Check Point Issues Warning About Attacks Targeting VPNs for Initial Access
Check Point issued a warning on Monday that hackers are actively targeting VPN solutions with weak security settings to gain initial access to enterprise networks and urged organizations that use VPN solutions for remote access to check their configurations and take steps to harden security. Check Point explained that it has observed an increase in malicious actors targeting multiple VPN products, including its own, for initial access over the past few months. The new attack trend prompted Check Point to begin monitoring attempts by malicious actors to gain unauthorized access to the VPNs of Check Point customers, and as of May 24, 2024, Check Point had identified a small number of login attempts to Check Point Remote Access VPN devices. The attacks involved using old VPN local accounts that relied on an unrecommended password-only authentication method. Password-only authentication is not recommended as there is nothing to stop compromised credentials from granting access and there is insufficient protection against brute force attempts to guess weak passwords. Check Point...
Palm Beach Health Sued for Alleged Use of Meta Pixel Tracking Code on Patient Portal
Palm Beach Health Network Physicians Group and Palm Beach Gardens Community Hospital are facing a class action lawsuit over the use of Meta Pixel tracking code. The tracking code is alleged to have collected the sensitive data of website users, which was transmitted to Meta and was made available to advertisers. The disclosures allowed targeted advertisements to be served. The lawsuit, Prosky v. Palm Beach Gardens Community Hospital, Inc. et al, was filed in Florida Southern District Court by Ron Prosky, a patient of Palm Beach Health. Prosky claims that Palm Beach Health added the Meta Pixel tracking code to its patient portal and the code collected information such as appointment details, medical test results, diagnoses, and the searches made by patients on the website. The information collected could be tied to individuals via identifying information such as their IP address. After using the website, Prosky claims to have been served targeted advertisements related to information disclosed on the site. The HHS’ Office for Civil Rights released guidance on HIPAA and website...
37% of Healthcare Organizations Do Not Have a Security Incident Response Plan
A recent survey of IT professionals has revealed that 37% of healthcare organizations* do not have a security incident response plan in place, despite it being a requirement of HIPAA. The risk of a security incident has never been greater as cyberattacks on healthcare organizations and their business associates are occurring at record levels. The survey also revealed that 1 in 3 healthcare organizations have experienced a data breach in the past 3 years, and 42% of respondents said they had experienced a ransomware attack. Almost half (48%) of attacks impacted customer data and 1 in 4 attacks impacted patient care. The main causes of attacks were malicious hacking (41%), malware (39%), social engineering and phishing (37%), software vulnerabilities (36%), employee errors (30%) and compromised credentials (24%). Incident response plans should cover all these types of attacks, and staff training is vital. Staff members should be provided with IT security and data privacy training to reduce the risk of a data breach, yet the survey revealed that 74% of healthcare organizations spent...
Email Breach Affects 10,000 University of Chicago Medical Center Patients
Hackers gained access to the email accounts of University of Chicago Medical Center employees and the data of more than 10,000 patients. An HIPAA email breach at Newton Centre Dental has affected 2,550 patients. University of Chicago Medical Center, Illinois University of Chicago Medical Center (UCMC) has completed reviewing the email accounts of a small number of employees who had their accounts accessed by an unauthorized individual earlier this year and has confirmed that the accounts contained the protected health information of 10,332 patients. UCMC did not state in the notification letters when the breach was detected; however, the forensic investigation confirmed that the accounts were breached between January 4, 2024, and January 30, 2024. Cybersecurity experts were engaged to investigate the incident and confirmed on March 28, 2024, that the compromised accounts contained patient data. The potentially compromised data included names in combination with one or more of the following: Date of birth, Social Security number, tax identification number, IRS PIN number, passport...
RansomHub Ransomware Group Adds American Clinical Solutions to Data Leak Site
The RansomHub ransomware group claims to have stolen the data of more than 400,000 patients in an attack on American Clinical Solutions, and cyberattacks have been announced by Trionfo Solutions and Brockton Area Multi Services. American Clinical Solutions The RansomHub threat group has recently announced on its data leak site that one of its affiliates has breached the network of American Clinical Solutions (ACS), a Boca Raton, FL-based provider of urine and oral fluid drug confirmation testing services. According to the listing on the data leak site, RansomHub breached ACS’s systems in mid-May and stole the data of more than 500,000 individuals who had samples tested for prescription and narcotic drugs. According to Marco A. De Felice of SuspectFile, the exfiltrated data includes 35 GB of medical records. The documents examined by De Felice included the full name of the patient, their date of birth, gender, patient ID, doctor’s name, name of the clinic that requested the test, and the laboratory results, with some files also including policy numbers, Social Security numbers,...



