans.

How and why?

A code dark cyberattack can originate in several ways. A hospital employee may click on a web link or email attachment that initiates the hostile takeover. Spear-phishing, or custom phishing, is a sophisticated and realistic technique that hackers use to get people to reveal information.

The warning signs can be subtle, causing people to overlook or misinterpret them. In Dr. Leavitt’s case, she said the hospital had a few glitches in Pyxis that weren’t perceived as threatening. Unfortunately, the next day she came to work to find a widespread shutdown of the network — from the EMR to departmental systems (lab, imaging, pharmacy, blood blank, etc.) and communications (phone, email, pagers). Her hospital couldn’t even track patients as they were admitted to and moved throughout the hospital. In the early hours, she said they only had their personal phones, a few walkie talkies, and overhead speaker announcements to facilitate communication.

In the Ascension cyberattack, Dr. Rutland said the culprit was an off-site server that wasn’t properly secured. The health system uses disparate systems, which turned out to be a benefit in this case as certain departments, including anesthesiology, were able to create an alternate network and get back online more quickly than if all systems had been impacted.

Who and where?

A code dark event impacts everyone, starting at leadership and trickling all the way down to the patients. Step one, Dr. Leavitt said, was to gather the anesthesiology department and evaluate which cases could proceed and which could not — part of her hospital’s standard downtime procedure. From there, department leaders met to look at the following day’s schedule and ensure certain teams wouldn’t be overburdened.

It’s also common for institutions to put together a command center that takes ownership of patient communications and media relations. Panelists agreed it helps to be as transparent with patients as possible to maintain trust in the institution and overall health care industry.

So, what happens after the initial shock and stress of a cyberattack wear off? Where do physicians and employees go from there to come together and move forward?

“After a few days, everybody got in the stride of things, and we settled into a routine. But when the EMR came back up, it was a collective sigh of relief and things got easier,” Dr. Rutland said. “You take for granted how easy it is with the EMR — it adds some things, but it definitely subtracts time and makes things pretty seamless. I’m very grateful for the EMR.”

What’s the answer?

Regardless of fault, code dark isn’t necessarily preventable, but there are some actions an organization can undertake to help hinder hackers. For example, Dr. Rutland said her hospital implemented enhanced security measures like frequent password resets following the event.

Dr. Fritzler said education on what phishing looks like is critical, as is establishing an easy and clear method for employees to report possible phishing.

“Downtimes are usually shorter and last maybe hours, such as scheduled downtimes, whereas code darks and cyberattacks can last weeks or months. Most people are not prepared to deal with that length of downtime and familiarity with downtime,” Dr. Fritzler said. “We don’t get a lot of exposure to going through the steps of navigating through a downtime, especially an extended downtime.”

In addition to regular reviews of if-then scenarios, panelists offered preparatory action items such as

  • Advanced training on paper charting
  • Established huddle protocols
  • Creation of EMR-replicated order sets.

The latter of these can be a vital aid in preserving time, said Drs. Leavitt and Rutland. Clinicians can access packets of common order sets rather than having to individually create these from scratch when pressure is already added.

Another helpful item to consider in advance, Dr. Fritzler said, is a read-only or shadow-only system that runs on a separate network and can be accessed in emergency scenarios. BCA (business continuity access) downtime computers may be beneficial as well, but typically only help for a week.

“I tell people you have to travel back in time, that’s really how you navigate through one of these,” he said, which could mean storing antiquated materials like whiteboards and protocol binders to use in the event of a code dark.

From The ASA Monitor
Controlled Substances in the OR: QMDA Survey Results
Controlled Substances in the OR: QMDA Survey Results
Insights from ASA's Chief Advocacy Officer
Insights from ASA's Chief Advocacy Officer
ASA CPMed Sharing Plans and Priorities
ASA CPMed Sharing Plans and Priorities
Central Line Inside the Monitor Podcast - Advocacy
Central Line Inside the Monitor Podcast - Advocacy
ASA Monitor+: Reducing 30-day Postoperative Morbidity and Mortality
ASA Monitor+: Reducing 30-day Postoperative Morbidity and Mortality
FAER-Helrich Research Lecture: Dr. Ken Solt
FAER-Helrich Research Lecture: Dr. Ken Solt
More Content
From left to right: Allen Dennis, MD, MS, Sudheer Potru, DO, FASA, FASAM, Curtis Bone, MD, MHS, and Christopher Yopp, MD, MPH
Home
Supporting patients with substance use disorder
Oct 13th, 2025
From left to right: William Rosenblatt, MD, Lauren Berkow, MD, FASA, and Michael Aziz, MD
Fundamentals of Anesthesiology
A healthy debate on intubation techniques
Oct 13th, 2025
Amy Vinson, MD, FAAP
Home
Tackling the well-being crisis
Oct 13th, 2025
From left to right: Kenneth Cummings, MD, MS, FASA, DFPM, David Hepner, MD, MPH, FASA, Obianuju Okocha, MD, and Angela Selzer, MD, FASA, DFPM
Perioperative Medicine
More than patient prep
Oct 13th, 2025
From left to right: Smitha Arekapudi, MD, SM, MBA, FASA, Jiapeng Huang, MD, PhD, FASE, FASA, and Marc Zemel
Technology
This idea went to market
Oct 13th, 2025
From left to right: Harmandeep Singh Boparai, MD, Bonnie Milas, MD, Marie Theard, MD, FASA, and Monica Vavilala, MD
Safety & Quality
An ounce of prevention
Oct 13th, 2025
From left to right: Sanjay Sinha, MD, Sylvia Wilson, MD, and Santhanam Suresh, MD, MBA, FASA
Ambulatory Anesthesia
Right knee, left knee, good knee, bad knee
Oct 12th, 2025
From left to right: Charles Manakpalah, MD, MS, Chuma Azoba, MD, Sara Medellín Reina, MD, Elyad Ekrami, MD, and Sebastian Amaya, MD
Home
Supporting global peers, improving patient care
Oct 12th, 2025
From left to right: ASA President Donald Arnold, MD, FACHE, FASA, talks with Lucy Kalanithi, MD, FACP
Professional Issues
Finding humanity through tragedy
Oct 12th, 2025
Keith Ruskin, MD, FASA, expounds on the pitfalls of artificial intelligence as Monica Harbell, MD, FASA (center), and Jason Cheng, MD, FASA, look on.
Home
Is artificial intelligence your friend or foe?
Oct 12th, 2025
From left to right: Zachary Deutch, MD, FASA, Michael Eaton, MD, FASA, and William Roberts, MD, PhD
Workforce Shortages
Innovative staffing solutions offer hope amid workforce challenges
Oct 12th, 2025
From left to right: Beverly Chang, MD, Robert F. Groff, MD, and Alisha Sachdev, MD, FASA
Perioperative Medicine
Perioperative sepsis: The silent threat in surgical care
Oct 12th, 2025
ANESTHESIOLOGY Daily News
© 2025 American Society of Anesthesiologists (ASA)
1061 American Lane | Schaumburg, IL 60173