What Does DME Stand For in Healthcare?
DME in healthcare stands for durable medical equipment – defined by CMS as equipment that is used for medical purposes by an individual who is sick or injured and that can withstand at least three years of repeated or frequent use. However, in the context of healthcare compliance, it can be more important to understand the HIPAA status of DME suppliers. One of the reasons it is important to understand what does DME stand for in healthcare is that suppliers of durable medical equipment qualify as healthcare providers under §1395x(s) of the Public Health and Welfare Code. This means that, if a supplier of DME conducts electronic transactions covered by Part 162 of the Administrative Simplification Regulations (i.e., as a Medicare-enrolled DMEPOS supplier), they qualify as a HIPAA covered entity. If a supplier of DME qualifies as a HIPAA covered entity, this has an impact on when it is permissible for a healthcare provider (who also qualifies as a HIPAA covered entity) to disclose Protected Health Information (PHI) to the DME supplier without a HIPAA authorization. It may also have an...
NHS Software Provider Facing £6M Fine Over Ransomware Attack
An IT and software services provider in the United Kingdom is facing a £6.09 million ($7.74 million) financial penalty over an August 2022 ransomware attack that disrupted the National Health Service (NHS) and other healthcare and social care services in England. The UK’s data watchdog, the Information Commissioners Office (ICO), investigated the attack and has disclosed the provisional findings of the investigation and the proposed financial penalty. Advanced Computer Software Group, which provides IT and software services to the NHS and other organizations in the UK, was determined to have failed to implement sufficient measures to protect the personal information of 82,946 patients, whose data was stolen in the ransomware attack. The stolen data included names, contact information, and medical records. Almost 900 of the affected individuals were receiving healthcare services at home and had given their providers information about how to access their properties, and that information was also stolen in the attack. The attack caused considerable disruption, including to the NHS 111...
BEC Emails Increase 20% YoY; AI Used in 40% of Attacks
There has been a surge in business email compromise attacks in the past year and cybercriminals are increasingly using AI tools to craft their malicious emails, according to data from Vipre Security Group. Business email compromise (BEC) is a form of social engineering involving spoofed or compromised email accounts, with the email accounts used for the scam often compromised through phishing. These attacks may seek sensitive information, but most commonly the aim is to trick individuals with responsibility for wire transfers into making fraudulent transfers to an attacker-controlled account. For example, a vendor’s email account is compromised and used to send messages to clients and ask them to change bank account information for an upcoming payment. BEC is one of the costliest types of cybercrime. According to the Federal Bureau of Investigation (FBI) Internet Crime Report, $2.9 billion was lost to BEC scams in 2023 and 21,489 complaints about BEC attacks were received by its Internet Crime Complaint Center (IC3). Despite the increase in ransomware attacks, losses to BEC attacks...
Health-ISAC/AHA Issue Warning Following Ransomware Attacks on Mission-Critical Suppliers
Health-ISAC and the American Hospital Association (AHA) have issued a joint threat bulletin following three ransomware attacks by Russian ransomware groups on blood suppliers, which have caused shortages of blood and blood products that have massively disrupted patient care. The most recent attack occurred on July 30, 2024, on OneBlood, a Florida-based provider of blood to around 250 hospitals in Alabama, Florida, Georgia, and North and South Carolina. The attack prompted the Florida Hospital Association to recommend hospitals that receive blood from OneBlood activate their critical blood shortage protocols. The RansomHub threat group is thought to have been behind the attack. In early June, the Qilin ransomware group conducted an attack on Synovis, a provider of pathology services to the UK’s National Health Service, which caused massive disruption with more than 800 operations and 700 outpatient appointments canceled. The attack resulted in major blood shortages, with O-negative and O-positive blood donations destroyed as it was not possible to match them to electronic health...
Ransomware Group Targets IT Workers by Impersonating Legitimate Scanning Tool
The Hunters International threat group is targeting IT workers by impersonating a legitimate IP and port scanning tool to deliver malware to gain initial access to networks. Hunters International is a ransomware group that first emerged in October 2023. The group has been linked with the Hive ransomware group, which was the subject of a law enforcement operation and shut down in January 2023. While security researchers have suggested Hunters International was a rebrand of Hive due to a 60% code overlap with Hive, the group claims to have purchased the Hive code and that it is an independent group. Hunter’s International is not the most prolific ransomware group but has conducted more than 130 attacks so far this year. As the group’s name suggests, attacks are conducted worldwide, with the threat actor claiming victims in around 30 countries. The group primarily hunts for data, which is exfiltrated from victims’ networks. Threats are issued to publish the stolen data if a ransom is not paid, with the attacks often including file encryption. Hunters International poses a significant...



