Hackers Start Attempting Exploitation of Critical MOVEit Transfer Vulnerability
Progress Software has recently disclosed two flaws in its MOVEit Transfer managed file transfer solution, and one flaw in MOVEit Gateway. The first attempts at exploitation were detected within a day of the public disclosures. All three of the flaws are authentication bypass issues and successful exploitation would allow unauthorized individuals to gain access to sensitive data. The MOVEIt Transfer flaws affect the following MOVEit versions: 2023.0.0 before 2023.0.11 2023.1.0 before 2023.1.6 2024.0.0 before 2024.0.2 The most serious MOVEit Transfer vulnerability is a critical flaw tracked as CVE-2024-5805 which has a CVSS score of 9.1. The second flaw is tracked as CVE-2024-5806 and is rated high-severity with a CVSS score of 7.4. The second vulnerability is in a third-party component of MOVEit Transfer and a patch for that vulnerability has not yet been released. Progress Software said it notified customers about the flaws on June 11, 2024, and patched the CVE-2024-5805 vulnerability in versions 2023.0.11, 2023.1.6, and 2024.0.2, which are available for download on the Progress...
Data Compromised in Cyberattacks on LivaNova and Neurobehavioral Medicine Consultants
Cyberattacks have been reported by the medical device manufacturer LivaNova (129,219 individuals) and Neurobehavioral Medicine Consultants in Ohio (18,182 individuals). LivaNova The Italian American medical device manufacturer LivaNova has notified 180,000 individuals* about the exposure of their personal and protected health information (PHI) in a cyberattack. Suspicious activity was identified within its network on November 19, 2023. Action was immediately taken to secure its systems and third-party cybersecurity experts were engaged to assist with the investigation and remediation efforts. The investigation confirmed that an unauthorized third party gained access to its network on or around October 26, 2023, and retained access until the intrusion was identified on November 19. The nature of the cyberattack was not disclosed; however, LivaNova said that it disrupted parts of its IT systems and access was gained to parts of the network that contained patient information. The file review confirmed that the following types of information were exposed in the incident: name; contact...
Feds Warn of Phishing and Social Engineering Campaign Targeting Healthcare Organizations
A joint cybersecurity advisory has been issued by the Federal Bureau of Investigation (FBI) and the Department of Health and Human Services (HHS) about an ongoing social engineering campaign targeting the healthcare and public health (HPH) sector. The campaign has been running since August 2023 and seeks access to email account credentials to divert automated clearinghouse (ACH) payments to U.S. bank accounts under the threat actor’s control. The threat actor targets email accounts and once access has been gained, pivots to targeting login credentials that allow them to make changes to accounts involved in reimbursement payments to insurance companies, Medicare, and other entities. Two methods have been identified for initial access to email accounts. Phishing emails are sent that direct the recipient to a spoofed webpage where credentials are harvested. The domains used for this campaign closely resemble the domains used by the targeted organization, differing by one character. An alternative method involves vishing calls to the targeted organization’s IT helpdesk. Social...
Email Accounts Compromised at Aultman Hospital & Benefit Management LLC
On April 24, 2024, Aultman Hospital in Canton, OH, identified phishing emails being sent from an employee’s email account. The account was immediately secured, and an investigation was launched which confirmed that the employee’s email account had been compromised without their knowledge between April 22 and April 24, 2024. The investigation included an analysis of the email system, and it was confirmed that the incident was limited to the email account of a single employee and that the attacker had not gained access to any other IT systems. Aultman Hospital suspects the aim of the attack was a phishing email scheme to compromise email accounts rather than to access emails and attachments in accounts; however, it was not possible to rule out unauthorized access to emails and email attachments. A manual review was conducted of the emails and attachments that confirmed they contained patient information. The information exposed varied from individual to individual and many have included one or more of the following: Patient names, addresses, dates of birth, medical record numbers,...
Healthcare Scores a B for Cybersecurity
SecurityScorecard has given the U.S. healthcare industry a B+ rating for cybersecurity for the first half of 2024 with the industry performing better than expected, despite major breaches being reported, including what could turn out to be the mother of all healthcare breaches – the ransomware attack on Change Healthcare that could potentially affect 1 in 3 Americans. As the researchers pointed out, a cyberattack on a large healthcare organization has the potential to cripple the entire healthcare system, as the ransomware attack on Change Healthcare demonstrated. Given the magnitude of the attack and the extent of the disruption caused, SecurityScorecard’s STRIKE threat intelligence team sought to identify overall cyber hygiene at large healthcare organizations and the biggest security risks that those organizations face. SecurityScorecard’s researchers examined the security ratings at the top 500 publicly traded healthcare companies in the United States, including healthcare providers, pharma and biotech firms, insurance and billing companies, and medical device manufacturers and...



