Healthcare Sector Warned About Cyberattacks by Iranian State-Sponsored Threat Actors
The federal government has issued a warning to the healthcare sector about the threat of cyberattacks by Iranian threat actors. Iranian state-sponsored actors lack the sophisticated technical capabilities of Russian and Chinese threat actors, but still pose a significant threat to the sector. The threat actors mostly use social engineering in their attacks to gain access to healthcare networks and are known to conduct sophisticated spear-phishing campaigns. Spear phishing campaigns often involve healthcare-related lures with the threat actors using fake personas and social media platforms to interact with their targets, often impersonating doctors, researchers, and think tanks to trick targets into disclosing their credentials or downloading and installing malware. The Tortoiseshell Facebook campaign saw threat actors claim to be recruiters in hospitality, medicine, journalism, NGOs, and aviation. Fake accounts were used to trick targets into opening malware-infected files or to lure them onto phishing URLs to steal credentials. The threat actors often use LinkedIn for contacting...
Feds Issue Guidance on Responding to and Reducing the Impact of DDoS Attacks
The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have recently issued guidance for federal and private agencies on the prevention and mitigation of Distributed Denial of Service (DDoS) attacks. These attacks are conducted to overload applications and websites with traffic, thus rendering them inaccessible and preventing legitimate users from accessing that service. A Denial of Service (DoS) attack causes a network resource overload that consumes all hardware, software, and bandwidth, protocol resource overloads consume the available session or connection resources, and application resource overloads use all compute or storage resources. DDoS attacks are DoS attacks where the traffic comes from multiple devices that are acting together. They can involve huge amounts of traffic and have the potential to cause hardware damage. Botnets – slave armies of malware-infected devices – are commonly used to perform DDoS attacks at scale, and they have become far more common...
U.S. Vision Subsidiary and Florida Addiction Treatment Center Announce 2021 Data Breaches
USV Optical, a subsidiary of U.S. Vision, has recently confirmed that the information of patients at several entities within its network has been exposed. Suspicious activity was detected within its network on May 12, 2021, with the forensic investigation confirming unauthorized individuals had access to its network for a month between April 20, 2021, and May 17, 2021. During that time, the attackers may have viewed or acquired sensitive patient data. The breach was reported to U.S. Vision shortly after it was detected; however, at the time it was unclear which entities and patients had been affected. Nationwide Optical Group acquired or became affiliated with several U.S. Vision entities in September 2019, including Nationwide Optometry and SightCare. USV Optical started to provide administrative services to those entities around that time. Nationwide Optical Group was informed about the breach and requested U.S. Vision investigate the incident further to find out more information and recommended monitoring the dark web to determine if any sensitive data had been released. No...
Microsoft Business Associate Agreement
If your organization is a HIPAA Covered Entity, Business Associate, or subcontractor to either, and it creates, receives, maintains, or transmits electronic Protected Health Information (ePHI) via a covered Office 365, Dynamics 365, or Azure service, it will be necessary to enter into a Microsoft Business Associate Agreement. Back in 2016, the Department of Health and Human Services (HHS) published an FAQ about whether a Cloud Service Provider could be considered a “conduit” for ePHI and thereby not qualify as a Business Associate. In the answer to the FAQ, HHS replied that Cloud Service Providers qualify as Business Associates because they have “persistent” access to ePHI (rather than “transient” access), even if ePHI is encrypted and the Cloud Service Provider does not have access to the decryption key. Therefore, before an organization subject to HIPAA uses any cloud service (or any on-premises service that synchronizes via the cloud) to create, receive, maintain, or transmit ePHI, it is necessary to conduct due diligence on the vendor. If the vendor has appropriate measures in...
St. Luke’s Health Reports Third Party Data Breach
St. Luke’s Health has recently notified 16,906 patients that some of their protected health information has been exposed in a security incident at a vendor that provides consulting services. On November 5, 2021, the email accounts of two employees of Adelanto Healthcare Ventures (AHCV) were accessed by an unauthorized individual. An investigation was launched into the incident, which initially determined no patient information had been exposed; however, a subsequent review determined the information of certain St. Luke’s Health patients was present in the email accounts and could potentially have been accessed or acquired by the attackers. The exposed information included names, addresses, dates of birth, Social Security numbers, dates of service, medical record numbers, Medicaid numbers, and some limited clinical information, such as treatment and diagnosis codes. St. Luke’s Health was notified about the breach on September 1, 2022 St. Luke’s Health explained in its breach notification letters that no reports have been received that suggest there has been any misuse of patient...



