Archive for August 5, 2023

Numerous Hospitals Pwned In Cyber Attack

Posted in Commentary with tags on August 5, 2023 by itnerd

ABC is reporting that a number of hospitals in a number of states that are part of Prospect Medical Holdings have been pwned in a cyberattack:

Hospitals and clinics in several states on Friday began the time-consuming process of recovering from a cyberattack that disrupted their computer systems, forcing some emergency rooms to shut down and ambulances to be diverted.

Many primary care services at facilities run by Prospect Medical Holdings remained closed on Friday as security experts worked to determine the extent of the problem and resolve it.

John Riggi, the American Hospital Association’s national advisory for cybersecurity and risk, said the recovery process can often take weeks, with hospitals in the meantime reverting to paper systems and humans to do things such as monitor equipment and run records between departments.

“These are threat-to-life crimes, which risk not only the safety of the patients within the hospital, but also risk the safety of the entire community that depends on the availability of that emergency department to be there,” Riggi said.

The latest “data security incident” began Thursday at facilities operated by Prospect, which is based in California and has hospitals and clinics there and in Texas, Connecticut, Rhode Island and Pennsylvania.

“Upon learning of this, we took our systems offline to protect them and launched an investigation with the help of third-party cybersecurity specialists,” the company said in a statement Friday. “While our investigation continues, we are focused on addressing the pressing needs of our patients as we work diligently to return to normal operations as quickly as possible.”

The White House has been monitoring the cyberattack, said Adrienne Watson, a spokesperson for the National Security Council.

Ani Chaudhuri, CEO, Dasera had this comment:

The recent cyberattack on Prospect Medical Holdings, leading to disrupted services in hospitals across several states, underscores a grim reality – no sector, no matter how critical, is immune to cyber threats. The impact on healthcare, already strained under the weight of the ongoing global health crisis, has immediate and far-reaching consequences on human lives. My heart goes out to the patients and healthcare providers grappling with the fallout from this event.

First and foremost, it’s essential to acknowledge that securing and governing data, especially in the cloud, is a Herculean task. We’re exploring uncharted territories where traditional security perimeters evaporate, and data sprawl is becoming increasingly common. The interconnectedness of data makes hospitals and healthcare systems particularly vulnerable as they handle massive amounts of sensitive and personal health data daily.

Moreover, the COVID-19 pandemic has accelerated the digital transformation in healthcare, pushing many providers to adopt cloud technologies quickly, often without the opportunity to implement robust security measures. It’s a harsh reminder that cybersecurity isn’t an ‘add-on’ but an integral part of our digital infrastructure that requires as much attention and investment as any other part of the system.

Empathy must also extend to understanding the colossal challenges of protecting sensitive data and maintaining services during a cyberattack. As a cybersecurity professional, I know that these are trying times, and while we aspire to prevent every attack, the truth is that no system is foolproof.

The incident also emphasizes the urgency of a multi-layered defense strategy. Zero trust security, robust data governance, regular cybersecurity audits, and continuous employee training are all vital components of such a strategy.

Even though the landscape might seem overwhelming, it’s important not to lose sight of our collective strength. Cybersecurity isn’t just the domain of security experts; it’s everyone’s responsibility. The healthcare sector and every industry need to work with cybersecurity companies, policymakers, and educators to raise awareness and build resilience at all levels of the organization.

In the face of this adversity, we must remind ourselves that while every company and sector is susceptible to attacks, we also possess the resourcefulness and resilience to adapt, learn, and grow stronger. It’s a steep mountain, but we’ll conquer it together.

This is not a good situation and again illustrates that cyberattacks can be very dangerous to us all. It also illustrates that more needs to be done to ensure that cyberattacks do not have this level of disruption.

Cyber-Attacks Targeting Government Agencies Have Increased By 40%

Posted in Commentary with tags on August 5, 2023 by itnerd

Cyber-attacks against government and public sector services rose 40% last quarter, according to BlackBerry Cybersecurity’s 2nd Quarterly Threat Intelligence Report published this week. The report claimed they stopped 1.5 million attacks from March to May of this year, 55,000 of which targeted government and public sectors.

Highlights:

90 days –Blocked over 1.5 million attacks

  • Approximately 11.5 attacks /minute.
  • Roughly 1.7 novel malware samples /minute
  • A 13% increase from the previous reporting period

Most targeted industries – Healthcare, Financial and Government services with information-stealing malware, or infostealers

Remote access increases cyber risk 

  • Rise of mobile banking malware targeting digital and mobile banking
  • Growing availability of commodity malware
  • Increase in Ransomware attacks

Researchers confirmed that the five most frequently used tactics were in the categories of discovery and defense evasion “demonstrating that attackers are diversifying their tooling in an attempt to bypass defensive controls, especially those legacy solutions based on signatures and hashes,” reads the report.Attacks during this period were predominantly focused on North America by groups such as LockBit, BlackByte and of course Clops MOVEit supply chain attacks.

