Feds Issue Secure by Design Guidance for Software Purchasers
Cybercriminals and nation-state threat actors are targeting software vendors. A successful attack on a vendor could see the threat actor gain access to all their clients’ networks, providing a massive return for the same amount of effort as attacking a single customer. While some software vendors have taken great strides towards making their infrastructure and software secure, with others, much of the burden of cybersecurity falls on their customers. In April 2023, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), and their international partners published secure by design guidance for software manufacturers which explains the principles and approaches for secure by design software to help manufacturers incorporate cybersecurity during the design phase, ensuring out-of-the-box protections for software users that last for the entire product lifecycle. This week CISA and the FBI published a companion secure by design guide for software customers to help them understand a software manufacturer’s approach...
CISA, FBI Issue Updated Warning Confirming Royal Ransomware Has Rebranded as BlackSuit
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a warning about the BlackSuit ransomware group, which CISA and the FBI have confirmed today is a rebrand of the Royal ransomware – A group responsible for many attacks on healthcare organizations. CISA and the FBI first issued a warning about the Royal ransomware group in March 2023 and updated the alert in November 2023 to include new tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs). The latest update confirms that, not for the first time, the ransomware group has rebranded. Members of the group are believed to have been part of the Conti ransomware operation, a highly professional and extremely prolific ransomware group that ceased operations in the summer of 2022 and split into several smaller groups. Royal Ransomware first appeared in September 2022, but the members of the group are believed to have split from Conti in early 2022 when they started out on their own under the name Zeon. Initially, the group used third-party...
HHS Updates Civil Monetary Penalty Amounts for HIPAA Violations
The Department of Health and Human Services (HHS) has applied the annual inflation update to its civil monetary penalty (CMP) amounts, per the Federal Civil Penalties Inflation Adjustment Act Improvements Act of 2015. In December each year, the Office of Management and Budget (OMB) sets the annual inflation multiplier for all government agencies, which is calculated from the Consumer Price Index for all Urban Consumers (CPI-U) for October 2023. OMB requires the adjustment to be applied to each HHS agency’s CMPs by January 15th of each year. The HHS is usually one of the last government departments to apply the updates to its CMP amounts, with the update often applied several months after the January deadline. The HHS has missed the OMB deadline every year since 2017, although was only a few days late in 2020. Last year the update was not applied until October 6, 2024. On August 8, 2024, the HHS published confirmation in the Federal Register that the inflation multiplier has been applied, which will see CMP amounts increased by the OMB’s multiplier of 1.03241 across all HHS...
CrowdStrike Confirms Root Cause of Falcon Sensor Outage; Healthcare Losses Anticipated to be $1.94B
As promised, CrowdStrike has published the root cause analysis of the faulty Falcon Sensor software update that caused Windows devices around the world to crash. CrowdStrike had previously published the preliminary findings from its investigation, which confirmed that this was a Channel File 2971 incident caused by a faulty update involving a new Template Type. The purpose of the update was to improve visibility into novel attack types. The new Template Type had previously been used without incident; however, on July 19, 2024, despite passing multiple levels of testing, the update triggered an out-of-bounds memory read issue, causing Windows devices to get caught in a loop and display the Blue Screen of Death. CrowdStrike has now confirmed that several shortcomings have been identified that led to the crash, the most significant of which was a parameter mismatch in its rapid response content update. Falcon Sensor was expecting to receive 20 input fields but instead received 21, triggering an out-of-bounds memory read. The update on July 19, 2024, was the first IPC Template Type to...
Noncompliance with Performance Standards Contributed to Case Flow Delays at Alaska Medicaid Fraud Control Unit
A performance review of the Alaska Medicaid Fraud Control Unit by the Department of Health and Human Services’ Office of Inspector General (HHS-OIG) has uncovered multiple areas of concern, where the Units’ performance fell short of the requirements of a Medicaid Fraud Control Unit (MFCU) grant award. MFCUs investigate Medicaid provider fraud and patient abuse/neglect and prosecute cases under state law or refer those cases to other prosecuting offices. Unless there is a waiver, each state must have an MFCU. Currently all 50 states, DC, Puerto Rico, and the U.S. Virgin Islands operate MFCUs. Each MFCU receives an annual grant award which covers 90% of expenditures for new units and 75% of expenditures for all other units, with the shortfall made up with collections from their enforcement activities. HHS-OIG has oversight of MFCUs and conducts reviews to assess performance against the requirements of the grant awards and recertify the Units. HHS-OIG conducted a review of the Alaska MFCU in 2016 and identified a number of issues. Case files lacked documentation of periodic...



