HHS Issues Warning About Trinity Ransomware Following Healthcare Attacks
The Health Sector Cybersecurity Coordination Center (HC3) has shared information on the Trinity Ransomware group, a relatively new threat actor that emerged in May 2024 that has conducted at least two attacks on healthcare providers, one in the United States and one in the United Kingdom. The UK victim is a cosmetic dentistry practice in Jersey, and the U.S. victim is a provider of gastroenterology services. Trinity claims to have stolen 330 GB of data in the attack on Rocky Mountain Gastroenterology. Since the group has conducted at least two attacks on healthcare companies out of ten known attacks, the group is considered to pose a significant threat to the U.S. healthcare sector. Like many other ransomware actors, Trinity ransomware engages in double extortion, stealing data before encrypting files. Victims are told to pay the ransom to obtain the decryption keys and prevent the publication of the stolen data on its dark web data leak site. Victims are given 24 hours to make contact, or they will be added to the group’s data leak site. If the ransom is not paid within the...
What is an IDN in Healthcare?
An IDN in healthcare is an Integrated Delivery Network – an umbrella term for any type of arrangement in which healthcare providers (and sometimes payers) work together to provide collaborative and coordinated care. Depending on the type of arrangement, an IDN in healthcare can consist of entities under common ownership or can be an affiliation of independent entities. IDNs in healthcare range in size from small provider networks offering localized healthcare services in a specific area of medicine, to huge healthcare delivery systems offering a full range of healthcare services across most of the country. Some consist solely of healthcare services (i.e., HCA Healthcare). Others (i.e., Optum) are owned by payers (in this case, UnitedHealth). Where an IDN is not directly affiliated with – or owned by – a payer, there may be an arrangement with a payer to provide in-network services. When this happens, the healthcare IDN may be regarded as a preferred partner or as part of a health maintenance organization (HMO) depending on the type of arrangement. In the former case,...
California Sues Catholic Hospital for Denying an Emergency Abortion
California Attorney General Rob Bonta is suing the owners of Providence St. Joseph Hospital in Eureka, CA, for denying a patient an emergency abortion, in violation of multiple state laws, including California’s Emergency Services Law, the state equivalent of the federal Emergency Medical Treatment & Labor Act (EMTALA). The lawsuit concerns the denial of emergency care to a patient whose waters broke when she was 15 weeks pregnant with twins on February 23, 2024. According to AG Bonta, the patient, Anna Nusslock, presented at the hospital and despite there being an immediate threat to her life and health, she was denied an emergency abortion even though she was severely bleeding and the pregnancy was no longer viable. A doctor at Providence St. Joseph Hospital diagnosed Nusslock with previable premature pre-labor rupture of membranes (Previable-PPROM) and confirmed that the twins would not survive. The patient was at an increased risk of permanent harm or death, and while abortion is a standard treatment for Previable-PPROM at such an early stage of the pregnancy, that...
Weiser Memorial Hospital Investigating Cyberattack
Weiser Memorial Hospital in Idaho recently experienced a cyber incident and is investigating claims that a cybercriminal group stole data in the attack. It is unclear exactly when the attack occurred. The notice about the cyberattack was added to the hospital’s Facebook page on September 5, 2024, and the post was updated on September 17, 2024, confirming that the hospital is still working on restoring full functionality to its systems. Weiser Memorial Hospital did not name the group behind the attack, but this appears to have been an attack by the Embargo ransomware group. Embargo is a relatively new ransomware-as-a-service group that emerged earlier this year. The group is known to engage in double extortion, stealing data from victims before encrypting files with ransomware. At this stage of the investigation, it is unclear to what extent patient data was involved. Weiser Memorial Hospital said it is currently researching to determine if the group’s claims are factual. If data has been stolen, notification letters will be mailed to the affected individuals. In the meantime,...
Critical Zimbra Flaw Being Mass Exploited
Hackers are mass exploiting a critical command injection vulnerability to gain access to vulnerable Zimbra email servers. Successful exploitation of the flaw allows malicious code to be remotely executed on the Zimbra email server. Threat actors have been exploiting the flaw to drop and execute a webshell on the Zimbra server. Once installed, the webshell provides full access to the Zimbra server, allows the downloading and execution of additional files, and provides the required access for a more extensive network compromise. The vulnerability is tracked as CVE-2024-45519 (CVSS base score: 9.8) and affects Zimbra’s postjournal service, which parses inbound emails over SMTP. The vulnerability can be exploited by sending a specially crafted email with malicious code in the CC field. A vulnerable Zimbra server will execute the code in the CC field when the postjournal service processes the email. Exploitation of the flaw was first detected by HarfangLab researcher Ivan Kwiatkowski and has also been confirmed by Proofpoint. Proofpoint confirmed it detected exploitation of the flaw in...



