New England based Point32Health, the parent company for both Tufts Health Plan and Harvard Pilgrim Health Care, confirmed they experienced a ransomware incident on Monday. The attack affected systems it uses to service members, accounts, brokers and providers.
Patients reported issues accessing the system as far back as last Thursday and as of yesterday, the web site remained down. The company did not confirm the technical problems were a ransomware attack until their statement issued on Wednesday.
On April 17, Point32Health identified a cybersecurity ransomware incident that impacted systems we use to service members, accounts, brokers and providers. At this time, most systems impacted are on the Harvard Pilgrim Health Care side of our business. After detecting the unauthorized party, and out of an abundance of caution, we proactively took certain systems offline to contain the threat. We have notified law enforcement and regulators, and are working with third-party cybersecurity experts to conduct a thorough investigation into this incident and remediate the situation.
Roy Akerman, Co-Founder & CEO, Rezonate had this to say:
“Attackers continue to target Health Care businesses mainly for two reasons: the first, the criticality of restoring business operation is of first degree. It has direct impact on life saving operations and critical telemetry both doctors and patients are in need. Second, Health Care PII (personal Identifiable Information) is of high-demand in malicious forums and dark web. While a compromised credit card goes on sale for $1.99, an unreplaceable “human print” remains the highest cost, and respectively value, for the attacker to use and compromise.
“Together, alongside a distributed and dynamic infrastructure as we usually encounter with Health Care providers, protecting the infrastructure and at the same time being ready to react fast remains a challenge.
“While info about the initial access techniques into how the attacker was able to deploy the ransomware and propagate across the network, methods have not changed, and we believe that the same common techniques as seen recently used by leading ransomware groups will be similar here as well.”
The way that this was disclosed by Point32Health was sub optimal seeing as problems were seen last week. It really seems that based on the available facts that they were hoping to get this sorted and not admit to anything. But they were ultimately forced to. I don’t know if that is actually the case, but Point32Health needs to explain this better than they have. Otherwise the trust level that patients have with Point32Health will nosedive.
Just-in-Time Logistics And Cybersecurity – How To Reduce The Attack Surface
Posted in Commentary with tags horizon3.ai on April 20, 2023 by itnerdInspired by the most recent Toyota third party breach, Snehal Antani, CEO of Horizon3.ai, has come up with defensive suggestions for enterprises concerned with these third-party risk exposures.
Here’s some background on this from Bloomberg:
“Kojima is a small company and little-known outside Japan, where it produces cup holders, USB sockets and door pockets for car interiors. But its modest role in the automotive supply chain is a critical one. And when the company was hacked in February 2022, it brought Toyota Motor’s entire production line to a screeching stop. The world’s top-selling carmaker had to halt 14 factories at a cost of about $375 million.”
That’s not a good place to be. Here’s what Snehal Antani, CEO and Co-Founder of Horizon3.ai suggests to try and mitigate this threat:
“JIT Logistics, made popular by Walmart’s efficiency in the 2000’s, now poses a significant cybersecurity risk to global organizations. An interesting example occurred with a Toyota supplier recently:
“Large organizations have the resources to build a world-class security operations center (SOC), but their suppliers often don’t have the talent or resources to defend against cyber-attacks effectively. Often these smaller suppliers are barely treading water, with IT Operations and CyberSecurity being a single team (or person!)
“This is especially challenging in the era of cyber-enabled economic warfare, where nation-states will execute cyberattacks to cause internal strife and economic pain that is below the threshold for war. Companies in manufacturing, pharmaceuticals, agriculture, energy production, etc, that have embraced just-in-time logistics are ripe targets, where a small action leads to outsized impact.
“So what? As security practitioners, we often default to thinking of SBOM when discussing supply chain security. However, that’s an orthogonal issue. As a CEO or COO, I would work closely with my CISO and procurement team to do the following:
“Early adopters in this space are leveraging autonomous pentesting to identify the exploitable attack surface of their critical suppliers and making investments to proactively harden their systems and improve their detection & response time.
Leave a comment »