Tag Archive for: increasing

Healthcare Ransomware Attacks are Increasing: How to Prepare


The healthcare industry has seen a significant increase in ransomware attacks in the past few years, with a 94% increase in the last year alone. The amount of patient data collected, and the rapid technological development happening in the industry, make it an attractive target, notably when combined with small cybersecurity budgets. Sophisticated cyber actors leveraging common management tools make recent attacks hard to spot, as they are challenging to decipher from legitimate business activities.

Zero-trust network access (ZTNA) is the first step to preventing these types of attacks. This means that no one from inside or outside the organisation is trusted on the network, and any access to data or resources must include verification and authorisation. Multi-factor authentication (MFA) is a good place to start, as it requires additional authentication beyond username and password credentials. Additionally, ensure that only those users who truly need access to data and systems have it, following the principle of least privilege. The fewer entry points into a network, the better.

Assessments are key to improving cybersecurity within a healthcare organisation, especially when working with a tight cybersecurity budget. It is much easier to determine where to focus limited resources when it is clear where there are weaknesses or vulnerabilities, and an understanding of the cyber risk to data, systems, or processes that are critical to protect. Automation can assist in making the most of limited resources, including implementing automated endpoint device configurations and patch management. Making endpoints more resilient will assist in eliminating weaknesses in a network, as most ransomware attacks start with access to a single endpoint.

It is more important than ever that the healthcare industry prioritise cybersecurity in order to protect sensitive patient data and continue operations without disruption in an increasingly digital healthcare world.

Healthcare CISOs and their teams need to consider the following strategies for getting started:

Get a compromise assessment done first and consider an incident response retainer.

Source…

Ransomware attacks increasing in frequency, spreading in reach | Local


Ransomware attacks, like the one that cost Hanesbrands Inc. about $100 million in second-quarter sales, are increasing in frequency among corporations facing uncertain prospects of a complete restoration and recovery.

Ransomware is a type of malicious software employed by hackers that can block access to a computer system until a ransom is paid.

The Winston-Salem-based apparel manufacturer reported in a May 31 regulatory filing that it began experiencing the ransomware attack on May 24.

Hanesbrands disclosed Aug. 11 in its second-quarter earnings report that its global supply chain network and ability to fulfill customer orders were affected for about three weeks.

“At this time, we believe the incident has been contained,” the manufacturer said in a separate quarterly regulatory filing Aug. 11.

Source…

Hackers hit health companies, insurers with increasing regularity – Indianapolis Business Journal


Of all the industries in the country, health care might be the juiciest for cyberhackers. And around central Indiana, institutions large and small are paying the price.

In the past few years, some of the region’s largest health care players—including Indiana University Health, Eskenazi Health and Elevance Health (formerly Anthem Inc.)—have seen patient or customer information compromised by hackers.

So have some of the area’s smaller hospitals, including Hancock Health and Johnson Memorial.

Hospitals, health insurers and medical clinics are loaded with patient and employee data that can be mined for identity and medical theft. Hackers can shut down computer systems for days or weeks, holding hospitals hostage until ransom is paid.

One of the latest attacks became public last month when the Maine Attorney General’s Office disclosed that a software vendor to Indiana University Health and nine other U.S. health systems was attacked.

The vendor, MCG Health, told authorities an “unauthorized party” obtained names, Social Security numbers, medical codes, postal addresses, telephone numbers, email addresses, birthdates and gender information for 1.1 million patients of about 10 hospital clients.

IU Health, the largest hospital system in Indiana, said it notified 60,000 patients about the breach, but declined to reveal details or answer further questions.

“Because this is MCG’s data breach, we recommend you contact them for information. They would have specific details relating to the breach,” IU Health said in a brief statement.

MCG, based in Seattle, did not respond to emails and phone calls from IBJ. Multiple class action lawsuits have been filed against the software company, a subsidiary of Hearst Health, in a federal district court in Washington state. The lawsuits allege negligence, invasion of privacy, breach of confidence and violations of consumer protection laws. IU Health and the other hospital systems were not named as defendants.

Nationally, cybersecurity breaches in the health care sector hit an all-time high in 2021, with nearly half of all hospitals in the country reporting an attack, according to a report from cybersecurity…

Source…

Russian hackers increasing efforts after cyberattack shut down Ukraine internet


Russia carried out a cyberattack during the beginning of its invasion of Ukraine, cutting off from the internet thousands of modems throughout Europe, officials from the U.S., Great Britain, Canada, Estonia and the European Union announced Tuesday.

SpaceX founder Elon Musk, whose Starlink satellites have helped ensure Ukrainians’ access to the internet amid Russia’s invasion, warned that Kremlin forces are “ramping up their efforts.” So far, “Starlink has resisted Russian cyberwar jamming & hacking attempts,” he added.

Russian hackers attacked Viasat’s KA-SAT network in late February as Russian forces marched into Ukraine, the Western governments reported.

U.S. Secretary of State Antony Blinken said Russia launched the cyberattack to “disrupt Ukrainian command and control during the invasion, and those actions had spillover impacts into other European countries.” 

British Foreign Secretary Liz Truss called the cyberattack “deliberate and malicious.” Russia was primarily targeting the Ukrainian military, but had disrupted wind farms and internet users in Central Europe, as well, Truss added, citing Britain’s National Cyber Security Centre.

The Council of the European Union said the digital hack caused “indiscriminate communication outages” in Ukraine and other EU member nations.

Elon Musk
Elon Musk has been helpful providing Ukraine internet access during Russia’s invasion.
AP/ Ringo H.W. Chiu

“This unacceptable cyberattack is yet another example of Russia’s continued pattern of irresponsible behavior in cyberspace, which also formed an integral part of its illegal and unjustified invasion of Ukraine,” the council said in a statement.

The cyberattack caused immediate outages for satellite internet users across Europe and affected modems had to be manually replaced.

“After those modems were knocked offline it wasn’t like you unplug them and plug them back in and reboot and they come back,” U.S. National Security Agency Director of Cybersecurity Rob Joyce told Reuters. “They were down and down hard; they had to go back to the factory to be swapped out.”

Ukraine
The cyber hack caused “indiscriminate communication…

Source…