Cyberattack on insurance company Change Healthcare disrupting business for doctors, therapists

Posted in Commentary with tags on February 29, 2024 by itnerd

 CNN is reporting that a week after a cyberattack disrupted insurance processing at pharmacies across the US and health care professionals in the US have stated the hack continues to upend their businesses and cost them money:

Carter Groome, chief executive of Health First Advisory, a cybersecurity firm whose clients include big health care organizations, estimated that some health care providers are losing more than $100 million per day because of the outage.

“That’s just not sustainable in an industry with not a lot of cash on hand,” Groome told CNN.

“This is our Colonial Pipeline,” he said, referring to a 2021 ransomware on one of America’s biggest pipelines that disrupted fuel shipments for days and cemented ransomware as a national security concern in the minds of senior US officials.

In the wake of the hack, Elevance Health, which owns Anthem Blue Cross and Blue Shield and insures millions of Americans, has severed network connections to Change Healthcare “out of an abundance of caution,” Elevance spokesperson Leslie Porras told CNN in an email.

“The ability for our members to access medical care, services or fill their prescriptions remains unaffected,” Porras said.

As of Wednesday morning, Change Health Care said the company’s affected network was still offline. Tyler Mason, a company spokesperson, said that insurance claims submissions have returned to “pre-disruption levels” because health care providers are using “alternative clearing houses” to submit claims.

Mason said that doctors and patients can use these workarounds to address the problems described by Parikh and Disney.

“Since identifying the cyber incident, we have worked closely with customers and clients to ensure people have access to the medications and the care they need,” Mason said in an email. “As we remediate, the most impacted partners are those who have disconnected from our systems and/or have not chosen to execute workarounds.”

This is bad. I will comment as to why in a moment. But right now, I’ll let Melvin Lammerts, Lead Hacker, Hadrian comment on this:

“The Change Healthcare attack underscores the healthcare sector’s vulnerability to damaging cyberattacks. This incident caused significant disruptions in patient care, financial losses for providers, and potential harm to patients and their families.It highlights systemic weaknesses in healthcare cybersecurity and the pressing need for healthcare organizations to prioritize robust security measures. This includes thorough risk assessments, comprehensive incident response plans, strong network protection, and reliable backup systems.Furthermore, the attack emphasizes the importance of collaboration between healthcare providers and government agencies. This partnership is essential to build more resilient defenses against evolving cyber threats and mitigate their severe impact on patient care.”

This is still another example of how healthcare organizations are low hanging fruit for threat actors. The fact that I am writing about this so often in the last few days illustrates that. Change to make healthcare less of a target needs to happen now.

UPDATE: BullWall Executive, Carol Volk had this to say:

   “Ransomware attacks in the healthcare sector endanger patient lives by disrupting critical services and their supply chain. Strong cybersecurity practices are essential to protect patient safety, as well as privacy and to ensure continuity of care. Providers throughout the entire healthcare chain must prioritize cybersecurity by conducting thorough risk assessments and implementing effective response strategies to remove this important target from attacker’s sights. First class defense tools, including ransomware containment systems are readily available and must be a priority or we’ll continue to see attacks escalate.”

Mark B. Cooper, President & Founder, PKI Solutions adds this comment: 

   “The lingering effect and the extent of those impacted by Change’s cyber-attack exemplifies the prolific challenges the healthcare industry faces in safeguarding its Critical Infrastructure Protection (CIP) environments.   

   “It highlights the need for mindset shift from reactive to proactive measures that prevent vulnerabilities from becoming a problem. It requires real-time, attentive monitoring to quickly identify misconfigurations and alert the appropriate security resources for prompt remediation. Without such measures, the healthcare industry will continue to be targets with debilitating outcomes where the impact isn’t triggering simply an 8-K or an assembly line disruption, it’s a peoples’ health and their quality of life.

Emily Phelps, VP, Cyware had this comment:

   “This event highlights the vulnerability of healthcare organizations to cyber threats and the cascading effects such disruptions can have on patient care and revenue streams. It emphasizes the urgent need for healthcare organizations to invest in cybersecurity efforts that enable proactive defense. 

   “By leveraging Health ISACs, for example, and integrating and operationalizing threat intelligence, even organizations with limited security resources can better anticipate and mitigate the impact of such attacks. This approach not only protects sensitive data but also ensures that healthcare services remain uninterrupted, thereby safeguarding patient well-being. In response, the healthcare sector must prioritize investments in cybersecurity infrastructure and training to build resilience against future cyber threats.”

BlackCat Confirmed As Pwning UnitedHealth’s Tech Unit

Posted in Commentary with tags on February 29, 2024 by itnerd

A Reuters report has popped onto my radar where it details that UnitedHealth’s tech unit Change Healthcare has been pwned by the BlackCat ransomware group. And the company confirms this. Which effectively confirms this story that I recently wrote:

UnitedHealth Group said on Thursday the cyberattack at its tech unit, Change Healthcare, was perpetrated by hackers who identified themselves as the “Blackcat” ransomware group.

