Healthcare Data Breach Risk Doubles in 2-Year Window Around M&As
The risk of a data breach at hospitals doubles in the year before and after mergers and acquisitions (M&As), according to a recent study by University of Texas at Dallas PhD candidate, Nan Clement. Clement analyzed data breach data from the HHS’ Office for Civil Rights (OCR) from 2010 to 2022 and compared the reported data breaches to M&A records over the same period and found that the probability of a data breach was 3% for hospitals that merged over the analyzed period, but the risk doubled to 6% for merger targets, buyers and sellers over a two year period – one year before and one year after the deal was closed. Clement also found that incidents involving hacking and insider misconduct increased when a hospital merger or acquisition was announced and that Google Trends data showed an increase in searches for the target hospital’s name following the announcement, and a connection was found with hacking activity. Hacking and ransomware attacks at such a sensitive time were found to occur more frequently during the two-year window around M&As. At such a sensitive time,...
Tampa General Hospital Sued Over 1.3 Million Record Data Breach
Tampa General Hospital (TGH) is being sued over a data breach in which hackers gained access to the sensitive data of up to 1.3 million patients. The data breach, one of the largest healthcare data breaches to be experienced in Florida, prompted Senator Rick Scott (R-FL) to write to the FBI and request the investigation of the incident be prioritized to bring the perpetrators to justice. TGH said the breach investigation confirmed that hackers had access to its network between May 12, and May 30, 2023, and exfiltrated files containing patient information. Those files included names, contact information, dates of birth, Social Security numbers, and health insurance information. The security breach was detected on May 31, 2023. The lawsuit was filed by the law firm Morgan & Morgan and alleges TGH failed to implement appropriate security measures to safeguard the confidentiality, integrity, and availability of patients’ protected health information, and as a result of TGH’s “cavalier attitude toward cybersecurity and patient privacy,” hackers were able to steal highly sensitive...
LockBit Ransomware Group Threatens to Publish Stolen Cancer Patient Data
The LockBit ransomware group has added Varian Medical Systems to its data leak site and has threatened to publish the data of cancer patients if the ransom is not paid. Varian Medical Systems is a Palo Alto, CA-based provider of radiation oncology treatments and software for oncology departments and a subsidiary of Siemens Healthineers. Varian Medical Systems has not yet confirmed the data breach, and the LockBit group has not yet disclosed how much data was stolen in the attack but said Varian has been given until August 17, 2023, to enter into negotiations otherwise all stolen databases and patient data will be released on its dark web data leak site. Karakurt Threat Group Says Data Stolen from McAlester Regional Health Center The KaraKurt ransomware group has recently added McAlester Regional Health Center to its data leak site and claims to have stolen more than 1,175 GB of data from the Oklahoma hospital, including 5 GB of SQL data on medical staff and medical reports containing sensitive patient information, including DNA data. According to the listing, the stolen employee...
HIPAA Compliant RDP Server
A HIPAA compliant RDP server allows healthcare professionals to work remotely and still have access to the same information they could view and update if they were working at a practice or hospital. Remote desktop access allows healthcare professionals to work efficiently from home and while travelling. Remote access to data is often required by development teams or business associates of HIPAA-covered entities. While remote desktop access offers many benefits, it also introduces risks, which must be identified and managed. Healthcare organizations may believe they have a HIPAA compliant RDP server, but a misconfiguration could easily open the door to hackers and put sensitive data at risk. Prior to any remote desktop access being provided for use with ePHI, a covered entity must conduct a risk assessment to identify any vulnerabilities that could be exploited to gain access to ePHI. Those risks must then be managed and reduced to an acceptable level. All Communications Must be Encrypted Since there is a possibility of communications being intercepted, HIPAA requires the use of...
HC3 Sounds Alarm About Rhysida Ransomware Group
The HHS’ Health Sector Cybersecurity Coordination Center (HC3) has issued a security alert about a new ransomware group – Rhysida – which is conducting high-impact attacks across multiple industry sectors. Attacks have been conducted in North and South America, Western Europe, and Australia, with the United States, Italy, Spain, and the United Kingdom having suffered the most attacks. The primary targets appear to be in the education, government, manufacturing, and technology sectors, although the group has conducted some attacks on the healthcare and public health (HPH) sector. Rhysida is a ransomware-as-a-service operation that recruits affiliates to conduct attacks using its ransomware variant in exchange for a percentage of any ransom payments they generate. The group was first identified in May 2023, and its ransomware variant appears to still be in the early stages of development as it lacks the advanced features seen in the ransomware variants used by more established threat groups. Rhysida ransomware is deployed after initial access to victims’ networks has been...



