Jefferson Surgical Clinic Reports June 2021 Data Breach with 174,769 Individuals Affected

Jefferson Surgical Clinic in Roanoke, VA has started informing patients concerning the potential compromise of some of their protected health information (PHI) because of a cyberattack that was discovered on June 5, 2021. As per the breach notification letter sent to the Maine Attorney General, the attacker obtained access to sections of the network that held patient data like names, Social Security numbers, dates of birth, and medical and treatment data. Jefferson Surgical Clinic quickly informed the FBI regarding the breach and employed third-party cybersecurity and forensics professionals to support the investigation. The investigation found no information that indicates any…

Log4j Version Three to Solve High Severity DoS Vulnerability

The original vulnerability determined in Log4j (CVE-2021-44228) that stunned the world thanks to its seriousness, ease of exploitation, and the magnitude of its effect on the software programs and cloud solutions, is not the only vulnerability present in the Java-based logging utility. Right after the launch of version 2.15.0 to fix the vulnerability, version 2.15.0 stayed vulnerable particularly to non-default configurations due to an incomplete patch. The most recent vulnerability CVE-2021-45046 was fixed in version 2.16.0 of Log4j. In the beginning, the low severity vulnerability had a CVSS rating of 3.7; however, the severity score turned to critical (CVSS 9.0)….

Patient Information Stolen During a Cyberattack on the Medical Review Institute of America

The Medical Review Institute of America (MRoiA) encountered a supposed ransomware attack last November 2021 that led to the stealing of sensitive patient information. MRoiA is granted access to patient data by HIPAA-covered entities because of the clinical peer evaluation process of healthcare providers. Based on a data breach notice furnished to the Vermont attorney general, MRoiA stated it experienced a sophisticated cyberattack that was discovered on November 9, 2021. Third-party cybersecurity specialists were quickly involved to do a forensic investigation to find out the nature and extent of the attack and to help with its remediation initiatives, which include…

PHI of About 400,000 Monongalia Health Patients Possibly Compromised in BEC and Phishing Attack

Monongalia Health System based in Morgantown, WV has started alerting about 400,000 patients that unauthorized individuals may have obtained some of their protected health information (PHI) in a recent cyberattack. Monongalia Health System discovered the security incident only when one of its vendors reported not receiving a July 2021 payment that had left Monongalia Health’s accounts. Based on the investigation of the incident, it was confirmed there was a business email compromise (BEC) attack. The attacker had utilized a phishing email to acquire the credentials for the email account of a Monongalia Health contractor. Then, the threat actor used it…

PHI of 57,000 TriValley Primary Care Patients Potentially Compromised in Cyberattack

TriValley Primary Care based in Perkasie, PA has started sending notifications to 57,596 patients regarding the potential compromise of some of their personal data and protected health information (PHI). Suspicious activity was noticed in its IT system on October 11, 2021. The healthcare provider took steps promptly to secure its systems and stop further unauthorized access. Third-party forensic specialists helped in investigating the incident to ascertain the nature and impact of the cyberattack. The investigation into the breach ended on November 4 and although no evidence of actual or attempted patient data misuse, unauthorized access and potential theft of PHI…

Iranian APT Actors Exploit Microsoft Exchange and Fortinet Vulnerabilities

The Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Cybersecurity and Infrastructure Security Agency (CISA), and the United Kingdom’s National Cyber Security Centre (NCSC) have issued a joint cybersecurity alert to warn about the continuing attacks on critical infrastructure industries such as the medical care and public health industry by an Iranian Advanced Persistent Threat (APT) actor. Cyber actors well-known for being connected with the Iranian government are taking advantage of vulnerabilities identified in the Fortinet FortiOS operating system beginning March 2021, and are using a Microsoft Exchange ProxyShell vulnerability to obtain access to targets’ systems beginning October…

Maxim Healthcare Group Informs 65,000 People Regarding October 2020 Email Breach

Maxim Healthcare Group based in Columbia, MD has begun informing 65,267 people concerning a historic breach of its email system and the compromise of their protected health information (PHI). Maxim Healthcare Group, which consists of Maxim Healthcare Staffing and Maxim Healthcare Services, stated it detected suspicious activity in its email system approximately December 4, 2020. It took steps to stop further unauthorized access and started an investigation to find out the nature and extent of the breach. The investigation showed that unauthorized people got access to a number of employee email accounts from October 1, 2020, to December 4, 2020….

Ransomware Groups Exploit Company Financial Events For Extortion

Ransomware groups frequently utilize double extortion techniques to compel victims to give ransom payments. Besides file encryption, they steal sensitive information and issue a threat to sell or post the stolen information when no ransom is paid. The Federal Bureau of Investigation (FBI) has recently released a private industry advisory regarding a new extortion strategy, where ransomware groups attack businesses and organizations that are engaged in important time-sensitive financial activities, steal sensitive financial information, then threaten to expose that data when payment isn’t made. Ransomware groups perform substantial research on their victims prior to starting an attack, including collecting publicly…

PHI Compromised in Tech Etch Ransomware Attack and UNC Hospitals Insider Breach

Tech Etch based in Plymouth, MA manufactures adaptable printed circuits, precision-engineered thin metal parts, and EMI/RFI shielding. It has reported a ransomware attack that resulted in the potential compromise of the personal data and protected health information (PHI) of current and former employees. Organizations such as Tech Etch would not typically be expected to adhere to HIPAA; nonetheless, the firm provides a health plan for its workers and, therefore, is categorized as a HIPAA-covered entity. Tech Etch identified the ransomware attack on August 25, 2021. The investigators determined that the attackers acquired access to its network last August 20. Tech…

Premier Patient Health Care and Oregon Eye Specialists Submits Data Breach Report

Premier Patient Health Care located in Carrollton, TX has learned that an unauthorized individual had acquired the protected health information (PHI) of 37,636 patients during an insider data breach. Premier Patient Health Care is an Accountable Care Organization (ACO) that collaborates with medical professionals to make improvements to clinical results covered by the Medicare Shared Savings Program (MSSP). The ACO and Premier Patient Health Care are run by Premier Management Company, a business associate to numerous primary care doctors who are covered entities by HIPAA. On April 30, 2020, Wiseman Innovations, a technology merchant utilized by Premier Management Company, confirmed…

Medtronic MiniMed Remote Controllers Recalled Due to Major Cybersecurity Issue

The Food and Drug Administration (FDA) has given a notification to end-users of Medtronic wireless insulin pumps concerning a critical security vulnerability impacting a number of remote controllers. MiniMed insulin pumps are employed to deliver insulin to help control diabetes. The pumps come with an optional remote controller device for connecting wirelessly with the insulin pump. A security analyst found a cybersecurity issue in older versions of remote controllers that employ previous-generation technology that can likely be used to cause harm to consumers of the pumps. An unauthorized individual could use the cybersecurity vulnerability to report and playback the wireless…

CISA Revises List of Cybersecurity Bad Practices to Remove

The Cybersecurity and Infrastructure Security Agency (CISA) has modified its checklist of cybersecurity bad practices that need to be eliminated. Cyber threat actors usually perform highly sophisticated attacks to obtain access to internal sites and sensitive records, yet in many cases, sophisticated strategies, techniques, and procedures aren’t necessary. The Bad Practices Catalog was made in July 2021 to improve knowledge of a number of the most egregious problems in cybersecurity that allow attackers to do the job. There have been numerous listings posted on cybersecurity best practices to adhere to, and although it is important that those practices are put…

