Majority of Ransomware Victims That Pay a Ransom Suffer a Second Attack
Paying a ransom may allow encrypted files to be recovered and threat actors usually remove stolen data from data leak sites, but victims that pay are often attacked a second time. These may be attacks by the same threat actor or a different ransomware group. These double attacks are incredibly common. According to a recent study by the cybersecurity firm Cybereason, 56% of organizations surveyed have suffered more than one ransomware attack, and 78% of organizations that paid a ransom suffered a second ransomware attack. The second time around, 63% were asked to pay even more. Out of the 78% of organizations that suffered a second attack, 36% said the attack was conducted by the same threat actor and 42% were conducted by a different attacker. The survey confirmed the perils of paying a ransom. Only 47% of organizations that chose to pay the ransom were able to recover their files, with the remainder saying they were either unable to recover their data or that their data was corrupted. Many victims of ransomware attacks choose to pay a ransom to prevent the publication of the...
ConnectWise ScreenConnect Vulnerabilities Under Active Exploitation
Recently disclosed vulnerabilities in the remote desktop application ConnectWise ScreenConnect are being exploited to deliver a variety of different malicious payloads into business environments. The vulnerabilities were first disclosed by ConnectWise on February 13, 2024, and attacks exploiting the vulnerabilities started a day after the patches were released. One of the vulnerabilities, CVE-2024-1709, is an authentication bypass flaw with a maximum CVSS severity score of 10. The other, CVE-2024-1708, is a high-severity path traversal vulnerability with a CVSS severity score of 8.4. Due to the severity of the flaws and the high risk of exploitation, ConnectWise urged admins to update their on-premise servers to the fixed version immediately. Proof-of-concept (PoC) exploits were published soon after the disclosure and within 24 hours of the emergency patches being released, hackers started exploiting the flaws. According to Palo Alto Networks, there are around 18,000 IP addresses hosting ScreenConnect, although as of February 20, 2023, the ShadowServer Foundation reports that the...
The HHS OIG Safe Harbor Regulations
The HHS OIG Safe Harbor Regulations define the circumstances in which the offer, solicitation, payment, or receipt of remuneration in exchange for items or services billable to a Federal healthcare program is not regarded as a violation of the Anti-Kickback Statute. It is important for healthcare providers to be aware of these regulations in order to avoid inadvertent violations of anti-fraud laws. In 1972, Congress added an Anti-Kickback Statute to the Social Security Act §1128B which penalizes individuals found to have intentionally offered, solicited, or received anything of value in return for referrals for goods or services billable to a Federal Healthcare program. At the time, the broad nature of the Statute raised concerns that healthcare providers participating in beneficial commercial arrangements were technically covered by the statute and at risk of criminal prosecution. It was not until the passage of the Medicare and Medicaid Patient and Program Protection Act of 1987 that the law was changed to allow the HHS Office of Inspector General (OIG) to promulgate regulations...
OCR Reports to Congress on HIPAA Compliance and Data Breaches in 2022
The Department of Health and Human Services (HHS) Office for Civil Rights has submitted its annual reports to Congress on HIPAA Privacy, Security, and Breach Notification Rule compliance and breaches of unsecured protected health information (PHI) for calendar year 2022. HIPAA Compliance in 2022 OCR explains in the report that large data breaches have increased by 107% from 2018 to 2022, complaints about potential HIPAA violations have increased by 17% over the same period, and OCR is now required to assess whether an entity has implemented recognized security practices when determining penalties. As a result, OCR’s workload has significantly increased yet OCR has not received any increase in appropriations. OCR also reassessed the language of the HITECH Act in 2019 and reduced the penalty amounts in three of the four penalty tiers, resulting in smaller penalties. The increase in workload and lowering of the penalty amounts has placed a severe strain on OCR’s limited staff and resources and the lack of funding is hampering its ability to investigate complaints and data breaches at...
Ransomware Attack on Maryland Psychotherapy Provider Results in HIPAA Penalty
The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has settled alleged violations of the Health Insurance Portability and Accountability Act (HIPAA) with a Maryland behavioral healthcare provider for $40,000. Green Ridge Behavioral Health, LLC (GRBH) is a Gaithersburg, MD-based provider of psychiatric evaluations, medication management, and psychotherapy. In February 2019, GRBH filed a report with OCR about a breach of the protected health information of 14,000 patients. A malicious actor had accessed its systems and used ransomware to encrypt files. The investigation confirmed that the threat actor stole files containing sensitive patient information. In December 2019, OCR initiated an investigation to establish whether GRBH had complied with the HIPAA Rules. GRBH was unable to provide OCR with evidence to prove that an accurate risk analysis had been conducted to identify risks and vulnerabilities to electronic protected health information (ePHI), as required by 45 C.F.R. § 164.308(a)(l)(ii)(A), and sufficient security measures had not been...



