Thursday, March 28, 2024

Healthcare Cyberattack Trends In 2019

Healthcare Cyberattack Trends In 2019

How do you feel about this story?

Like
Love
Haha
Wow
Sad
Angry

During the first five months of 2019, healthcare organizations were under nearly constant cyberattack attempts ranging from targeted phishing and customized ransomware incidents to more common exploits such as malware and botnets. The examples below serve as a takeaway so that we can learn from what has come before.

Traditional Healthcare Network Threats

One of the most prevalent threats was the Android/Generic.AP malware that targets Android mobile devices. Once installed on a phone, this trojan can capture keystrokes, collect system information, download/upload files, perform denial-of-service attacks, and run/terminate processes. In networks where healthcare providers rely on their mobile devices to provide real-time patient information, compromised phones can become a conduit for introducing additional malware into the network and gaining unauthorized access to patient information.

Botnets have been another challenge so far in 2019. Gh0st RAT is able to take full control of a victim’s machine, as well as log keystrokes and hijack webcam and microphone data. Bladabindi is similar, but it can also steal stored credentials such as usernames/passwords and other PII.

Targeted Attacks

We have also seen a spike in targeted attacks against healthcare networks. Incidences of an older trojan called Kwampirs, that targets the systems of MRI and X-ray machines and siphons their configuration data, have been documented being actively deployed inside specific networks.

SamSam ransomware has also been targeting the healthcare industry, but we are now seeing [2] additional capabilities being developed and additional malware being included with the ransomware payload, which should worry security administrators.

What You Can Do

Four Steps To Security Hygiene

The best place to start is with the basics. Best security hygiene practice involves four essential elements:

* Patch your devices religiously.
* Update hardware and software when possible.
* Replace older systems that can no longer be patched or updated.
* Implement strong proximity controls for systems that cannot be replaced.

You Can’t Secure What You Can’t See

Visibility not only requires seeing every device on your network, but also knowing what they are and the role they play. Here are a few:

* MISSION-CRITICAL SYSTEMS – It’s crucial that you understand your mission-critical processes, including critical care areas that cannot withstand downtime.

* ONLINE ASSETS – Maintain an automatically updated inventory of every asset on your network. Those resources that rely on remote access, such as telemedicine or remote clinics, need extra attention.

* EXTENDED INFRASTRUCTURE – You need to not only understand your network topology, but cloud resources such as SaaS applications and infrastructures, as well as remote and branch offices.

* MEDICAL IOT – Monitoring or treatment systems need to be identified, tracked, and secured, including mobile devices that move between hospital departments or even into patient homes.

Segmentation Is Crucial

Once an attacker manages to gain access to the network, they will continue to drive deeper to achieve their goals. Proper network segmentation can limit lateral movement, thereby slowing down attacks and even discouraging attackers – giving you more time for detection and response.

Ransomware – Not If, But When

Given their user’s preference for healthcare networks, healthcare IT administrators need to assume they will continue to be the target of a ransomware attack. Proper preparation includes an aggressive backup strategy, storing backups and recover systems offline, and running restoration drills so recovery can be fast and effective.