Cyberattack Forces Memorial Health System to Move Patients to Alternative Hospitals

Memorial Health System located in Marietta, OH was pressured to redirect emergency care because of an alleged ransomware attack. When the cyberattack happened, the health network was compelled to de-activate IT systems to restrict the attack. Emergency practices were executed as a result of the insufficiency of access to critical IT systems, and the staff members are utilizing paper records. Memorial Health System manages three hospitals in West Virginia And Ohio, all of them were impacted by the cyberattack. Considering that electronic health records cannot be accessed, patient safety was likely put at stake, and so the option was taken…

Email Account Breaches Reported by Wisconsin Institute of Urology and Prestera Center

Prestera Mental Health Center located in West Virginia began informing 2,152 individuals regarding a security breach affecting employee email accounts. On or approximately April 1, 2021, Prestera Center discovered that selected worker email accounts were accessed without authorization between August 2020 and September 2020. Although the unauthorized access was confirmed, the center wasn’t possible to determine whether any patient data had been viewed or copied. A review was done to know the types of information that were included in the email accounts and which people were affected. The types of information in the account differed from person to person and…

45,000 Patients Potentially Affected by Cyberattack on Florida Heart Associates

Florida Heart Associates is informing 45,148 patients regarding one recent security breach that resulted in the compromise of their personal data and protected health information (PHI). The security breach was discovered some time in May 19, 2021, because of strange activity seen within selected networked computers. Florida Heart Associates immediately took steps to manage the breach and protect personal data and launched an investigation to find out the nature and extent of the breach. Florida Heart Associates confirmed the breach of its computer system from May 9 to May 19, 2021. Security systems were put in place before the breach…

Philips Vue PACS Products Affected by Multiple Critical Vulnerabilities

Several vulnerabilities were found in Philips Vue PACS items, 5 were critical vulnerabilities having a 9.8 severity score and 4 were high severity vulnerabilities. Attackers can exploit a few of the vulnerabilities remotely with a low attack complexity. An attacker that successfully exploits the vulnerability would be able to acquire system access, snoop, view and change information, execute arbitrary code, set up unauthorized software programs, or compromise system integrity and acquire access to sensitive information, or adversely impact the availability of the system. Philips reported the vulnerabilities lately to CISA as well as the impacted list of Philips Vue PACS…

NIST Releases Critical Software Definition for U.S. Federal Agencies

President Biden’s Cybersecurity Executive Order demands all federal bureaus to re-examine their strategy to cybersecurity, create new options of assessing software, and carry out modern security methods to minimize risk, for example, multi-factor authentication, encryption for data at rest and in transit, and using a zero-trust approach to security. One of the very first specifications of the Executive Order was for the National Institute of Standards and Technology (NIST) to issue a definition of critical software, which the Cybersecurity and Infrastructure Security Agency (CISA) will utilize to produce a listing of all software covered by the Executive Order and for…

Prominence Health Plan and Ohio Medicaid Data Breach

The Nevada health insurance provider Prominence Health Plan has reported it experienced a security breach on November 30, 2020 resulting in the potential acquisition of the protected health information (PHI) of some plan members by hackers. Prominence Health Plan discovered the data breach on April 22, 2021 and took immediate action to avoid continuing unauthorized access, which includes altering the credentials utilized by the attacker to obtain network access. Although Prominence Health Plan hasn’t established whether or not this was a ransomware attack, all impacted plan member information has been recovered from backup copies. The breach affected the audio recordings…

Avaddon Ransomware Group Closes Down Its Operations and Issues Decryption Keys

On June 11, the Avaddon ransomware-as-a-service operation was deactivated and the threat group gave the decryption keys for all its victims. Bleeping Computer received a message with a security password and a URL to a password secured ZIP file that included the individual keys for 2,934 Avaddon ransomware attack victims. The keys were affirmed as legit by Emsisoft and Coveware, with the former right now having revealed a free decryptor that could be employed by all Avaddon ransomware victims to decrypt their data files. Avaddon is a rather new ransomware-as-a-service operation that initiated in March 2020. The threat group responsible…

FBI Warning Regarding Persistent Exploitation of Fortinet Vulnerabilities by APT Groups

The Federal Bureau of Investigation (FBI) has released a Flash Advisory cautioning Fortinet Fortigate appliances users that Advanced Persistent Threat (APT) groups are going to exploit devices that lack patching for three CVEs: CVE-2020-12812, CVE-2019-5591, and CVE-2018-13379. These aren’t zero-day vulnerabilities, because patches are already accessible for a time. Numerous businesses are actually slow to employ the patches and are right now being targeted. In early April, the FBI, together with the DHS’ Cybersecurity and Infrastructure Security Agency (CISA) published a Joint Cybersecurity Advisory telling that threat actors can exploit the vulnerabilities to execute data exfiltration, data encryption, and to…

Data Exposed at ZocDoc and Cincinnati Parenting Center Breaches

ZocDoc in New York, which offers a platform that enables would-be patients to reserve consultations with physicians and dentists, has uncovered a problem in its software program that made it possible for patient records to be viewed by health care and dental practices when viewing ought to have been limited. The investigation showed programming flaws had taken place from August 2020 right until the issues were identified and fixed, a number of past and present practice workers got access to the provider site, even though their accounts must have been either terminated, erased, or been restricted. On all occasions, the…

CISA Gives Guidance on Evicting Adversaries from Networks Following the SolarWinds Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued guidance on ousting threat actors from systems breached in the SolarWinds Orion supply chain attacks and, even succeeding breaches of Active Directory and M365 environments. The attacks were credited to threat actors linked with the Russian Foreign Intelligence Service (SVR). After acquiring network access by means of the update system of SolarWinds Orion, the threat actor picked its targets of interest for additional exposure and ignored multi-factor authentication strategies and moved laterally into Microsoft 365 environments by compromising federated identity solutions. The majority of the targets chosen for more compromise include…

Information of 200,000 Military Veterans Compromised On the Internet

A database made up of the personal data and protected health information (PHI) of more or less 200,000 U.S. military veterans was determined to be available on the web by security specialist Jeremiah Fowler. The database was found on April 18, 2021 and an evaluation pointed out references to a business entity named United Valor Solutions located in Jacksonville, NC. United Valor Solutions is a service provider of the Department of Veterans Affairs (VA) that delivers disability review services for the VA and many other government bureaus. The database – that included veterans’ names, contact details, birth dates, medical data,…

Californian Healthcare Service Provider Discovers Exposure of Patient Information Online for Over a Year

Doctors Medical Center of Modesto (DCM) based in California learned that a company used by a previous vendor accidentally exposed patient data online. DCM had employed the SaaS platform firm Medifies for its virtual waiting room services. DCM found out on April 2, 2021 that some of its patients’ data were accessible on the internet. Upon DCM’s inquiry of Medifies concerning the exposed data, the problem was sorted out on the same day and the data was secured. The inquiry into the data breach revealed the occurrence of an error during the conduct of a software system update that is…

Wyoming Department of Health Makes Announcement of GitHub Data Breach Impacting 164,000 Persons

The Wyoming Department of Health (WDH) has found out that the protected health information (PHI) of 164,021 persons was accidentally compromised on the web as a result of a blunder made by a member of its labor force. On March 10, 2021, WDH learned that a staff member had published documents with medical test information to public and private databases on the software development platform GitHub. Although security controls are set up to take care of users’ privacy, a mistake by the staff meant the information could likely have been viewed by people unauthorized to see the data since January…