The statement confirms a Reuters report on Monday. UnitedHealth had initially blamed a “suspected nation-state associated cybersecurity threat actor” for the disruption.

The hack, disclosed last Wednesday, has had a knock-on effect on players across the U.S. healthcare system, as disruptions triggered by the attack have impacted electronic pharmacy refills and insurance transactions.

The company said its experts were working with law enforcement authorities and third-party consultants to gauge the impact on its customers and patients.

“We are working on multiple approaches to restore the impacted environment and continue to be proactive and aggressive with all our systems, and if we suspect any issue with the system, we will immediately take action,” UnitedHealth said.

In a message posted on its darknet site, which was quickly deleted, the group known as “Blackcat” or “ALPHV” said on Wednesday it stole millions of sensitive records, including medical insurance and health data, from the company.

I have two comments on this story. Starting with Nic Finn, Senior Threat Intelligence Consultant at GuidePoint Security:

Following December’s law enforcement disruption of their data leak site, Alphv, also known as BlackCat, has vowed increasingly aggressive actions and removed ostensible restrictions on targeting critical infrastructure and healthcare.

While Alphv may have notionally prohibited targeting such organizations in the past, the group has been actively attacking healthcare organizations for a while now, with several large healthcare providers and networks impacted in 2023. Of the attacks impacting healthcare we observed in 2023, Alphv was responsible for nearly 10%, second only to LockBit.

While we have seen several healthcare organizations impacted by Alphv in 2024, it remains to be seen whether this is an intentional increase representative of deliberate targeting or just continued operations as usual, pursuing vulnerable targets of opportunity and exploiting frequent weaknesses in health organization networks. Healthcare organizations make attractive targets for ransomware groups due to the sensitivity and value of Personal Identifiable Information and Protected Health Information, which both increase extortive leverage over victims and the value of data for sale to other actors should the victim not pay.

More than perhaps any other group, Alphv has exhibited a particularly aggressive approach to public statements, routinely ridiculing victims and their associated incident responders and calling out alleged security shortcomings, which is likely intended as much as a coercive lever and ‘final warning’ to the victims as it is a signal to future victims of the consequences of non-compliance.

The next comment is from Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber:

The BlackCat group claimed Change Healthcare as a victim, and the company confirmed that cybercriminal actors are behind a recent cybersecurity incident, changing course from a previous statement that blamed nation-state hackers for the attack.

U.S. authorities announced they disrupted BlackCat’s operations late last year, but the group has recently returned to claiming attacks against new victims. A confirmed attack against a major healthcare organization would be the strongest indication that the ransomware group has resumed its activities.

BlackCat was the second most active ransomware gang in terms of claimed victims last year, threatening organizations in virtually every primary sector. December’s disruption operation may have temporarily or partially changed the group’s operational ability, but defenders across the community should note a confirmed return.

This continues a troubling trend of health care organizations being pwned in cyberattacks because they’re low hanging fruit for threat actors. This needs to change and it needs to change now.

Russia’s Total VPN Ban: Rights to Privacy and Access to Information at Risk 

Posted in Commentary with tags on February 29, 2024 by itnerd

VPN Mentor just published a report titled “The Digital Iron Curtain. Russia Prepares for a Total Ban on VPNs.”, by cybersecurity researcher Jeremiah Fowler. 

Russia’s Roskomnadzor (Russian media and internet regulator) has recently announced that a total ban on VPN services will take effect on March 1st, in Russia and occupied territories of Ukraine. This measure could significantly impact free speech and access to information for individuals attempting to circumvent the already existing censorship. 

To understand the implications for personal privacy, secure communication, and access to information, their report offers essential insights and details, including a timeline of previous digital restrictions in Russia.

You can read the report here: https://www.vpnmentor.com/news/report-russia-vpn-ban/

LockBit Appears To Be Back Online

Posted in Commentary with tags on February 29, 2024 by itnerd

It appears that the recent takedown of the LockBit ransomware gang only took them offline briefly. I say that because the gang appears to be up and running again based on this:

It will be interesting to see a bunch of things. Starting with how long they remain online as I suspect that the same law enfacement groups who recently took them down will be planning to do it again. And it will be interesting to see how effective their operations are as being taken down in the manner that they were has to have some sort of negative effect.

Seeq Announces Generative AI Capabilities with Seeq AI Assistant

Posted in Commentary with tags on February 29, 2024 by itnerd

 Seeq, a leader in industrial analytics and AI, today unveiled the Seeq AI Assistant, a generative AI (GenAI) resource embedded across its industrial analytics platform. The Seeq AI Assistant provides real-time assistance to users across the enterprise, empowering them to accelerate mastery of the Seeq platform, build advanced analytics, machine learning, and AI skills and knowledge, and accelerate insights to improve decision making in pursuit of operational excellence and sustainability.

