Vulnerabilities Identified in Azure Health Bot Service
Two vulnerabilities have been identified in the Azure Health Bot Service that can be exploited to access cross-tenant resources including user and customer information, according to Tenable Research. The Azure Health Bot Service is a cloud-based platform that has been developed for use in healthcare. Developers can use Azure Health Bot to build and deploy AI-powered, HIPAA-compliant, conversational AI-powered virtual assistants at scale to improve efficiency and reduce costs. Virtual assistants can be created for specific healthcare purposes and can handle administrative tasks or even triage to reduce the burden on staff. Depending on the configuration of these chatbots, they can have access to sensitive patient information, so if vulnerabilities exist, that information may be at risk. Potentially, vulnerabilities could be exploited to gain access to other resources. Researchers at Tenable conducted an audit of the Azure Health Bot Service to identify potential security issues, and one of the features investigated was the Data Connections feature. Data Connections allows chatbots...
Enzo Biochem Settles HIPAA Violations with State Attorneys General for $4.5 Million
New York Attorney General Letitia James has announced that a settlement has been agreed with the New York-based biotechnology company Enzo Biochem and its subsidiary Enzo Clinical Labs (Enzo) to resolve alleged violations of the Health Insurance Portability and Accountability Act (HIPAA) Security Rule and state law. Under the terms of the settlement, Enzo will pay a $4.5 million civil monetary penalty and has agreed to strengthen its cybersecurity practices. The New York Attorney General, assisted by the New Jersey and Connecticut Attorneys General, launched an investigation of Enzo following a report of an April 2023 data security incident. Hackers gained access to an Enzo database server that was used for analytics and reporting, exfiltrated data relating to testing between October 2012 and April 2023, and then used ransomware to encrypt files. In total, around 2.4 million patients had their data stolen in the attack, including 1,457,843 New York residents. The hackers used the login credentials of two Enzo employees to access the server. The investigation found that those login...
Kootenai Health Ransomware Attack Affects 464,000 Individuals
Kootenai Health, a Coeur d’Alene, ID-based health system that serves patients in northern Idaho and the Inland Northwest, has announced that it has experienced a data security incident involving the personal and protected health information of patients, employees, and employees’ dependents. Kootenai Health said the incident has not had any impact on its operations, and care has continued to be provided to patients; however, the incident disrupted some of its IT systems. Unusual activity was detected within its computer systems on March 2, 2024. Third-party cybersecurity experts were engaged to investigate the incident, and evidence was found that an unauthorized individual gained access to its network on or around February 22, 2024. Kootenai Health conducted a review of all files on the systems that were accessed to determine if they contained any personal or protected health information, and that process was completed on August 1, 2024. The incident affects employees and patients of Kootenai Health, Kootenai Clinic, Kootenai Outpatient Surgery, and Kootenai Outpatient...
FBI-led Operation Shut Down Radar/Dispossessor Ransomware Group’s Servers
The Federal Bureau of Investigation (FBI) led an international operation against the Radar/Dispossessor ransomware group, resulting in the dismantling of 24 servers used by the group, including 3 in the US, along with 9 criminal domains, 8 of which were in the US. Radar/Dispossessor is a criminal ransomware-as-a-service (RaaS) group led by an individual with the moniker ‘Brain.’ The group uses affiliates to conduct attacks in exchange for a percentage of any ransoms that are paid and has been in operation since August 2023. Like many other criminal ransomware groups, Radar/Dispossessor engages in double extortion, where sensitive data is identified and exfiltrated from victims’ systems and held to ransom in addition to encrypting files. Payment is required to decrypt data and to prevent the stolen data from being released to the public. The group is known to exploit weak passwords and a lack of 2-factor authentication to gain access to victims’ networks, then administrator rights are obtained to access and exfiltrate files and deploy the ransomware payload. If victims do not make...
What is an FQHC in Healthcare?
An FQHC in healthcare is a Federally Qualified Health Center that provides low cost “safety net” medical services in an underserved area or to an underserved population. Qualifying FQHCs are funded by Federal grants and receive cost-based reimbursement for Medicare and Medicaid patients. They also qualify for malpractice coverage under the Federal Tort Claims Act (FTCA). FQHCs in healthcare are more commonly known as Community Health Centers as they were originally privately funded non-profit clinics serving the poorest urban areas. Federal support for Community Health Centers started in the 1960s; and, in 1990, the term Federally Qualified Health Center was added to the Social Security Code to distinguish Community Health Centers that provided services for patients under Medicare and Medicaid. In 1996, the Health Centers Consolidation Act expanded the definition of an FQHC in healthcare to include Migrant Health Centers, Health Care for the Homeless Programs, and Public Housing Primary Care Programs that received federal grants. The Act also added a new Section to the Public...