Threat Group Actively Exploiting Pulse Connect Secure Vulnerabilities and Also New Zero-Day Vulnerability

The latest advisory from the DHS’ Cybersecurity and Infrastructure Security Agency (CISA) reported that one or more threat group is exploiting vulnerabilities identified in Ivanti’s Pulse Connect Secure devices. Though there is no formal attribution, certain security researchers had associated the threat actor with China. Targets of attacks are government, security, finance, and critical infrastructure institutions. FireEye has been keeping track of the malicious activity and claims that no less than 12 malware families were used in cyberattacks taking advantage of the vulnerabilities starting August 2020. These attacks included the collection of credentials to permit lateral movement in victim systems…

NAME:WRECK DNS Vulnerabilities Impact 100 Million+ Devices

Forescout and JSOF researchers have found 9 vulnerabilities in internet-linked devices which can be taken advantage of in remote code execution and denial-of-service attacks. The vulnerabilities were seen in specific usage of the Domain Name System (DNS) protocol in TCP/IP network communication stacks. The vulnerabilities are typically a result of how parsing of domain names happens, which could go against DNS implementations, and issues with DNS compression, that devices employ to compress information to converse online utilizing TCP/IP. This type of vulnerabilities was given the name NAME:WRECK. They impact common IoT and operational technology systems, such as IPnet, FreeBSD, NetX…

Third-Party Data Breaches Announced by Apple Valley Clinic & BioTel Heart

A ransomware attack on one of the IT vendors of Apple Valley Clinic in Minnesota resulted in the potential compromise of the protected health information of 157,939 of its patients. Apple Valley Clinic, which is with Allina Health, utilized Netgain Technology LLC for hosting its IT network and computer networks. In November 2020, Netgain encountered a ransomware attack that led to the taking down of its data off the web. Netgain informed Apple Valley Clinic on December 2, 2020 concerning the exposure of patient information during the ransomware attack. Allina Health acquired affirmation on January 29, 2021 regarding the impact…

New Report Exposes COVID-19 Themed Phishing Strategies

At the start of 2020, phishers began exploiting the pandemic and deviated from their normal lures to an array of pandemic-correlated themes for their phishing activities. One year after the pandemic began, the Palo Alto Networks Unit 42 Team researchers reviewed the phishing trends over the past year to see the variations in the tactics, techniques, and procedures (TTPs) of phishers and the level to which COVID-19 was utilized in their phishing activities. The researchers reviewed all phishing links discovered from January 2020 and February 2021 to find out the number that had a COVID-19 motif, utilizing certain keywords and…

Hackers Accessed 150,000 Verkada Security Cameras Including Live Feeds and Stored Video Footage

A hacking collective has acquired access to the systems of Verkada Inc., a Californian security camera startup, and viewed the live feeds and archived video footage from surveillance cameras connected to the cloud, which are utilized by big corporations, hospitals, police departments, schools, and jails. As originally reported by Bloomberg, a white hat hacking group called Advanced Persistent Threat 69420 accessed Verkada’s systems by using credentials they got online. The credentials allowed the group to have super admin-level privileges, so it has root access to the surveillance cameras and, in certain instances, the internal systems of Verkada’s customers. The hackers…

Phishing Attack on Saint Agness Medical Center Saint Alphonsus Health System and Southeastern Minnesota Center for Independent Living

Because of a phishing attack suffered by Saint Alphonsus Health System based in Boise, ID, the data of its patients were likely exposed, as well as the information of patients of Saint Agnes Medical Center located in Fresno, CA. Saint Alphonsus discovered abnormal activity in the email account of a worker on January 6, 2021. The provider quickly protected the email account and looked into the breach to find out the origin and character of the incident. Saint Alphonsus confirmed that an unauthorized person viewed the account on January 4, 2021, allowing the individual to access the account and the…

About 100,000 People Impacted by Cochise Eye and Laser Ransomware Attack

The ophthalmology and optometry provider based in Sierra Vista, AZ, Cochise Eye and Laser, encountered a ransomware attack last January 13, 2021 that brought about the encryption of the company’s patient scheduling and billing software program. Because of the attack, Cochise Eye and Laser could not access any information in its scheduling program. It continued to provide eye care services to patients, albeit using paper charts. Based on a breach notice published on its website on February 17, 2021, the company still use paper charts because the scheduling system is still not working. The investigators of the ransomware attack did…

Information Concerning Healthcare Sector Cyber Threats and the Supply Chain Aiding Criminal Activity

During the pandemic, cybercriminals exploited new opportunities and have been launching attacks on hospitals, physician clinics and other firms and institutions on the front line in the struggle against COVID-19. Cyber attacks on the healthcare field increased in 2020, specifically in the fall because a synchronized campaign had numerous healthcare victims. Ransomware continues to be a serious threat to the healthcare segment and more attacks have persisted into 2021. A current CTIL League report presents more data on these attacks and a number of the strategies employed to target the healthcare industry in 2020. The report shows the work carried…

Breach of Information at Rehoboth Mckinley Christian Health Care Services Captial Medical Center and Sutter Buttes Imaging Medical Group

Two healthcare companies have encountered ransomware attacks wherein sensitive information was exfiltrated and exposed on the web as the victims didn’t pay the ransom demand. The Conti ransomware group has publicized information on its leak website which was apparently acquired in an attack on Rehoboth McKinley Christian Health Care Services based in New Mexico. The exposed details include sensitive patient details such as patient ID cards, diagnoses, treatment data, diagnostic data, passports, and driver’s license numbers. It is uncertain how many people have had their PHI compromised thus far. The Conti ransomware gang says it has merely posted about 2%…

Ransomware Attacks Cause Almost Half of Healthcare Data Breaches

Tenable publicized a new report which showed that nearly half of all healthcare data breaches are due to ransomware attacks, and in many of the cases the attacks could have been prevented. Based on the Tenable Research 2020 Threat Landscape Retrospective Report, there were 730 data breaches reported from all industry categories in 2020’s first 10 months and more than 22 billion records had been exposed. The exposed healthcare data records were 8 million. Healthcare listed the largest number of data breaches of any industry segment from January to October 2020, accounting for nearly 1/4 of all documented data breaches….

About 560 U.S. Healthcare Facilities Affected by 2020 Ransomware Attacks

Ransomware attacks have had an enormous effect on enterprises and institutions in America, and 2020 was notably a bad year. Ransomware gangs targeted the healthcare field, education segment, and federal, state, and municipal government authorities and agencies. There were about 2,354 attacks on these industries in 2020, as per the newest State of Ransomware report by Emisoft, a cybersecurity company based in New Zealand. The number of ransomware attacks went up dramatically in late 2019, and though the attacks slowed down in the first 6 months of 2020, a serious coordinated campaign started in September when attacks considerably increased and…

CISA Alerts Of Potential Cloud Breaches Due To Poor Cybersecurity Practices

CISA has recently alerted organizations to the fact that cybercriminals are taking advantage of vulnerable cloud environments due to the lack of proper cyber hygiene. This warning is especially pertinent as many businesses have moved to a remote workforce during the pandemic. Consequently, CISA is urging organizations to ensure they have implemented the necessary security measures to protect their cloud environments. The SolarWinds Orion supply chain attack is believed to have employed some of the tactics outlined in the report, however, no specific threat group has been identified as the culprit. Furthermore, multiple threat actors are taking advantage of these…