George McGregor, VP, Approov had this to say:  

“This is another report which shows the increasing sophistication and frequency of cyberattacks.   “Although the geographic data in the report may reflect more the deployment of the Blackberry solutions, the conclusions that healthcare, financial services and government services are a primary focus for attackers does resonate with our own research as does the growth of discovery techniques. Specifically, we are increasingly seeing bad actors harvesting useful information from mobile apps for use in subsequent attacks.”

Governments are prime targets for threat actors. Hopefully that sector is doing everything possible to protect themselves from threats that are clearly out there.

Microsoft Warns Of Cybersecurity Complexities At Sporting Events

Posted in Commentary with tags on August 5, 2023 by itnerd

In a new study by Microsoft called the State of Play report, Microsoft highlighted the growing opportunities for threat actors to target high-profile sporting events, “especially those in increasingly connected environments, introducing cyber risk for organizers, regional host facilities and attendees.”While managing the critical-infrastructure cybersecurity at the 2022 FIFA World Cup in Qatar, Microsoft observed attackers continuously attempting to compromise connected systems through identity-based attacks.

  • “What we saw was consistent, with cyber-criminals being opportunistic and seeing where they can infiltrate and find gaps between a lot of connected systems, in the context of a large event. The cybercrime economy’s sheer size and low barriers to entry make this kind of opportunism a significant risk to account for in planning and having layered defenses in place.
  • “What makes the sports landscape unique is that the IT assets and operations are so different, you have a lot of mobile devices across teams and staff, and a lot of connectivity across different stadiums, training facilities, hotels and other venues. And the nature of these connections is that they stand up and down as teams complete in seasons and tournaments,” said Justin Turner, Principal Group Manager, Microsoft Security Research.

Furthermore, this allows threat actors to simultaneously target mobile payment and retail systems, socially-engineer participants, and scan for unpatched/misconfigured devices. Also, security complexity is compounded as there are numerous parties managing a multitude of systems, such as corporate sponsors, municipal authorities and third-party contractors.

George McGregor, VP, Approov has this comment:  

“A key element are the apps which are launched for events (for example the FIFA Women’s World Cup app – 10M+ downloads on Android) which are intended to be a “one-stop shop” for events. Unless they are protected, they can leak personal financial data and also be a source of other information which can be used in broader infrastructure attacks.”

Amit Patel, SVP, Cyware follows up with this:  

“Anytime you gather tens of thousands of people together using shared infrastructure it’s an attractive target for attackers. Major sports leagues are realizing that they need to address security collectively – not relying on local capabilities. By monitoring threats globally, and sharing intel automatically across leagues and venues, and anticipating attacks, we can reduce risks considerably.”

Sporting events are clearly not the safe places that they once were. This is why not only the people who run these events have to make sure that there is a holistic view of their cybersecurity landscape, but we have to do our part by being mindful of the fact that there are threats that might be lurking at these events.

The UK Gov Fears That Cyberattacks On Infrastructure Could Kill Thousands

Posted in Commentary with tags on August 5, 2023 by itnerd

In the 2003 edition of the National Risk Register report, the UK government warns that a serious cyber-attack on UK critical infrastructure has a 5–25% chance of happening over the coming two years.

The report is based on the government’s internal, classified National Security Risk Assessment, and considers malicious risks such as terrorism and cyber-attacks alongside non-malicious risks like severe weather incidents. It lists several cyber-related risks, including attacks on:

  • Gas infrastructure
  • Electricity infrastructure
  • Civil nuclear facilities
  • Fuel supply infrastructure
  • Government
  • Health and social care systems
  • Transport sector
  • Telecommunications systems

The assessment ranks the likelihood of these attacks happening in the next two years as a “4” on a scale of 1–5. The predicted attacks involve “encrypting, stealing or destroying data upon which critical systems rely on or disruption to operational systems” resulting in economic cost measuring in the billions of pounds, possible fatalities of up to 1000 people and casualties of up to 2000.
 
The report also mentions AI as a “chronic risk” that poses “continuous challenges that erode our economy, community, way of life, and/or national security.”

George McGregor, VP, Approov had this to say: 

“This report presents quite a wide-ranging litany of threats and their consequences but unfortunately the “response capability requirements” for each one are very generic and do not make clear which players must take action. Linking this document to more specific mitigation and response guidelines for each area (eg cybersecurity) would make it more actionable.”

We’re past the point where cyberattacks are a mere inconvenience to businesses and the general public. They’re now in a place where they could kill people. If that isn’t an incentive for organizations of all sizes in all sectors to get their houses in order from a cybersecurity perspective, I don’t know what will make them do the right thing.