Seeq, a leader in industrial analytics and AI, today unveiled the Seeq AI Assistant, a generative AI resource embedded across its industrial analytics platform. The Seeq AI Assistant provides real-time assistance to users across the enterprise, empowering them to accelerate mastery of the Seeq platform; build advanced analytics, machine learning, and AI skills and knowledge; and accelerate insights to improve decision making in pursuit of operational excellence and sustainability.

In a recent study by Deloitte, 93% of industrial companies believe AI will be a game changer for driving growth and innovation in the industrial sector. The analytical insights required to bolster operational excellence continue encountering roadblocks due to a shortage of skills, siloed capabilities within organizations, and untapped stockpiles of time series data.

Seeq has over a decade of experience working with some of the most recognizable names in the oil & gas, chemicals, pharmaceuticals, and other industrial sectors to remove or mitigate these roadblocks. The Seeq AI Assistant provides organizations with the opportunity to further debottleneck their most precious resource – the people at the frontlines of their processes and decisions.

GenAI is a type of artificial intelligence capable of generating new contentsuch as text, images, and code in response to prompts entered by a user. GenAI models are trained with existing data to learn patterns that enable the creation of new content. While GenAI is a powerful technology, it isn’t innately capable of generating information and guidance applicable within the complexity and context of an industrial production environment.

Seeq is uniquely positioned to drive industrial innovation with GenAI, given the company’s expertise in industrial data and its open and extensible analytics platform that was developed to leverage and serve subject matter experts and their enterprise decisions. Seeq provides on-demand access to critical time series data, data contextualization capabilities, and established intellectual property. Utilizing the extensive body of advanced analytics, data science, machine learning and coding knowledge held in Seeq technical documentation and its knowledge base, Seeq is operationalizing the power of GenAI for its customers. Combining these competencies with prompt engineering curated by the world-class analytics and learning engineers at Seeq, the Seeq AI assistant generates accurate and actionable suggestions for analytical approaches and techniques, code generation and more. Seeq also supports multiple providers and LLMs for organizational flexibility.

In short, the Seeq AI Assistant empowers frontline experts in process engineering, data science and operations to rapidly bridge process, analytics and coding knowledge gaps, unlocking workflows and results that were previously time and effort prohibitive or impossible.

Seeq is available worldwide through a global partner network of system integrators, which provides training, services, and resale support for Seeq in over 40 countries, in addition to its global direct sales organization. 

To learn more about Seeq, visit www.seeq.com.

Meltwater wins Comparably awards for “Best Company for Diversity”, “Best Company for Women”, and “Best CEO”

Posted in Commentary with tags on February 29, 2024 by itnerd

Meltwater, a global leader in media, social and consumer intelligence, is proud to announce that it is the recipient of Comparably awards for “Best Company for Diversity,” “Best Company for Women,” and “Best CEO”.

Comparably awards are based on data compiled from 15 million employee ratings across 70,000 companies. The award takes into account employee ratings and testimonials about life at Meltwater, including compensation, leadership, work-life balance, professional development opportunities, and perks and benefits.

These awards are a testament to the company’s unwavering dedication to fostering an inclusive, supportive, and empowering workplace culture. Earning recognition for “Best Company for Diversity” and “Best Company for Women” underscores Meltwater’s dedication to creating an environment where employees feel valued, respected and have equal opportunities for advancement in their careers.

Furthermore, Meltwater’s leadership, epitomized by the recognition of CEO John Box as a “Best CEO”, cultivates a strong culture of trust and transparency. Box has played a pivotal role in shaping Meltwater’s success with a strong vision and mission for the company, as well as leading the company’s growth as a world-class, enterprise SaaS solution.

Additionally, Meltwater was also named “Best CEO for Women,” “Best Company for Career Growth,” “Best Company Outlook,”, “Best Sales Teams,” and “Best Company Global Culture” in 2023.

CIRA offers up to $100,000 to community-led internet projects through its Net Good Grants program

Posted in Commentary with tags on February 29, 2024 by itnerd

For many Canadians, the ability to access, stay safe and succeed on the internet is still out of reach. To help close this gap, CIRA is launching its 2024 grants program to support not-for-profits, Indigenous communities, researchers and registered charities across the country that are working to bridge that digital divide.

Without access to high-quality, resilient internet, or the knowledge to stay safe online, many people remain isolated and at risk. Through its Net Good Grants program, CIRA is leveraging more than 10 years of experience supporting communities, projects and policies that make Canada’s internet better.

CIRA Net Good Grants

CIRA awards grants up to $100,000 for community-led internet projects with over $1,000,000 available in funding.