HITECH Act Amendment To Give Cybersecurity Safe Harbor Now Approved

On January 5, 2020, President Trump approved a bill (HR 7898) that improves the Health Information Technology for Economic and Clinical Health Act (HITECH Act) and gives a safe harbor for firms that have carried out accepted security best practices before suffering from a data breach. Though the bill won’t go so far as stopping the Department of Health and Human Services’ Office for Civil Rights from issuing financial penalties for HIPAA compliance problems that triggered a data breach, the amendment necessitates OCR to consider the security steps put in place to lessen cybersecurity risk during the one year before…

Cyberattacks in the Healthcare Sector Higher by 45%

In the fall of 2020, CISA, FBI, and HHS cybersecurity issued a joint alert to the healthcare and public health field subsequent to an increase in ransomware activity. The joint notice discussed that threat actors are actively targeting the healthcare sector to infect systems with ransomware. Many ransomware gangs had heightened attacks on the medical and public health segment. The Ryuk and Conti gangs are the most dynamic. Check Point’s new report reveals that attacks kept on increasing in November and December 2020. Cyber-attacks on healthcare companies increased by 45% worldwide. The increase was greater than twice the percentage increase…

Ransomware Attack on Wilmington Surgical Associates Exposed Over 114,000 Patient’s Data

Last October 2020, the NetWalker ransomware gang launched an attack on the Wilmington Surgical Associates surgical center located in North Carolina. Prior to deploying the Netwalker ransomware to do file encryption, the gang stole 13GB of records with sensitive data. The HHS’ Office for Civil Rights breach portal already posted about the ransomware attack indicating that it has compromised 114,834 patients’ protected health information (PHI). The NetWalker ransomware gang has conducted more attacks on its healthcare company targets this 2020. It attacked the University of California San Francisco and stole sensitive and valuable research data. The University paid $1.14 million…

Data Breaches at Legacy Community Health Services, Hillcrest Nursing Center and Dental Care Alliance

Email Breach at Legacy Community Health Services Affects 3,076 Patients Legacy Community Health Services (LCHS) located in Texas is informing 3,076 people that some of their PHI held in an email account were potentially accessed by an unauthorized individual. LCHS noticed the unauthorized access of a staff’s email account on July 24, 2020 and performed a password reset on that day. A third-party cybersecurity agency helped look into the incident and completed the review of the breach on September 22, 2020. According to the evaluation, the account stored patient names and some clinical data associated to care gotten and the…

ASPR Issues Update on Ransomware Activities in the Healthcare Industry

The HHS’ Office of the Assistant Secretary for Preparedness and Response (ASPR) has given an update on ransomware activity aimed at the healthcare and public health sectors. In late October, the HHS, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) gave a joint alert concerning an impending rise in ransomware activity aimed towards the healthcare sector. In just one week after giving the warning, six healthcare organizations reported ransomware attacks in one day. Over a dozen healthcare providers have submitted cyberattack reports in the last two months. Healthcare companies reported more than 62 attacks…

Data Breach Incidents at Lycoming-Clinton Joinder Board and Coast Dental

Lycoming-Clinton Joinder Board (LCJB) is managing programs that provide services to persons with mental health issues or intellectual disabilities in the area of Lycoming and Clinton Counties, Pennsylvania. It encountered a breach and is now notifying 14,500 individuals concerning the potential compromise of their protected health information (PHI). On August 10, 2020, while looking into a prior data breach, LCJB learned that an unauthorized individual viewed the email accounts of three personnel. A review of the email accounts affirmed they stored patient data, nevertheless, it can’t be determined if the unauthorized persons accessed or obtained any details in the email…

Dickinson County Health, Michigan Medicine and Passavant Memorial Homes Security Breaches

Dickinson County Health based in Michigan has encountered a malware attack that resulted in its EHR system to be taken offline. The attack has obligated the health system to use EHR downtime approaches and write patient details utilizing pen and paper. The attack began on October 17, 2020 and hampered computer systems at all its Michigan and Wisconsin clinics and hospitals. Systems were turned off to restrict the malware and third-party security professionals were called in to check out the breach and fix its systems and records. Though the attack prompted major interruption, nearly all patient services stayed entirely operational….

Data Breaches at Piedmont Cancer Institute, The Health and Wellness Clinic and McLaren Oakland Hospital

Piedmont Cancer Institute (PCI) located in Atlanta, GA is informing 5,226 patients about the potential exposure of their protected health information (PHI) as a result of an unauthorized individual getting access to the email account of one employee. A third-party cybersecurity firm helped PCI in determining the compromise of the email account for more than a month. The unauthorized person initially accessed the email account on April 5, 2020. PCI secured the account on May 8, 2020. The breached account review ended on August 8, 2020 and confirmed that it comprised a selection of PHI. Aside from names, the patients…

Ransomware Attacks on Magnolia Pediatrics and Accents on Health

Magnolia Pediatrics located in Prairieville, LA is informing 12,861 patients regarding the likely exposure of some of their protected health information (PHI) due to a ransomware attack that transpired on or around March 26, 2020. IT vendor, LaCompuTech looked into the ransomware attack and confirmed that only its master boot record was impacted and the hackers did not access, encrypt or export any patient data. The IT vendor reported that there was no HIPAA breach, thus it is not required to report the incident to the HHS’ Office for Civil Rights. It is likewise not required to issue breach notification…

PHI Compromised Due to Four Data Breaches

MU Health Care based in Missouri has suffered a phishing attack that caused the compromise of a few employee email accounts between May 4 and May 6, 2020. An investigation of the incident unveiled the compromised email accounts included patient data like names, birth dates, account numbers, health insurance information, Social Security numbers, and driver’s license numbers. MU Health Care has advised all impacted patients and has given them free of charge credit monitoring services. To date, there are no reports received that indicate the misuse of any patient information. The affected email accounts comprised the protected health information (PHI)…

CISA Gives Warning of Persistent Attacks by Chinese Hacking Groups Directed at F5, Citrix, Pulse Secure, and MS Exchange Vulnerabilities

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) has given a security alert that hackers connected with China’s Ministry of State Security (MSS) are carrying out targeted cyberattacks on U.S. government bureaus and private sector firms. The attacks are continuing for more than a year and generally target vulnerabilities in common networking tools like Pulse And Citrix Secure VPN appliances, Microsoft Exchange email servers, and F5 Big-IP load balancers. The hacking groups employ publicly available data and open source exploit applications in the attacks for instance Mimikatz, Cobalt Strike, And China Chopper. The hacking groups that have…

Data Breaches at the Institute for Integrative Nutrition, Colorado Mental Health Center and Texas Recycling Center

The Institute for Integrative Nutrition in New York City encountered a phishing attack in March 2020, which resulted in the potential exposure of personal data. The institute only became aware of the breached email account on June 22, 2020. According to the investigators, an unauthorized person gained access to one email account starting March 3, 2020 up to March 4, 2020. Third party cybersecurity specialists assisted the investigation and confirmed after a manual document review that the unauthorized person potentially accessed names and personal information like Social Security numbers. But data theft is not confirmed by any evidence. As a…

2.5 Million Patient Records Hosted by Cense AI Compromised Over the Internet

Technology and security consultant Jeremiah Fowler reported that the personal and health data of over 2.5 million patients were compromised on the web. On July 7, 2020, two folders comprising the data were found publicly available over the web and without requiring any passwords to access. An artificial intelligence company called Cense AI hosted the folders marked as “staging data.” Cense AI is a firm that delivers SaaS-based intelligent process automation management solutions. The folders were managed on a similar IP address as the Cense website and were accessible by taking out the port from the IP address, which can…

