Microsoft Patches Zero-Day Vulnerability Exploited to Deliver QakBot and Other Malware
Microsoft has released a patch to fix a zero-day Windows vulnerability – CVE-2024-30051 – exploited in attacks delivering QakBot malware. Healthcare organizations should prioritize this patch as QakBot has been used in many attacks on the healthcare sector. QakBot, aka QBot, was first identified in 2008 and was initially a banking trojan that was used to steal banking information and credentials. The malware has evolved over the years into a malware delivery service, with the operators acting as an initial access broker, selling access to infected companies to other threat actors, including ransomware groups. A law enforcement operation last summer successfully dismantled the QakBot botnet and took down its infrastructure; however, it was rebuilt and remains in operation. Several threat groups are known to work with the QakBot operators, including the Black Basta ransomware group. A joint cybersecurity alert was recently issued by CISA and partners warning critical infrastructure entities about Black Basta ransomware attacks. Black Basta has been linked with the recent...
Hypertension-Nephrology Associates Warn Patients of Data Theft Incident
Hypertension-Nephrology Associates in Michigan has recently announced that it was the target of a cyberattack in January 2024. An unknown threat actor dropped a ransom note on its computer system demanding payment to prevent the publication of patient data that was stolen in the attack. The healthcare industry continues to be targeted by ransomware gangs that steal data and encrypt files, demanding payment for the keys to decrypt files and to prevent the release of stolen data; however, many threat actors skip file encryption and conduct extortion-only attacks, as was the case in the attack on Hypertension-Nephrology Associates. After discovering the ransom note, an investigation was launched to verify the threat actor’s claims. Third-party cybersecurity experts were engaged to assist with the investigation and confirmed that the threat actor had access to its systems between January 20, 2024, and February 6, 2024. During that time, files containing patients’ protected health information were exfiltrated from its systems. A comprehensive review was conducted of the...
Is Proton Mail HIPAA Compliant?
Proton Mail is HIPAA compliant and can be used by covered entities and business associates to send encrypted emails containing PHI to other Proton users, share files via Proton Drive, and take advantage of the sharable Proton Calendar. However, there can be compliance issues when sending emails to non-Proton Mail users. Proton Mail offers mail, storage, and VPN services, and claims to be “the world’s largest end-to-end encrypted email service”. The “end-to-end” part of the claim does a lot of heavy lifting because emails are only fully encrypted between Proton Mail users. If you send an encrypted email to a (say) Outlook user, you have to set a password for the recipient to open the email. Nonetheless, Proton Mail is an attractive option for businesses operating in regulated industries because of its zero-knowledge model and advanced privacy protections. It is also fairly easy to configure (compared to – for example – Microsoft365) and it is possible to “bridge” accounts between the Proton Mail client and third-party email service providers. Do Covered Entities Need...
Singing River Health System: 895,000 Individuals Affected by August 2023 Ransomware Attack
Singing River Health System in Mississippi suffered a Rhysida ransomware attack in August 2023, which was initially reported to the HHS’ Office for Civil Rights as affecting 501 individuals, as the number of affected individuals had yet to be determined. In December 2023, the total was revised to 252,890 individuals; however, the data breach has turned out to be much worse than previously thought. In a recent notification to the Maine Attorney General, Singing River Health System provided a revised victim count of 895,204 individuals. Click for further information. “SMEs like Singing River Health System are the most vulnerable to cyber-attacks. Unlike large enterprises with massive cybersecurity budgets and dedicated cybersecurity teams, SMEs are exposed to the same threats with a fraction of the resources,” Dror Liwer, co-founder of cybersecurity company Coro told The HIPAA Journal. “In a recent study we conducted with 500 SME cybersecurity professionals, 73% said they missed or ignored critical alerts. That’s not because they don’t want to do their jobs, but because...
OSHA Cites Circles of Care for Failing to Protect Employees from Patient Violence
The Department of Labor’s Occupational Safety and Health Administration (OSHA) has cited Circles of Care for failing to protect its employees from patient violence. This is the third time in the past 5 years that Circles of Care has been investigated by OSHA after workers were seriously injured or killed due to violent attacks by patients. Circles of Care is a Florida-based operator of multiple psychiatric and rehabilitation facilities that provides mental health, alcohol, drug abuse, and related services. OSHA previously investigated Circles of Care on two occasions in 2020, once after the fatal shooting of a counselor by a former patient and another after an alleged assault at its Harbor Pines facility in Melbourne in 2020. The latest OSHA investigation was launched on November 7, 2023, to assess compliance after an employee was hospitalized following a violent attack by a patient two days previously. A patient attacked a mental health technician at a nurse’s workstation at its Sheridan West Unit in Melbourne using a mental hole punch, causing injuries to the face, neck,...



