BianLian Threat Group Claims Responsibility for Cyberattack on Boston Children’s Health Physicians
Boston Children’s Health Physicians (BCHP), a Valhalla, NY-based multi-specialty pediatric group serving newborns and children in New York and Connecticut, has confirmed that its IT vendor (ATSG Inc.) fell victim to a cyberattack. The IT vendor notified BCHP on September 6, 2024, that unusual activity had been identified in the IT vendor’s systems. On September 10, 2024, BCHP identified unauthorized activity within its own network and immediately implemented its incident response protocols, which included shutting down systems as a protective measure. Assisted by a third-party digital forensics firm, BCHP learned that on September 10, 2024, an unauthorized third party gained access to certain parts of its network and exfiltrated files that included information related to current and former employees, patients, and guarantors. BCHP has posted a substitute breach notice on its website that confirmed that the information in those files may have included names, Social Security numbers, addresses, dates of birth, driver’s license numbers, medical record numbers, health insurance...
OCR Issues Guidance on Ransomware Prevention and Response
The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) has published a video presentation offering guidance to HIPAA-regulated entities on ransomware prevention and compliance with the HIPAA Security Rule. The video presentation was released in recognition of National Cybersecurity Awareness Month to improve awareness of the threat of ransomware and educate HIPAA-regulated entities on how compliance with the HIPAA Security Rule can help prevent ransomware attacks and limit their impact. OCR investigates all large data breaches (500 or more records) to determine if noncompliance with the HIPAA Rules led to or contributed to the attack. These investigations have allowed OCR to identify ransomware trends, which Nick Heesters, OCR’s senior advisor for cybersecurity, explains in the video presentation. Ransomware attacks on HIPAA-regulated entities increased by 102% between 2019 and 2023 and large numbers of attacks have already been reported this year. It is clear that ransomware is one of the biggest threats to health information privacy. OCR is currently...
What is Incident Reporting in Healthcare?
The term incident reporting in healthcare refers to the processes developed to report or escalate an incident that affects patients, members of the workforce, and/or the organization at which the incident occurs. Effective incident reporting in healthcare can enhance patient safety, workplace safety, and regulatory compliance, and provide insights into how to mitigate the likelihood of future incidents. There are many types of “incidents” that can occur in healthcare. For example, patients can suffer adverse events due to medication errors, members of the workforce can be injured due to slips, trips, or falls, and organizations can experience cyberattacks that affect their ability to function effectively. When these incidents occur, the processes developed to report or escalate incidents can determine how quickly they are resolved and what the consequences are. What is an Incident Report in Healthcare? In its simplest form, an incident report in healthcare is a report of an error, accident, or other event that occurred in a healthcare facility. Non-emergency reports are usually...
What are the HIPAA Technical Safeguards?
The HIPAA Technical Safeguards consist of five Security Rule standards that are designed to protect ePHI and control who has access to it. All covered entities and business associates are required to comply with the five standards or adopt equally effective measures. However, evidence suggests many covered entities and business associates fail to comply with the HIPAA Technical Safeguards. Despite advances in technology over the past twenty years, the HIPAA Technical Safeguards (45 CFR §164.312) have remained unchanged since their publication in February 2003. This is not due to lax rulemaking by the Department of Health & Human Services (HHS), but rather testament to the work that went into fine-tuning the standards between the publication of the Proposed Security Rule in 1998 and the publication of the Final Security Rule five years later. Consequently, it can be beneficial to go back to the Federal Register entry for the Final Security Rule in order to review the analyses published alongside the standards and implementation specifications. This can help covered entities and...
Thousands of Medical Devices and Data Systems Exposed Over the Public Internet
Censys, a provider of an Internet intelligence platform for threat hunting and attack surface management, has identified thousands of IP addresses that expose medical devices and systems over the Internet, almost half of which (49%) are located in the United States. Censys security researcher Himaja Motheram explained that the research was focused on identifying publicly accessible interfaces and services from the perspective of an external threat actor looking to conduct an attack on a healthcare organization or gain access to healthcare data. The company identified 14,004 unique IPs that publicly exposed healthcare-related devices and applications on the Internet but suggests that their research likely only captured a portion of exposed devices, with many other systems likely exposed but not openly accessible. The findings of the study have been published in the Censys 2024 Global State of Internet of Healthcare Things (IoHT) Exposures on Public-Facing Networks report. The most commonly exposed medical assets were DICOM servers (5,100), which are used for viewing and transferring...