CISA Alerts of Increased Cyberattacks by Chinese Nation State Threat Groups that Use the Taidoor RAT

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) issued a high priority notification to warn companies of the danger of cyberattacks using the Taidoor malware, which is a remote access Trojan (RAT) that the Chinese authorities employ in cyber-surveillance strategies. Taidoor was initially discovered in 2008 and was employed in numerous attacks on companies. The advisory was given after the FBI, CISA, and the Department of Defense (DoD) discovered a new Taidoor RAT variant that is being utilized in attacks on American companies. The solid proof was discovered indicating that attackers doing work for the Chinese government…

FBI Publishes a Flash Alert Cautioning of More NetWalker Ransomware Attacks

The Federal Bureau of Investigation (FBI) gave a (TLP:WHITE) FLASH notification this week after seeing a growth in attacks that use the NetWalker ransomware. NetWalker is a somewhat new ransomware threat that was discovered in March 2020 soon after a transportation and logistics organization in Australia and the University of California in, San Francisco suffered attacks. UC San Francisco was pressured to pay out a ransom payment of approximately $1.14 million to acquire the keys to unlock encrypted data files to restore vital research files. One of the latest healthcare victims was Lorien Health Services, a nursing home operator based…

Emotet Botnet Active Again and Sending Big Quantities of Malicious Email Messages

After 5 months of dormancy, the reactivated Emotet botnet is being employed to send out substantial amounts of unsolicited email messages to businesses in the U.K. and the U.S. The Emotet botnet is a system of breached computers which were downloaded with Emotet malware. Emotet malware is a data stealer and malware downloader which was employed to spread different banking Trojans, which include the TrickBot Trojan. Emotet hijacks email accounts and then utilizes them to dispatch spam email messages that contain malicious urls and file attachments, usually Word and Excel files that contain harmful macros. In the event the macros…

Microsoft Releases Patch to Correct Critical Wormable Windows DNS Server Vulnerability

Microsoft has introduced a patch to resolve a 17-year old wormable remote code execution vulnerability identified in Windows DNS Server. The vulnerability can be exploited remotely, demand a low-level skill to exploit, and could permit an attacker to seize full control of the entire IT infrastructure of a company. Security researchers at Check Point discovered vulnerability CVE-2020-1350 and named it SIGRed. The vulnerability can be found on all Windows Server versions starting from 2003 until 2019 and was designated the maximum CVSS v3 score of 10 out of 10. The flaw is wormable, thus an attacker could exploit the vulnerability…

Data Breach Incidents at Health Plan Member Websites, Zipari and Central California Alliance for Health

Health plan Independence Blue Cross in Philadelphia, AmeriHealth Insurance Company and AmeriHealth HMO, Inc of New Jersey learned that unauthorized persons acquired access to web pages on their member sites from March 17, 2020 to April 30, 2020 and possibly saw the private and protected health information (PHI) of a number of plan members. The types of data exposed comprise names, health plan type, member ID numbers, payment account balances, claims details and user reward summaries. According to the breach investigation, the unauthorized person utilized legit credentials to log in to the website. On all occasions, the passwords employed to…

Misconfigured Exposed Cloud Databases are Attacked In Just Hours

Security researchers often discover misconfigured public cloud databases. Wrong configurations that cause cloud data exposure may be because of insufficient knowledge of cloud security or guidelines, inadequate oversight to track down errors, or negligent conduct by insiders. The latest Trend Micro report pointed out that the top cause of cloud security issues is cloud misconfigurations. Security researchers at Comparitech frequently find unsecured cloud assets, typically Elasticsearch cases and unprotected AWS S3 buckets. Whenever the unprotected cloud databases are identified, security researchers identify the owners and notify them to make sure to secure data quickly. Upon identifying the owners, it usually…

COVID-19 Research Organizations Targeted by Chinese Hacking Groups

Organizations participating in the research studies of SARS-CoV-2 and COVID-19 were warned that hackers linked with the People’s Republic of China (PRC) are focusing attacks on their organizations, for that reason, they have to do something to keep their systems safe from any attack. The Federal Bureau of Investigation (FBI) together with the Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security have issued an alert that healthcare, pharmaceutical and research organizations working on SARS-CoV-2 vaccines, COVID-19 remedies and testing procedures are the targets of hackers wanting to get research data to move ahead with PRC’s research…

H-ISAC Issues Second Framework for Managing Identity in Healthcare

The Health Information Sharing and Analysis Center (H-ISAC) released a framework for CISOs to manage identity and secure their firm against identity-focused cyberattacks. This new white paper released by H-ISAC comprises the identity-focused plan to security. The former white paper details why an identity-focused solution to cybersecurity is necessary at this time, with the most recent white paper outlining how to execute that strategy. By using the framework, CISOs could handle the complete identity lifecycle of practitioners, patients, business partners, and employees in a manner that protects against identity cyberattacks, brings down risk and boosts operational efficiencies. The framework was…

Ransomware Attack at Magellan Health and PHI Theft at Houston Methodist Hospital

Magellan Health, a Fortune 500 company, encountered a ransomware attack last April that resulted in the encryption of its files and theft of some employee information. Magellan Health noticed the attack on April 11, 2020 after files on its systems were encrypted. According to the breach investigation results, the attacker accessed its systems because an employee received a spear-phishing email on April 6 and responded to it. The attacker misled the employee by means of impersonating a Magellan Health customer. Magellan Health employed the cybersecurity firm Mandiant to investigate the breach and it confirmed that the attacker accessed a company…

Healthcare Shoppers Looking to Buy PPE and Medical Supplies Targeted by Fraudsters

The Federal Bureau of Investigation (FBI) has published an advisory that cybercriminals are attempting to rob from state organizations and healthcare market consumers that are purchasing medical products and personal protective equipment (PPE). Healthcare market consumers were cautioned after having records of increasing instances of scams connected to the order of PPE and important medical equipment including ventilators, that have limited supply as a result of greater demand. The FBI has received information on many reports of advance fee frauds. Government organizations and healthcare market consumers have sent funds to vendors and brokers of PPE and medical products and learned…

Threat Actors and Cybersecurity Companies to Show Support to Healthcare Providers Throughout the Coronavirus Pandemic

Cyberattacks on healthcare organizations were reported despite the fact that these organizations are working day and night to give COVID-19 patients their needed healthcare. These attacks not only cause serious disruption, but also possibly more damage and threat to patient safety considering the COVID-19 outbreak. Plenty of phishing campaigns were found using the fear of COVID-19 as a lure to install malware. More than 2,000 coronavirus-themed domains had been registered. Most of these domain names were probably bought for executing malicious intentions. For sure the cyberattacks will not stop. However, it would appear that some threat actors have chosen not…

Cybersecurity Guidelines for Securing Remote Employees During the COVID-19 Outbreak

With attacks rising it is essential to undertake cybersecurity guidelines for keeping remote employees safe against malware and phishing attacks. Institutions should make certain to use the most recent versions of VPNs and employ patches promptly. The DHS Cybersecurity and Infrastructure Security Agency (CISA) released another alert on March 13 concerning patching and upgrading VPNs for remote personnel to correct vulnerabilities. Institutions were likewise told to use multifactor authentication with all VPNs to boost security. VPNs should additionally be configured to start off automatically if devices are powered up and not just counting on personnel to manually connect. It is…

Ransomware Attack on Crossroads Technologies Impacts 156,400 Personal Touch Home Care Patients

