CISA Issues Alert About Multiple Philips Vue PACS Vulnerabilities
More than a dozen vulnerabilities have been identified in the Philips Vue PACS image management and communication system, including critical vulnerabilities that can be remotely exploited in a low-complexity attack. Successful exploitation of the vulnerabilities could allow an unauthenticated individual to remotely execute code, install unauthorized software, eavesdrop, view, or modify data, or negatively impact the confidentiality, integrity, or availability of the system or data. The 13 vulnerabilities affect all versions prior to 12.2.8.410. Vue PACS Vulnerabilities CVE Type CVSS v3.1 CVSS v4 CVE-2017-17485 Deserialization of untrusted data 9.8 9.3 CVE-2020-11113 Deserialization of untrusted data 8.8 7.1 CVE-2020-10673 Deserialization of untrusted data 8.8 8.7 CVE-2023-40159 Exposure of sensitive information to an unauthorized actor 8.2 8.8 CVE-2020-35728 Deserialization of untrusted data 8.1 9.3 CVE-2021-20190 Deserialization of untrusted data 8.1 9.3 CVE-2020-14061 Deserialization of untrusted data 8.1 9.3 CVE-2021-28165 Uncontrolled resource consumption 7.5 8.8 CVE-2020-40704...
Memorial Sloan Kettering Cancer Center Employees Tricked by Phishing Email
Memorial Sloan Kettering Cancer Center (MSK) has announced that the protected health information of 12,274 individuals has been exposed in a phishing attack. On April 26, 2024, MSK identified suspicious activity in an employee email account. The account was used to send an email to many other MSK employees that contained a link to a spoofed web page that prompted users to log in to their MSK accounts and captured their credentials when they were entered. Several employees were tricked by the email because the message had been sent from a valid MSK account and appeared to be a valid internal request. An analysis of the compromised email accounts confirmed they contained some protected health information, including first and last names, medical record numbers, diagnoses, medication names, treatment types, and dates of treatment. A subset of the affected individuals also had their contact information (address, email, telephone number) and dates of birth exposed. MSK confirmed that the breach was limited to email accounts, medical records were not accessed, and Social Security numbers...
ITRC: More Than 1 Billion Individuals Affected by H1, 2024 Data Compromises
The first half of 2024 saw a significant increase in the number of victims of data breaches, according to a recently published H1 Data Breach Analysis by the Identity Theft Resource Center. In the first 6 months of the year, there were 1,571 publicly reported compromises, up 14% from H1, 2023, and more than 1 billion victims. The size of some of the data breaches was astonishing. The two biggest attacks in terms of the number of affected individuals occurred at Ticketmaster Entertainment and Advance Auto Parts, with the former involving the personal data of 560 million individuals and the latter affecting 380 million individuals. A data breach at Dell Technologies affected 49 million individuals, a breach at LoanDepot affected 16.9 million individuals, and a healthcare data breach at Kaiser Foundation Health Plan rounded out the top 5 and affected 13.4 million individuals. Two other healthcare data breaches made the top 10 – The attack on the debt collection firm, Financial Business and Consumer Solutions, Inc., which affected 3,435,640 individuals, and the attack on the...
Ransomware Groups’ Data Leak Site Listings Increased by 20% in Q2, 2024
An analysis of ransomware groups’ data leak sites by Reliaquest has shown a marked increase in activity in Q2, 2024, with listings increasing by 20% from Q1 with 1,237 organizations added to the data leak sites in Q2. To add some perspective, the number of new listings on data leak sites in Q1, 2024, was atypically low for two main reasons. In Q1, an international law enforcement operation disrupted the LockBit ransomware group, and following a ransomware attack on Change Healthcare, the ALPHV/Blackcat conducted an exit scam and shut down its operation. These two groups were the most prolific RaaS operations at the time. While the number of additions to data leak sites increased by 20% in Q2, ransomware actively is down 13% from Q2, 2023, with the number of victims up 1% in H1 2024 compared to H1, 2023. The shutdown of ALPHV/Blackcat has meant affiliates of that group have had to move to other RaaS groups, and several RaaS groups have been recruiting those affiliates, such as RansomHub, BlackSuit, and BlackBasta, all of which increased their activity in the quarter. RansomHub,...
Publicly Accessible Database Contained 148,000 Files Related to COVID-19 Testing
An InHouse Physicians database containing 148K files related to COVID-19 testing has been exposed online, and Freudenberg Medical and Fairfax Radiological Consultants have experienced cyberattacks that exposed patient data. Publicly Accessible Database Contained 148,000 Files Related to COVID-19 Testing InHouse Physicians, a provider of on-site medical services and wellness programs to organizations, has inadvertently exposed a database on the Internet that included almost 150,000 documents that contained information about individuals’ COVID-19 status – whether they had been cleared to attend an event or had tested positive for COVID-19. The exposed database was identified by researcher Jeremiah Fowler, who found 12 GB of documents in the non-password-protected database, including 148,415 PDF files that contained full names, phone numbers, the name of the event, and whether individuals had been cleared to attend or were COVID-19 positive. Fowler notified InHouse Physicians about the exposed database and it was rapidly secured. It is unclear whether the database was managed by...



