January 2024 Healthcare Data Breach Report
In January, 61 data breaches of 500 or more records were reported to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR), which is a 22% month-over-month reduction in reported data breaches, with data breaches falling to two below the monthly average of 63 data breaches a month. While the reduction in data breaches is good news, January is typically a relatively quiet month for healthcare data breaches, and January’s figures are 45% higher than January 2023. For the second consecutive month, there was a fall in the number of breached records with 8,800,875 healthcare records breached in January. As with the number of reported breaches, the reduction is good news but the number of breached records is much higher than in previous years. Further, in January 2024, 4 cyberattacks were reported to OCR where the total number of records involved has yet to be determined. To meet the reporting requirements of the HIPAA Breach Notification Rule – which requires data breaches to be reported within 60 days of discovery – those four data breaches were reported...
What are the HHS OIG Anti-Kickback Regulations?
The HHS OIG anti-kickback regulations prohibit the remuneration of individuals or organizations in Federal healthcare programs when the purpose of the remuneration is to induce referrals – or is in return for referrals – for items or services reimbursable by a Federal healthcare program. Individuals and organizations that violate the regulations can be fined, imprisoned, and/or excluded from all federal healthcare programs. The HHS OIG anti-kickback regulations were introduced in 1972 as a safeguard against fraud and abuse in federal healthcare programs such as Medicare and Medicaid. Originally only relating to financial transactions, the HHS OIG anti-kickback regulations have been subsequently extended to include any form of monetary or “in-kind” remuneration offered, solicited, paid, or received in exchange for items or services billable to a federal healthcare program. According to its November 2023 interpretation of remuneration, HHS OIG states “remuneration includes anything of value, whether in cash, in kind, or other form. […] Remuneration may take the form of cash,...
HSCC Publishes Privacy and Security Coordination Guide
The Healthcare and Public Health Sector Coordinating Council (HSCC) Cybersecurity Working Group, a public-private industry council of more than 400 healthcare providers, pharmaceutical and medtech companies, payers, health IT entities, and government agencies, has released a new guide for healthcare organizations to help coordinate privacy and security functions to improve efficiencies, effectiveness, and overall compliance. The HSCC said it has found significant evidence that neither regulation nor enterprise and risk management programs are approaching privacy and security with coherent and coordinated policy and practice. Privacy roles are concerned with supporting compliance with laws, regulations, standards, and practices, monitoring internal policies and procedures, identifying gaps, and establishing new policies concerning the handling of electronic and physical healthcare data. Security roles are concerned with identifying vulnerabilities and risks and implementing technical, physical, and administrative safeguards to ensure the confidentiality, integrity, and availability...
International Law Enforcement Operation Takes Down LockBit RaaS Infrastructure
The prolific LockBit ransomware-as-a-service (RaaS) group has been severely disrupted by a global law enforcement operation that has seen much of the group’s infrastructure seized, including servers, its affiliate portal, Tor sites, Stealbit data exfiltration tool, public-facing data leak site, and more than 200 cryptocurrency wallets. Two individuals who conducted attacks using LockBit ransomware have been arrested in Poland and Ukraine, and they will be extradited to the United States to face trial. The French and U.S. judicial authorities have also issued three international arrest warrants and five indictments. More than 1,000 decryption keys were obtained and a free decryptor for LockBit 3.0 has been created and made available on the No More Ransom portal. The seizure of the cryptocurrency wallets means it might be possible for victims to recover some of the ransoms they paid. LockBit was branded the world’s most harmful cybercrime group by the UK’s National Crime Agency (NCA). The RaaS group has been active for the past four years and has targeted thousands of organizations...
Boss of Gang Behind Attack on University of Vermont Medical Center Facing 40 Years in Jail
A Ukrainian man accused of leading racketeering groups who conspired to infect thousands of business computers with malware has pleaded guilty in federal court in Nebraska to one count of conspiracy to commit wire fraud and one count of conspiracy to break U.S. anti-racketeering laws. One of the victims, the University of Vermont Medical Center, was infected with ransomware resulting in IT systems being taken offline for more than two weeks. The attack prevented the medical center from providing critical patient services for more than two weeks. The Department of Justice said the attack on the medical center created a risk of death or serious bodily injury for patients and cost the medical center more than $30 million. Vyacheslav Igorevich Penchukov, 37, aka Vyacheslav Igoravich Andreev and known online as Tank and Father, was accused of leading two cybercriminal groups, JabberZeus and IcedID, between 2009 and 2021. JabberZeus distributed the Zeus banking trojan and IcedID distributed the IcedID banking trojan. Both of these popular malware variants were used to steal usernames,...



