Coronavirus variants and mutations

Mink outbreaks are a “spillover” from the human pandemic.

THE discovery of two variants of coronavirus has triggered alarm.
Scientists are racing to find out whether these variants are more transmissible or could present challenges for the Covid vaccine.
All viruses naturally mutate, and Sars-CoV-2 is no exception, accumulating an estimated one or two changes a month.
Mutations are usually a chance event that will have little impact on the properties of a virus, says Dr Lucy van Dorp, an expert in the evolution of pathogens at University College London.
“The very vast majority of mutations which we observe in genomes of Sars-CoV-2 are there as passengers,” she says.
“They don’t change the behaviour of the virus, they are just carried along.”
But every once in a while, a virus strikes lucky by mutating in a way that positively affects its ability to survive and reproduce.
“Viruses carrying these mutations can then increase in frequency due to natural selection, given the right epidemiological settings,” Dr van Dorp says.
There is now a frantic push to work out if this is the case for the variant first detected in the UK (B.1.1.7 or VUI-202012/01), which appears to be spreading unusually fast.
A similar but unrelated variant has emerged in South Africa, with a small number of cases now reported in the UK.
The fact both have mutations in a gene that encodes the spike protein, which the virus uses to latch on to and enter human cells, is particularly worrisome.
The UK variant has 14 mutations that cause a change in protein building blocks (amino acids) and three deletions (missing bits of genetic code).
According to the World Health Organisation (WHO), some may influence how fast the virus spreads.
One mutation in the spike protein (known as N501Y) has been detected in several variants, including the one from South Africa. Lab experiments suggest this mutation may help the virus bind to human cells, according to the Centers for Disease Control and Prevention (CDC).
Another mutation in the spike protein (P681H) is thought to be of “biological significance”, according to the WHO
A deletion (at position 69-70) has been linked in the past to mink farm outbreaks and in patients with weakened immune systems who can incubate the virus for several months
The deletion may give some clues to how the variant evolved, perhaps in a patient with a weakened immune system who was unable to fight off the virus enabling it to linger in the body for several months, accumulating mutations along the way.
“The current thinking is it’s evolved so many mutations in the context of a chronic infection,” says Prof David Robertson of the University of Glasgow, who is part of the Cog UK (Covid-19 Genomics UK Consortium), which has analysed the new variant.
A connection with mink is thought highly unlikely. “There’s no evidence mink, or any other animals, are involved but it seems sensible not to rule it out,” says Prof Robertson.
Scientists are now hurrying to find out more about the mutations seen in the UK variant, which has also been spotted in Australia, Denmark, Italy, Iceland and the Netherlands.
The variant found in South Africa, which has one of the same mutations, is also causing concern. It shares the same mutation in the spike protein (N501Y) but has arisen separately. Other mutations are being investigated.
There are strong suspicions both variants may be spreading faster than expected, but this is still unclear.
Sars-CoV-2 has been at the heart of an unprecedented international scientific effort since early January, when researchers in China released the first genome sequence.
Scientists have now sequenced over 250,000 Sars-CoV-2 genomes, which have been shared on open data platforms.
By taking a swab from an infected patient, the genetic code of the virus can be extracted and amplified before being “read” using a sequencer.
The string of letters, or nucleotides, allows genomes and mutations to be compared.
“It is thanks to these efforts, and UK testing laboratories, that the UK variant has been flagged so quickly as a potential cause of concern,” Dr van Dorp says.
Scientific information is now being shared at an astonishing rate.
A key question is whether the mutations might have implications for the effectiveness of vaccines, although many experts consider this unlikely, at least in the short term.
“This will become increasingly important as vaccines are rolled out so that any plausible candidates can be identified early, followed up and tracked,” Dr van Dorp says.
“Longer-term we may be required to reassess the composition of the vaccine and its delivery strategy, so these efforts will be vital. Though for now, it is too early to say.” – BBC

Health to be on cyber-security’s front line in 2021

Ransomware gangs often take a copy of the data they leave scrambled on their targets’ computers Health to be on cyber-security’s front line.

COVID-19 catapulted the health sector to the forefront of cyber-security in 2020, but the next year is likely to see the dangers continue and evolve.
Threats from nation states and criminals to the health system are a growing concern.
The huge logistical challenge of rolling out vaccines faces the risk of disruption to complex supply chains.
And criminal ransomware poses a threat at a time when the pandemic has increased our reliance on technology.

