HHS Stresses Importance of Having an Effective Cybersecurity Incident Response Plan
The Health Sector Cybersecurity Coordination Center (HC3) has published a threat brief that highlights the importance of developing an effective cybersecurity incident response plan. Given the extent to which healthcare organizations are targeted by malicious actors and the number of data breaches now being reported by HIPAA-regulated entities, a successful attack and data breach is now an inevitability. It is no longer a case of if there will be a cyberattack, it is a case of when and how many. Without a tried and tested incident response plan, valuable time will be lost responding to an attack which not only results in a longer response and higher costs. Inappropriate actions taken in response to an attack could result in evidence being inadvertently destroyed and incident response planning failures may also lead to civil monetary penalties and other regulatory activities, increased reputational damage, extended disruption to patient care, and costly lawsuits. What is a Cybersecurity Incident Response Plan? A cybersecurity incident response plan is a written document that has...
SEC Launches Investigation into Progress Software’s MOVEit Hack
In May 2023, a zero-day vulnerability in Progress Software’s MOVEit Transfer file transfer solution was mass exploited by the Clop ransomware group. Progress Software MOVEit disclosed the vulnerability on May 31, and deployed a patch the same day; however, the Clop ransomware group had already exploited the vulnerability and stole files from many of its customers. The total number of affected customers has yet to be confirmed, but Emsisoft says that as of October 16, 2023, at least 2,551 organizations are known to have been affected and the data of more than 64 million individuals has been stolen. The education sector was the worst affected, accounting for around 41% of victims, followed by healthcare (19%), and finance/professional services (12%). Emsisoft estimated the total cost of the attack to be $10,637,147,400, based on average data breach costs calculated by IBM in its 2023 Cost of a Data Breach Report. In a recent filing with the U.S. Securities and Exchange Commission (SEC), Progress Software reported $2.9 million in losses due to the attack up to the end of August 2023;...
HPH Sector Warned About NoEscape Ransomware Attacks
In May 2023, a new ransomware-as-a-service (RaaS) group started conducting attacks and in the past 5 months has attacked several industry sectors, including healthcare. Many new ransomware groups develop their ransomware variants using leaked source code from other ransomware families; however, NoEscape claims to have developed its own ransomware code and associated infrastructure from scratch although the encryptors used by NoEscape are virtually identical to those used by the now-defunct Avaddon ransomware, which along with other similarities has led security researchers to believe that NoEscape is a rebrand of Avaddon ransomware, which ceased operations in June 2021. The NoEscape RaaS group recruits affiliates to conduct attacks in exchange for a percentage of any ransoms they generate and provides ransomware to encrypt files. The ransomware is capable of deleting shadow copies and system backups and can force a reboot and operate in safe mode, where security solutions can be disabled more easily. NoEscape is used to encrypt files on Windows and Linux machines, as well as VMware...
Is Google Docs HIPAA Compliant?
Google Docs is HIPAA compliant provided that, before using the service to create, receive, maintain, or transmit PHI, organizations subscribe to a Google Workspace business plan, configure the service to comply with HIPAA, and sign Google’s Business Associate Addendum. It is not possible to use a free Google Docs account to create, receive, maintain, or transmit PHI as the free service does not include the features required to support HIPAA compliance. Does Google Docs Encrypt Data? In order for Google Docs to be HIPAA compliant, stored data must be encrypted. Data must also be encrypted during uploading and downloading. We can confirm that Google uses 128-bit or stronger Advanced Encryption Standard (AES) to protect data in transit to the platform, and between and in its data centers. Is Google Considered a Conduit? The Department of Health and Human Services has made it clear in recent guidance that cloud service providers are not – in the vast majority of cases – considered conduits, so the HIPAA Conduit Exception Rule does not apply. Instead, cloud service providers are classed...
CISA Shares Vulnerabilities and Misconfigurations Exploited by Ransomware Gangs
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) maintains a Known Exploited Vulnerabilities (KEV) Catalog, which includes a list of all common vulnerabilities and exposures (CVEs) that are known to have been exploited by malicious actors. In January, CISA launched its Ransomware Vulnerability Warning Pilot (RVWP) program, under which critical infrastructure organizations are warned when Internet-accessible devices and systems are discovered on their networks that have unpatched vulnerabilities that could be exploited by ransomware actors. Organizations cannot address vulnerabilities on their networks that they are unaware of. The RVWP program aims to shine a light on security blind spots to allow organizations to take action and address the vulnerabilities before they are exploited in ransomware attacks. Under this program, CISA has already issued warnings to more than 800 organizations about unpatched vulnerabilities on their networks. Last week, CISA published two new resources to help network defenders combat ransomware campaigns. The KEV Catalog has been...



