ALPHV/BlackCat Claims Healthcare Restrictions Removed for Affiliates
In response to the law enforcement operation that resulted in the seizure of its websites, the ALPHV/BlackCat ransomware group has removed virtually all restrictions on affiliates and said discounts and extensions have stopped, and patient data will now be published on its leak site. The Department of Justice (DoJ) recently announced that the Federal Bureau of Investigation was able to gain access to the infrastructure of the ALPHV/BlackCat ransomware group, which allowed it to seize the websites used for communication, data leaks, and negotiations and obtain the decryption keys to help around 500 victims recover from attacks. The decryption tool developed by the FBI has saved around $68 million in ransom payments, according to the DoJ. According to the search warrant, the FBI engaged with a confidential human source (CHS) to sign up to become an affiliate of the group. After an interview with the operators, the CHS was provided with credentials to access the backend affiliate portal, thus giving the FBI access to the portal. The FBI was able to obtain 946 public/private key pairs...
The Cost of Non-Compliance with HIPAA
The cost of non-compliance with HIPAA can vary depending on the nature of non-compliant events, the actions of regulators, the effort required to reverse a “culture of non-compliance”, reputational damage, legal fees, and class action lawsuits. Due to the potential cost of non-compliance with HIPAA, it can be beneficial for covered entities and business associates to invest in HIPAA compliance. Investigations of cyberattacks often trace the cause of the incident back to non-compliance with HIPAA, such as the failure to implement appropriate security measures to comply with the HIPAA Security Rule or the failure to conduct a comprehensive, organization-wide risk analysis to identify risks and vulnerabilities to electronic protected health information (ePHI). These compliance failures can prove incredibly costly. According to IBM’s 2023 Cost of a Data Breach Report, healthcare data breaches cost more than any other sector, and in 2023, have increased to an average of $10.93 million per incident. Cyberattacks often cause considerable disruption to business operations, which is...
Feds Share Threat Intelligence on Play Ransomware Operation
A joint cybersecurity advisory has been issued by the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) about Play ransomware, aka Playcrypt. Play ransomware is believed to be a closed group rather than a ransomware-as-a-service operation and has been active since June 2022. The Play ransomware group engages in double extortion tactics, exfiltrating sensitive data before encrypting files. The stolen data is used as leverage to get victims to pay the ransom. Victims are required to contact the group via email to find out how much they must pay to prevent the release of stolen data on the group’s data leak site and to obtain the keys to decrypt data. From June 2022 until October 2023, the Play ransomware group is known to have conducted at least 300 attacks on organizations around the world, including critical infrastructure in the United States. An analysis of the operation by Trend Micro in July 2023 found that 13.9% of victims of Play...
How Often Should Passwords be Changed in the EHR System?
The frequency with which passwords should be changed in the EHR system depends on factors such as the current NIST recommendations when weak or reused passwords have been identified, when EHR passwords have been compromised or shared without authorization, and when a member of staff leaves the workforce. In 2010, the Office of the National Coordinator for Health Information Technology (ONC) – a branch of the Department of Health and Human Services (HHS) – published “10 Best Practices for the Small Healthcare Environment” (PDF). The publication – the ONC claimed – was “not intended to provide guidance on how to comply with HIPAA”, but rather “a first step to the effective setup of new EHR systems in a way that minimizes the risk to health information maintained in EHRs”. However, the timing of the publication was not an accident. A year earlier, Congress had passed the HITECH Act and Meaningful Use program which incentivized healthcare providers to adopt technology for creating, maintaining, and providing access to Protected Health Information. The HITECH Act also required business...
ALPHV/BlackCat Ransomware Operation Disrupted by FBI
The ALPHV/BlackCat ransomware group has been disrupted by the Federal Bureau of Investigation, in partnership with Europol and law enforcement agencies in Denmark, Germany, Australia, Spain, Austria, the Netherlands, and the United Kingdom, in coordination with the United States Attorney’s Office for the Southern District of Florida and the Computer Crime and Intellectual Property Section of the Department of Justice. ALPHV/BlackCat ransomware group first emerged in November 2021 and became one of the most prolific ransomware groups of recent years, second only to the LockBit ransomware group. ALPHV/BlackCat is a ransomware-as-a-service operation that uses affiliates to conduct attacks for a cut of any ransoms they generate. In its 2 years of operation, the group has claimed more than 1,000 victims worldwide and has collected hundreds of millions of dollars in ransom payments. In early December 2023, the group’s Tor negotiation and data leak sites were taken offline which led to several security researchers suggesting that the group may have been the subject of a law...



