More Than 70,000 Adventist Health Tulare Patients Affected by Business Associate Breach
A business associate of Adventist Health Tulare has identified unauthorized access to the information of 70,000 patients, and Columbia University Irving Medical Center has discovered patient data has been exposed on the internet. Adventist Health Adventist Health has recently announced that the protected health information of more than 70,000 patients of Adventist Health Tulare in California has been accessed by an unauthorized individual. The security breach occurred at a business associate, Signature Performance, which was used to collect payments for services. Adventist Health said Signature Performance identified suspicious activity within its network, and the forensic investigation confirmed that patient information had been accessed; however, Adventist Health said the data was not used for illegal activity. It is unclear how that determination was made. Notification letters are being mailed to the affected individuals by Signature Performance, and the notification letters will state for each individual the types of information involved. A toll-free number has been established...
High Severity Flaws Identified in MicroDicom DICOM Viewer
Two high-severity vulnerabilities have been identified in MicroDicom DICOM Viewer medical image viewer, one of which could lead to the execution of arbitrary code and the other could allow an attacker to retrieve sensitive files, add new medical images, or overwrite existing medical images on the MicroDicom DICOM Viewer system. CVE-2024-33606 is due to the use of a handler for a custom URL scheme that does not properly restrict which actors can invoke the handler using the scheme. The lack of proper authorization would allow an attacker to retrieve sensitive files containing patients’ protected health information, add new images, or replace existing images, potentially causing harm to patients. User interaction is required for an attacker to exploit the flaw. The vulnerability has been assigned a CVSS v4 severity score of 8.6 (CVSS v3.1 8.8). CVE-2024-28877 is a stack-based buffer overflow vulnerability that could lead to arbitrary code execution, although user interaction is required to exploit the flaw. The vulnerability has been assigned a CVSS v4 severity score of 8.7/10 (CVSS...
Snowflake Customers Attacked in Ongoing Extortion Campaign
A financially motivated threat actor tracked as UNC5537 has been conducting a campaign targeting Snowflake customer databases. At least 165 Snowflake customers are thought to have been affected. Snowflake is a multi-cloud data warehousing platform that customers use to store and analyze large volumes of structured and unstructured data. According to the Google-owned cybersecurity firm Mandiant, the threat actor has been systematically compromising customer accounts using stolen credentials, with the earliest evidence of account compromise detected on April 14, 2024. When access is gained to the accounts, data is exfiltrated and demands are issued for payment to prevent the sale of the stolen data. Mandiant has notified 165 customers that they are exposed, but Snowflake has yet to confirm how many of its customers have been affected. Pure Storage has confirmed that an instance used for customer support was compromised, although no compromising customer data was accessed. While Snowflake accounts are being targeted, no evidence has been found to indicate that there has been a breach...
Microsoft & Google Offering Free and Discounted Cybersecurity Services to Rural Hospitals
Under the Biden administration’s Health Sector Cyber Initiative, Microsoft and Google have committed to providing critical access and rural hospitals with free and heavily discounted services to help them improve HIPAA cybersecurity. Cyber threat actors are targeting the healthcare industry and attacks are increasing. In 2023, the healthcare sector suffered more ransomware attacks than any other critical infrastructure sector, with attacks up 130% from the previous year, and healthcare cyberattacks increased by 128% from 2022 to 2023. To combat these attacks, resilience needs to be improved across the healthcare sector; however, many hospitals simply do not have the funds to invest in cybersecurity, and that is especially true for rural hospitals. Successful cyberattacks on rural hospitals can be devastating, especially for smaller, independent critical access and rural emergency hospitals. A critical access hospital is a designation given to rural hospitals by the Centers for Medicare and Medicaid Services (CMS) when they are more than 35 miles from the nearest hospital or more...
Security Vulnerabilities Identified in VA-OIG Audit of Bedford VA Healthcare System
An audit of Bedford VA Healthcare System in Massachusetts by the Department of Veteran Affairs Office of Inspector General (VA-OIG) identified several security failures that are putting systems and veterans’ data at risk. The Federal Information Security Modernization Act of 2014 (FISMA) requires the VA-OIG to conduct annual security audits to determine if facilities are meeting federal security requirements. The Bedford VA Healthcare System was selected for an audit as it had not been visited as part of the annual FISMA audit. The VA-OIG inspection focused on three security control areas: configuration management, security management, and access controls, and deficiencies were identified in each of those areas. VA-OIG determined that 87% of network devices used operating systems that did not meet federal minimum security requirements including 4% of devices that had reached end of life, were no longer supported by the vendor, and did not receive security patches to fix vulnerabilities. Those devices had 12 unpatched vulnerabilities that are included in the Cybersecurity and...