Personal Touch Home Care (PTHC), a home health company based in Lake Success, NY, began informing patients about the latest ransomware attack on Crossroads Technologies Inc., its IT vendor based in Wyomissing, PA, that potentially compromised their protected health information (PHI). On December 1, 2019, Crossroads advised PTHC that its Pennsylvania data center was attacked by ransomware. That data center hosted PTHC’s electronic medical records. Because of the ransomware attack, patient records were inaccessible for a couple of days. Although the EHR system was not accessible, PTHC employees followed emergency protocols and recorded patient data using pen and paper. The…

Over 110,000 Patients’ PHI Compromised Because of Phishing Attacks on Overlake Medical Center & Clinics and VibrantCare Rehabilitation

A phishing attack on Overlake Medical Center & Clinics located in Bellevue, WA in December 2019 caused the potential exposure to personal and protected health information (PHI) of 109,000 patients. Overlake Medical Center & Clinics discovered the phishing attack on December 9, 2019 and did a password reset to prohibit unauthorized access. Overlake affirmed the unauthorized access of one email account beginning December 6, 2019 up to December 9 which was the time the Overlake secured the account. There were other email accounts compromised on December 9, however, the attacker only had access for a couple of hours. An examination…

$1.77 Billion in Losses Due to Business Email Compromise Attacks

The 2019 Internet Crime Report of the Federal Bureau of Investigation’s (FBI) Internet Crime Complaint Center (IC3) was just released. It reveals that cybercrime losses in 2019 maxed $3.5 billion. IC3 got nearly 1,300 per day or 467,361 online and cybercrime complaints. Above 50% of the losses were caused by business email compromise (BEC) attacks, otherwise called email account compromise (EAC). These attacks entail the impersonation of an authorized person or business to acquire finances by means of email. These complex tricks usually start off with a phishing attack on a manager to acquire email login credentials. The hacker then…

PHI Potentially Exposed at Iowa Department of Human Services and Cedarbrook Nursing Home

The Iowa Department of Human Services informed 4,784 people concerning the potential exposure of their protected health information (PHI) because of improper disposal of documents. On November 25, 2019, a member of the DHS staff put documents containing the Dallas County clients’ PHI together within the regular garbage dumpster. The staff should have shredded the documents before disposal. DHS was late in discovering the improper disposal as the dumpster had been emptied already. The incident investigators learned that the custodial employee who disposed of the records wasn’t aware that the documents contained confidential information. It was not possible to determine…

Breach of LabCorp Patients’ Personal and Health Data Due to Website Error

TechCrunch researchers found a security error on a website that LabCorp is using for hosting its internal customer relationship management system. Though the system comes with password protection, the researchers discovered an error in the back-end system and exposing patient records. The error made possible patient data access even with no security password and search engines have indexed the web URL. Google had cached just one document that contains a patient’s health data. However, the researchers were able to see other patient records with health data just by modifying the document number in the web URL. The researchers examined sample…

PHI Exposed at Alomere Health and Mercy Health Lorain Hospital Laboratory Data Breaches

Alomere Health in Alexandria, MN encountered a phishing attack that allowed unauthorized persons potential access to the protected health information (PHI) of more or less 50,000 patients. After becoming aware of the phishing attack on November 6, 2019, the healthcare provider conducted an internal investigation that revealed the account was accessed by unauthorized persons from October 31 until November 1, 2019. The computer forensics company that investigated the breach revealed on November 10, 2019 that a second email account compromise occurred on November 6. After a detailed examination of the compromised accounts, it was confirmed by the investigators that selected…

Ransomware Attack on Enloe Medical Center Caused EMR Downtime

Enloe Medical Center in Chico, CA had a ransomware attack two weeks ago and until now the electronic medical record (EMR) system of this California healthcare provider is offline. Enloe knew about the ransomware attack on January 2, 2020, which encrypted the files of its entire network, which include the EMR system consequently the center staff are unable to access patient data. The provider promptly enforced emergency protocols to keep on delivering health care to patients and had to reschedule just a number of elective medical procedures. The telephone system became non-operational as well because of the attack, but it…

Malware Attack Impacts 25K Patients of Native American Rehabilitation Association of the Northwest

A malware attack on the Native American Rehabilitation Association of the Northwest, Inc. (NARA) in Portland, OR resulted in the potential unauthorized access of the protected health information (PHI) of native American patients who are receiving mental and physical health services, education and substance abuse treatment. NARA mentioned that the malware attack came about on November 4, 2019. Security controls failed to identify the malware at the beginning but eventually identified it in the afternoon. By November 5, the security team already had the threat under control and by November 6, it had changed all email account passwords. The attackers…

Conway Medical Center and Equinox Inc. Email Security Breaches

A phishing attack on Conway Medical Center in South Carolina resulted in the access of the email accounts of several employees by unauthorized people. Conway Medical Center became aware of the phishing attack on October 7, 2019 and immediately secured the employee’s email accounts to block the further access of unauthorized individuals. Third party cybersecurity specialists looked into the breach to confirm patient data access or theft. According to the investigators, the email accounts were first compromised on or before July 2019. It was only on November 20, 2019 that the investigators confirmed the exposure of the protected health information…

Malware on New Mexico Hospital Imaging Server Potentially Impacts Patients PHI

The radiology department of Roosevelt General Hospital located in Portales, New Mexico found malware in one digital imaging server, which possibly resulted in enabling the hackers to gain access to the radiological photos of approximately 500 patients. The malware installation was found on November 14, 2019 and immediate action was done to separate the server and stop even more unauthorized access and obstruct contact with the command and control server of the hackers. The IT unit was successful in taking away the malware, repairing the server and retrieving all patient information. A scan was done to search for any flaws….

Microsoft’s Recommendations on Protecting Against Spear Phishing Attacks

Many cybercriminals still send phishing emails at random hoping to solicit some responses. However, it is more lucrative to conduct targeted attacks, which are also called spear phishing. Microsoft claims that spear phishing attacks increased twofold last year. From September 2018 to September 2019, spear phishing attacks have gone up from 0.31% to 0.62% of email volume. The number might be low, however, these spear phishing campaigns are very effective because they are laser-focused on distinct employees. Security-conscious employees find it hard to recognize emails. A lot of executives, IT and cybersecurity personnel become victims of these campaigns. The emails…

Ransomware Attack on The Cancer Center of Hawaii and Improper Disposal Incident at Zuckerberg San Francisco General Hospital

The Cancer Center of Hawaii in Oahu encountered a ransomware attack on November 5, 2019. The Cancer Center was compelled to power down its network servers because of the attack. That meant temporarily not providing radiation treatment to patients at St. Francis’ hospital in Liliha and Pali Momi Medical Center. Although patient services suffered some interruption, the center believes that the attackers did not access any patient information. The breach investigation is still in progress, but all information saved on the radiology machines were recovered. The network is likewise completely operational now. It is not known how long the network…

9,800 Aegis Medical Group Patients Affected by Inappropriate PHI Access by a Former Employee

Aegis Medical Group, a Florida-based physician group, started notifying 9,800 patients that a former employee potentially accessed their protected health information (PHI). Purportedly, that individual offered the patient data for sale to third parties that were supposedly involved in identity theft and fraud. The law enforcement told about the employee’s action to Aegis Medical Group on September 11, 2019. The investigators confirmed the employee’s attempt to sell off two patients’ data. The physician network together with law enforcement discovered that the employee probably accessed approximately 9,800 patients’ information from July 24, 2019 up to September 9, 2019. The patient records…