Supply chain
The distribution of the various coronavirus vaccines may bring relief, but it also brings with it a major challenge: many of those involved have not had to think hard about security in the past.
The complex global supply chain for vaccines ranges from factories in one country to internet-connected fridges in another. It will create new pressure on doctors’ surgeries, IT systems, and sometimes small providers who play a critical role.
IBM has already said it has seen suspected state-hackers target the “cold chain” used to keep supplies at the right temperature during transportation.
And in the UK, the National Cyber Security Centre, which worked quickly when the pandemic began to secure vaccine research, has since pivoted its efforts towards vaccine distribution.
At least the large pharmaceutical companies are no stranger to cyber-espionage. Their security officials say they first began thinking hard about the issue after a major espionage campaign back in Spring 2010.
But the issues around the pandemic have changed the sector’s importance.
“We are now on a grander stage,” is how one person involved puts it.
In July, the UK accused Russian intelligence of targeting research, including for the Oxford vaccine, while the US accused Chinese hackers of similar activity.
The emergence of “vaccine nationalism” led intelligence and security officials to raise questions about whether countries could try and undermine the efforts of others going forward.
“It could be trying to steal the intellectual property for financial purposes,” Tonya Ugoretz of the FBI told a recent Aspen Institute Cyber Summit.
“It could be to undermine confidence… or to advantage another country’s own development.
“We see our most determined nation-state adversaries not just relying on one method to target the supply chain, but combining cyber with using more traditional espionage and human sources.”
One much discussed tactic is the deliberate spread of misinformation online about vaccinations, or questioning a country’s safety and testing record. The UK Army’s 77th Brigade has supported a Cabinet Office investigation into whether foreign states are driving anti-vaccine fears within the UK.
Most sentiment was domestically generated, head of Strategic Command General Sir Patrick Sanders said at a recent Chatham House event.
And he raised the possibility of retaliation.
“Where these things are being fuelled from overseas, then we will take action, and if the NCF (National Cyber Force) has a part to play in that, it will.”
Cyber-blackmail campaigns
But despite concerns about states, experts say, criminal ransomware – the locking of people out of their computers and data until they pay – remains the more serious and persistent threat.
There was some talk at the start of the pandemic from criminal gangs that they would not target health. But it did not last and attacks have multiplied.
A recent report from security firm Positive Technologies says half of all the cyber-attacks on healthcare were ransomware in the July-to-September quarter of 2020. US hospitals have been worse hit than the UK. It is thought this is because criminals see them as richer than their NHS counterparts.
In just 24 hours in October, six American hospitals received ransom demands of at least $1m (£810,000), leading to some cancer treatments being cancelled.
“The healthcare sector has become such a big, rich, juicy target,” Greg Garcia, executive director for the US Cybersecurity of the Health Sector Coordinating Council, recently said.
“It’s as if they moved on from the financial services sector.”
The UK has made stride to fix weaknesses in the NHS systems exposed by 2017’s Wannacry ransomware attack. Even so, there are concerns it could be hit again. Dr Saif Abed has long warned that such an attack could kill a patient.
He is a former NHS doctor who left clinical practice to set up the AbedGraham group, which advises on IT security risks to health.
“The thing that’s really concerning is that attackers now understand the concept of clinical urgency,” he says.
“They understand: ‘If we create a risk that disrupts the ability to provide patient care, we’re more likely to get a payout.’”
His worry is that the pandemic has accelerated the digitisation of health.
While that has brought benefits such as consultations taking place online, he says the investment needed to keep internet-connected systems and devices secure has not kept pace.
Dr Abed says he often hears security researchers talk about hacking insulin pumps to kill someone.
But he says a bigger risk is the fact that more devices are being connected together while remaining vulnerable, leading to the risk of a cascade effect.
He adds that his biggest worry is that criminals move from just locking organisations out of their health data to starting to tamper with it, posing risks to patient safety.
The desire to limit further Covid-19 outbreaks may also create a further drive to share data more broadly.
And that in turn may present further opportunities to steal or subvert it.
Another sign that the cyber-security of health is likely to be on the front line in 2021. – BBC