The program welcomes projects that focus on three core areas to bring about digital development in communities nationwide:

  • Infrastructure: connectivity research, network planning and solutions to improve internet access, speed and affordability.
  • Online safety: research, educational frameworks, tools, consultations and training programs that increase Canadians’ safety against cybersecurity threats.
  • Policy engagement: events, research and policy ecosystem work that broadens public awareness in domestic internet policy and governance.

Applications will be accepted from every province and territory with a focus on projects that benefit rural, Northern and Indigenous communities and K-12 and post-secondary students. CIRA especially encourages applications for eligible projects in the Prairies, Quebec and the Maritimes to help ensure funding reaches traditionally underserved communities.

For the past 10 years, CIRA has invested $11.7 million towards 217 digital equity projects across Canada from revenue generated through .CA domain registrations and CIRA’s cybersecurity services. Learn more about how to apply for a CIRA Grant by visiting www.cira.ca/grants. Interested applicants can also join a webinar in English on March 5 at 1 p.m. ET or in French on March 6 at 1 p.m. ET.

Who is eligible to apply?

  • Organizations recognized by the Canada Revenue Agency as registered charities;
  • Not-for-profit organizations;
  • Indigenous communities; and
  • Academics and researchers affiliated with a Canadian university or college.

Applicants are encouraged to submit their applications in advance of the deadline on April 10, at 2 p.m. ET / 11 a.m. PT.

Additional information

FBI, HHS & CISA warn US hospitals of targeted BlackCat ransomware attack

Posted in Commentary with tags , , on February 28, 2024 by itnerd

The CISA, the FBI and HHS have released an update on ALPHV/BlackCat ransomware attacks, warning that the group is targeting US healthcare orgs primarily. The three federal agencies warned in the joint advisory that, since mid-December 2023, of the nearly 70 leaked victims, the healthcare sector has been the most commonly victimized.

Darren Williams, CEO and Founder, BlackFog:

“The healthcare industry has proven an irresistible target when it comes to ransomware, with publicized attacks in 2023 seeing a 134% increase over the previous year. Healthcare organizations possess troves of valuable and sensitive data just ripe for extortion, and unfortunately in many cases the level of cyber defense simply isn’t up to the task of protecting it.  When it comes to extortion the only way to prevent it is to prevent data exfiltration in the first place. The industry must look to third generation ADX cybersecurity solutions that have been designed to do just that.”

Once again this is an example of threat actors targeting health care. Thus like I said here, this sector needs to up its game in a serious way to take themselves off the target list of threat actors.

Vevo partners with TELUS as its advertising representative in Canada

Posted in Commentary with tags on February 28, 2024 by itnerd

Today, TELUS announced a new partnership with Vevo to become its direct ad sales representative nationally, enabling Vevo to bring its extensive music video content and enhanced advertising opportunities to the Canadian market. Leveraging TELUS’ extensive reach, this collaboration enables Vevo, the world’s leading music video network, to offer advertisers a vast library of premium music video content on major Connected TV (CTV) platforms and streaming services, including YouTube, Apple TV, Samsung TV Plus, Vizio, Google TV, and Roku.

This partnership offers opportunities for advertisers to elevate their strategies and connect with their audiences through influential music videos on multiple platforms across Connected TV, mobile and desktop. Brands and agencies will reach their target audience more effectively by leveraging first-look opportunities, including premieres, programming sponsorships, and linear channel takeovers. Through Vevo’s monthly reach of more than 10 million Canadians, advertisers can now engage with consumers watching culturally relevant content, featuring stars like Justin Bieber, The Weeknd, and Drake.  

For more information about TELUS, visit www.telus.com and Vevo at www.vevo.com

Cencora Pwned In Cyberattack

Posted in Commentary with tags on February 28, 2024 by itnerd

Cencora, a pharmaceutical solutions provider, has disclosed a cyberattack which resulted in personal information being stolen from its systems. According to a filing with the SEC, breach was identified on Feb. 21 and included data being exfiltrated from its systems. What type of data and who it belongs to has not yet been disclosed.

Darren Williams, CEO and Founder, BlackFog:

     “The attack against Cencora highlights the different sections of the healthcare industry which continue to be a massive target for cybercriminals. By targeting providers of access and supply chain efficiencies, there will surely be a ripple effect felt in many places throughout the country. It is also concerning to see that hackers exfiltrated data and even more so that the type of data stolen is not yet disclosed. Once hackers successfully exfiltrate data, there is no stopping them from implementing double and triple extortion attacks, going after not only individual members of the company, but any patients or customers whose data was also stolen. As extortion continues to be the tactic of choice for attackers, the focus must be on preventing data exfiltration in the first place.” 

Healthcare is one of those low hanging fruits that threat actors love to go after. What needs to happen is that this sector needs to redouble its efforts to defend against cyberattacks so that they are no longer low hanging fruit for threat actors.