Warning on Medtronic Valleylab Energy Platform and Electrosurgery Products Vulnerabilities

Medtronic identified six vulnerabilities in the Medtronic Valleylab energy platform and electrosurgery products that include one critical vulnerability that an attacker can exploit to access the Valleylab Energy platform and view/overwrite data files and remotely implement arbitrary code. Medtronic already sent notifications about the identified vulnerabilities to the Department of Homeland Security Cybersecurity and Infrastructure Security Agency considering its responsible vulnerability disclosure policy. The following Medtronic Valleylab products have been found to have four vulnerabilities: Valleylab Exchange Client, Version 3.4 and earlier versions Valleylab FX8 Energy Platform (VLFX8GEN) software Version 1.1.0 and earlier versions Valleylab FT10 Energy Platform (VLFT10GEN) software…

$41,198 Average Ransomware Payment in Q3 of 2019

Ransomware continues to be one of the greatest cybersecurity threats confronted by healthcare institutions. Attacks have increased as well as ransom demands. A recent analysis by Coveware, a company providing ransomware remediation and incident response, revealed that there is a 13% increase in the average ransom payment, which stands at $41,198 in Q3 of 2019. This amount is six times the average in December 2018. A lot of companies are paying substantially more. The ransom demand of threat actors that use the Ryuk ransomware in their attacks is usually hundreds of thousands of dollars. From Q2 to Q3 of 2019,…

Fetal Remains Discoverd at Home of Deceased Doctor

Family members of the late Dr Ulrich Klopfer have discovered fetal remains at his home in Illinois.  Dr Klopfer operated three abortion clinics in Indiana until 2015 when his license was suspended due to failure to comply with state laws. The violations included failure to report cases of the rape of a minor following an abortion procedure, violations of state waiting periods, and improper record keeping. Indiana Attorney General Hill described Dr Klopfer as “one of the most notorious abortionists in the history of Indiana” with “a record of deplorable conditions and violations of regulatory controls.” Dr Klopfer had his…

733 Million Medical Records Freely Available Through Unsecured PACs

Cybersecurity researchers have revealed that approximately 733 million medical images stored on picture archiving and communication systems (PACs) are freely accessible on the Internet.  The investigation, a joint venture by ProPublica, German public broadcaster Bayerischer Rundfunk, and vulnerability and analysis firm, Greenbone Networks, found images including X-rays, MRI, and CT scans stored in these PACs.  Greenbone analyzed 2,300 PACs and found that 590 were accessible from the Internet without requiring any user authentication. These 590 servers stored 24 million medical records from 52 countries.  Greenbone Networks audited the servers between July and September 2019 and set up a RadiAnt DICOM…

California Hospice Experiences Ransomware Attack

The Hospice of San Joaquin in Stockton, California, is in the process of notifying patients that their protected health information may have been compromised in a recent security incident. On July 2, 2019, at 12:50 pm, hackers installed malware on the hospice’s network. The network included servers used to store the protected health information of 13,000 patients.  In the breach notification posted on their website, the hospice stated: ‘we do not believe, or have any indication patient or staff information has been utilized, disseminated or disclosed to unauthorized parties.’ The server contained patient information such as their full name, home…

August 2019 Patch Tuesday

Microsoft has issued patches for 93 vulnerabilities across Windows, Microsoft Browsers, Microsoft Office, and Outlook this Patch Tuesday, 26 of which achieved a ‘critical’ rating. Somewhat unusually, there are no patches to address currently exploited zero-day vulnerabilities in this month’s updates; however, it is still important to apply the updates as soon as possible as it is unlikely to be long before exploits are developed for the remote code execution vulnerabilities. Four of the critical vulnerabilities corrected in this month’s round of updates are wormable flaws in Remote Desktop Protocol (RDP), two of which – CVE-2019-1181 and CVE-2019-1182 – affect…

Wise Health Phishing Attack Compromises 36,000 Records

Wise Health has revealed that a phishing attack on their system has compromised the protected health information (PHI) of 36,000 patients. Wise Health System is a health care system with over 1,900 employees based in Decatur, Texas. The breach occurred on March 14, 2019, when a hacker sent phishing emails to employees of the organization. Several employees were fooled by the spoof emails and responded, allowing the hacker to harvest their login credentials. The hacker then used the credentials to log in to the Employee Kiosk and attempted to redirect over 100 payroll direct deposits. Wise Health had anti-fraud policies…

Premera Blue Cross Settles for $10 Million for 2014 Data Breach

Premera Blue Cross has agreed to a $10 million settlement to resolve lawsuit involving 30 state attorneys general for a 2014 data breach which compromised 10.4 million records. A hacker compromised Premera Health’s network on May 5, 2014, and had access until March 6, 2015. During this time, the hacker could access highly sensitive plan member information such as names, contact information, dates of birth, member ID numbers, and Social Security numbers. Premera Health record’s included information on individuals from Alabama, Alaska, Arizona, Arkansas, California, Connecticut, Florida, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Massachusetts, Minnesota, Mississippi, Montana, Nebraska, Nevada,…

Error at Business Associate Exposes Turlock Irrigation District Employee Data

Turlock Irrigation District in California are notifying members of their employer-sponsored health plan that an error at a business associate has resulted in some of their protected health information (PHI) being exposed. The business associate, Delta Health Systems (DHS), provides administrative services related to Turlock Irrigation District’s health plan. As such, it requires access to employee protected health information and is required by HIPAA to protect the integrity and confidentiality of this information.  However, due to an error made by a third-party website developer, some employee information was made accessible through a link on DHS’s website. While the website had…

Siemens Identifies Vulnerabilities in Scalance Direct Access Points and Sinamics Perfect Harmony Drives

Siemens has discovered several vulnerabilities in the Scalance W1750D direct access point. Several of the vulnerabilities are of high-severity, and one is rated as ‘critical’. The vulnerabilities can be exploited remotely and hackers can exploit them with even low skill levels. A hacker could utilise the flaws to gain access to the W1750D device and execute arbitrary code within its underlying operating system. As a result, the hacker could gain access to sensitive information, perform administrative actions on the device, and expose session cookies for an administrative session. The vulnerabilities are present in all versions prior to 8.4.0.1 CVE-2018-7084 is a…

Centura Health Email Security Incident Compromises PHI of 7,515 Patients

Centura Health has revealed that an email security incident has resulted in the protected health information (PHI) of 7,515 patients being compromised. Centura Health, based in Centennial, Colorado, discovered the breach on April 16, 2019. IT security staff immediately took steps to secure the account and revoke unauthorised access. An investigation was launched into the incident to determine the extent of the breach and how the hacker gained access to the account. The investigation concluded that the hacker may have been able to access emails and email attachments during the window in which they had access to the account. However,…

Phishing Incident Compromises Columbus Community Hospital Patient PHI

A phishing attack at a business associate of Columbus Community Hospital in Columbus, Wisconsin, has compromised the PHI of an unknown number of patients.  Columbus Community Hospital was notified of the breach on April 8, 2019, by OS, Inc., a claims management service provider and business associate (BA) to the hospital. According to the BA, the unauthorised individual gained access to the email account of one of its employees through a successful phishing attack. The hacker may have viewed patient information during the period in which they had access to the account. The information in the compromised account includes names,…

DHS and FBI Release Advisory on New Lazarus Trojan Attacks

The U.S Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have issued a joint advisory warning that Lazarus APT has launched attacks using a new Trojan called HOPLIGHT. Lazarus, North Korea-backed hacking group, utilises spear phishing attacks to install malware on targets of high value. The group appears to be primarily motivated by financial gain, rather than intellectual property theft or espionage. The group is known by other aliases such as Hidden Cobra, Zinc, and Nickel Academy. Lazarus is the group that is generally considered responsible for the WannaCry attacks and several other high-profile cybersecurity incidents….

