BD Discloses Vulnerabilities in FACSChorus Software
Becton, Dickinson and Company (BD) has recently disclosed seven vulnerabilities in its FACSChorus software. The vulnerabilities are low- to medium-severity with CVSS scores ranging from 2.4 to 5.4. Successful exploitation of the vulnerabilities could allow an attacker to modify system configurations, access sensitive data, or access system components; however, in order to exploit the vulnerabilities an attacker would need to have physical access. The vulnerabilities, in order of severity, are: CVE-2023-29060 – Missing protection mechanism for alternate hardware interface – CVSS 5.4 Vulnerability is present in BD FACSChorus v5.0, v5.1, v3.0, and v3.1 – The workstation operating system does not restrict what devices can interact with its USB ports. The vulnerability could be exploited with physical access to gain access to system information and potentially exfiltrate data. CVE-2023-29061 – Missing authentication for critical function – CVSS 5.2 Vulnerability is present in BD FACSChorus v5.0, v5.1, v3.0, and v3.1. The workstation has no BIOS password....
Iowa Community HomeCare Sued Over March 2023 Ransomware Attack
UI Community HomeCare and UI Community Medical Services, which are subsidiaries of University of Iowa (UI) Health Care, are being sued by a former employee and a patient over a March 2023 ransomware attack and data breach. The data breach was disclosed by IU Health Care in May 2023, but occurred in March 2023 and affected its subsidiaries. Iowa Community HomeCare discovered the security breach on March 23, 2023, when files on its network were encrypted. The investigation confirmed there had been unauthorized access to files containing sensitive data on March 23, 2023. Personal and protected health information was exposed, and potentially stolen, such as names, birthdates, addresses, phone numbers, medical record numbers, referring physician names, dates of service, health insurance information, billing and claims information, medical history information, and diagnosis/treatment information. At the time of issuing notifications, Iowa Community HomeCare had identified no attempted or actual misuse of the stolen data. The data breach was reported to the HHS’ Office for Civil Rights as...
What is an OSHA Safety Walkthrough List?
An OSHA Safety Walkthrough List is a list of potential hazards individuals with a responsibility for safety should be alert to when conducting a walk-around safety inspection of a workplace. For example, a general OSHA Safety Walkthrough List could consist of hazards such as: Slip, trip, and fall hazards Blocked through routes and exits Frayed or exposed electrical wires Missing machine guards Poorly maintained equipment Substandard housekeeping Damage to property or equipment The Occupational Safety and Health Administration has produced two OSHA Safety Walkthrough Lists – one for managers and business owners, and the other for safety officers. Both advocate a similar process for walk-around safety inspections inasmuch as there should be pre-inspection activities, the walk-around, and post-inspection activities. Pre-Inspection Activities OSHA recommends that safety inspectors (regardless of role) prepare for an inspection by familiarizing themselves with hazards that have been previously identified, accident investigation reports, and recent near-miss incidents. These hazards,...
Florida HIPAA Laws
Florida HIPAA laws are the laws that apply in Florida to Covered Entities and Business Associates that preempt, or are additional to, HIPAA. It is important to be aware when Florida HIPAA laws apply in order to avoid fines and possible jail terms for non-compliance. Section 45 CFR §160.103 of the HIPAA Administrative Simplification Regulations states “a standard, requirement, or implementation specification adopted under this subchapter (the Administrative Simplification Regulations) that is contrary to a provision of State law preempts the provision of State law”. The standard then lists a number of exceptions to the rule, one of which is when: “The provision of State law relates to the privacy of individually identifiable health information and is more stringent than a standard, requirement, or implementation specification adopted under subpart E of part 164 of this subchapter (the HIPAA Privacy Rule).” This means that, while HIPAA sets a federal floor for the privacy of individually identifiable health information (also known as Protected Health Information or PHI), if a State...
Ransomware Affiliate Group Dismantled in International Law Enforcement Operation
An international law enforcement operation has led to the arrest of multiple core members of an organized group of ransomware affiliates in Ukraine. The members of the group were behind attacks involving ransomware variants such as LockerGoga, MegaCortex, HIVE, and Dharma, which were used in more than 250 ransomware attacks in large organizations in 71 countries. The attacks conducted by the group resulted in losses of several hundred million dollars. The group exploited unpatched vulnerabilities, conducted brute force and SQL injection attacks, and also used stolen credentials and phishing for initial access. Once access was gained to networks, the group used tools such as TrickBot malware, along with post-exploitation frameworks such as Cobalt Strike and PowerShell Empire to move laterally and remain inside networks undetected. In some cases, the dwell time was several months before ransomware was deployed to encrypt files. Members of the group had different responsibilities, with some tasked with gaining access to networks while others were responsible for negotiating with...