Study Shows Quarter of Phishing Emails Bypass Office 365’s Default Defences

Avanan has released a study indicating that a quarter of all phishing emails bypass Microsoft Office 365’s default anti-phishing protections. Avanan, a cloud security platform provider, conducted a study of 52 million emails which had been assessed by Office 365 Exchange Online Protection (EOP). They discovered that the software categorised a quarter of phishing emails sent as ‘non-malicious’, and allowed them to arrive in user inboxes. A  further 5.3% of emails were delivered as they had been whitelisted, meaning the phishing emails couldn’t be blocked. EOP works by scanning emails for malware, signatures of spam, and checking if the sender…

Proofpoint Discovers Attackers Bypassing Multi-Factor Authentication on Office 365 and G Suite Accounts

Proofpoint, a software security company, has discovered that threat actors are using legacy IMAP protocols to bypass multi-factor authentication on Office 365 and G Suite accounts. Multi-factor authentication (MFA) systems check the identity of a user before allowing them to access the account. Many experts consider them more a far more robust security measure than passwords. These identification steps may include sending an email to their account, or a text to their phone, which contains a unique code which then must be submitted online to proceed. Usually, if an attacker attempts to access an account but fail on several attempts,…

Mimecast Report Shows Huge Increase in Emails Containing Malicious URLs

Mimecast has released a report showing that there has been a 126% increase in the number of emails containing malicious URLs between August 2018 and February 2019. Mimecast, a company specialising in cloud-based email management, surveyed to ascertain workplace awareness of cybersecurity issues. The report was based on an analysis of 28.4 million emails that had been marked as ‘safe’ by security filters on email inboxes. These filters failed in nearly 17% of cases, as the researchers discovered 460,000 emails that contained malicious links but had made it past the email security solutions.  Previous reports suggest that the average office…

New GandCrab Ransomware Decryptor Available Online

A free GandCrab ransomware decryptor has been made available on the No More Ransom depository. The decrypt works for files encrypted by versions 1, 4, early versions of 5, and versions 5.0.4 to 5.1 can now be decrypted without paying the ransom. Ransomware is malware variant which denies the user access to their device, or specific files on the device until a ransom has been paid to the scammer. Ransomware attacks are becoming increasingly common, particularly against organisations in the healthcare industry due to the high black-market of healthcare data. The malware is readily available on the dark web. If a campaign…

GandCrab Ransomware Campaign Targets MSPs

Hackers have launched a new GandCrab ransomware campaign targeting managed service providers (MSPs) and IT support companies. GandCrab ransomware is a popular variant of ransomware. It became popular for hackers to utilise as Ransomware-as-a-Service (Raas). RaaS allows even novice cybercriminals to launch ransomware campaigns and earn commission for the use of this ransomware. MSPs are often used by small and medium businesses (SMBs) that have insufficient resources to create and manage their cybersecurity frameworks. MSPs perform a range of functions such as patching, performing software updates, proactively finding security issues, and correcting problems in networks. As MSPs work remotely, SMBs…

ICS-CERT Issues Medical Advisory for Vulnerabilities Found in Stryker Equipment

The Industrial Control Systems Cyber Emergency Response Team (ICS-Cert) has issued a medical advisory about vulnerabilities found in Stryker equipment. Nine vulnerabilities were identified, affecting Secure II MedSurg Beds, S3 MedSurg Beds, and InTouch ICU Beds. The vulnerabilities could be potentially exploited to allow “data traffic manipulation, resulting in partial disclosure of encrypted communication or injection data”. The attacker need only be in radio range of the devices to perform a successful attack. The vulnerabilities are present in the four-way handshake used by WPA and WPA2 wireless security protocols which allow nonce reuse in Key Reinstallation (KRACK) attacks. Similar vulnerabilities…

DoD Report Reveals Defense Health Agency Failures

The Department of Defence (DoD) Office of Inspector General (OIG) has released a report revealing that the Defense Health Agency (DHA) failed to implement security protocols consistently. This failing resulted in failings to protect against the unauthorised accessing of systems that stored, processed, and transmitted electronic health records and other sensitive patient information. The DoD OIG Report – DoDIG-2017-085, “Protection of Electronic Patient Health Information at Army Military Treatment Facilities” details the failings and includes suggestions made by OIG to improve the system. The DoD OIG found that Common Access Cards (CACs) were not used to access three DoD EHR…

New Microsoft Office 365 Phishing Attack Discovered

A cybersecurity consultant has identified a new Microsoft Office 365 phishing attack that fools unsuspecting users into entering their Office 365 account details into a fake website. Phishing attacks are attempts made by cybercriminals to obtain sensitive information such as passwords or credit card details from a victim by pretending to be a reputable organisation via electronic communication channels. Often conducted through emails, the messages look surprisingly legitimate, and often direct the victim to a website which is a convincing copy of the genuine site. The only noticeable difference between the two web pages may be the URL, which ignorant…

Kaspersky Labs Releases Report on 2018 Malware Attacks

Kaspersky Labs, a multinational cybersecurity and anti-virus organisation, has published its 2018 report on malware attacks detected on its network between November 2017 and October 2018. The report highlights the growing threat that malware attacks pose to data security worldwide. The report uses information obtained using data collected from Kaspersky Security Networks (KSN) users, of which there are millions worldwide. The report shows that there has been a 43% increase in ransomware detections experienced by KSN users during the period between November 2017 to October 2018 in comparison to the same period the previous year. The data also showed a…

Microsoft’s November Patch Tuesday Addresses 64 Vulnerabilities

November 13 2018 marked Microsoft’s November Patch Tuesday. The day saw the release of patches and security updates for Windows, Internet Explorer, Edge, and other Microsoft products. In total, 64 vulnerabilities were addressed across the range of Microsoft products. There were 12 vulnerabilities which were considered “critical” by developers. The updates are hoped to protect Microsoft devices against malware attacks, which are becoming increasingly prevalent.   The 12 critical vulnerabilities could allow hackers to execute malicious code and take full control of a vulnerable device. The majority of the critical vulnerabilities are in the Chakra Scripting Engine, which account for…

WordPress GDPR Compliance Plugin Flaw Exploited by Hackers

Defiant, a security research organisation which specialises in WordPress website security, has identified a flaw in a plugin that has allowed unauthorised individuals access and alter websites.  The flaw was identified in a GDPR Compliance plugin, which was created in response to the introduction of the EU privacy laws in May 2018. The plugin allowed website owners to add a checkbox to their website for users to consent to the use of their data for specific uses, as now required by GDPR legislation. Due to the importance of GDPR, and the hefty financial penalties that organisations faced for non-compliance, it…

Medical Attendant Fired for HIPAA Breach

In January this year, a medical attendant assistant was let go from Wayne Memorial Hospital for a HIPAA infringement after the improper obtaining of 390 patients’ documents was found. A famous event in 2011 observed medical caretakers and other medicinal services staff snoop on patient records. All things considered, there hosted been a gathering in a neighboring town where there were numerous medication overdoses. Allina Hospitals and Clinics let go 24 individuals from staff for the unseemly getting to of PHI. Attendant Fired for HIPAA Breach at Glendale Adventist Medical Center Every year, many attendants are found to have disregarded…