Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

12/13/2019
09:00 AM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

Lessons Learned from 7 Big Breaches in 2019

Capital One, Macy's, FEMA, and others: key takeaways from the year's most notable breaches.
4 of 8

Third-Party Security Failures Can Hurt
Organization: The American Medical Collection Agency (AMCA)
When: Breach was disclosed in May 2019
Breach Details: In June, medical debt collection company AMCA notified two of its largest customers - Quest Diagnostics and LabCorp - about an unauthorized user accessing an AMCA system containing sensitive data on millions of their patients. Data, including Social Security numbers, bank account and credit information, and medical information belonging to some 11.9 million Quest patients and 7.7 million LabCorp patients were compromised in the breach. Since then several other healthcare entities that used AMCA for debt-collection purposes have disclosed being impacted in the same breach. In total, the incident impacted 21 healthcare organizations and at least 24.4 million individuals. AMCA filed for bankruptcy protection after some its customers sued the company. 
Lessons Learned: For Quest, LabCorp, and the other victims, the AMCA incident was a classic example of third-party risk. It was a reminder of the need for organizations to ensure that business partners and other third parties with whom they interact, follow security best practices.
'The challenge for enterprises is managing information about the security posture of their third parties,' said Matan Or-El, CEO of Panorays. 'Issues include suppliers who do not fix security issues in time, partners who receive data and do not protect it as they should, and partners and third parties who receive access to an enterprise's network but fail to protect that access in an appropriate way.' 
Image source: AMCA

Third-Party Security Failures Can Hurt

Organization: The American Medical Collection Agency (AMCA)

When: Breach was disclosed in May 2019

Breach Details: In June, medical debt collection company AMCA notified two of its largest customers - Quest Diagnostics and LabCorp - about an unauthorized user accessing an AMCA system containing sensitive data on millions of their patients. Data, including Social Security numbers, bank account and credit information, and medical information belonging to some 11.9 million Quest patients and 7.7 million LabCorp patients were compromised in the breach. Since then several other healthcare entities that used AMCA for debt-collection purposes have disclosed being impacted in the same breach. In total, the incident impacted 21 healthcare organizations and at least 24.4 million individuals. AMCA filed for bankruptcy protection after some its customers sued the company.

Lessons Learned: For Quest, LabCorp, and the other victims, the AMCA incident was a classic example of third-party risk. It was a reminder of the need for organizations to ensure that business partners and other third parties with whom they interact, follow security best practices.

"The challenge for enterprises is managing information about the security posture of their third parties," said Matan Or-El, CEO of Panorays. "Issues include suppliers who do not fix security issues in time, partners who receive data and do not protect it as they should, and partners and third parties who receive access to an enterprise's network but fail to protect that access in an appropriate way."

Image source: AMCA

4 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
amdenver
100%
0%
amdenver,
User Rank: Apprentice
1/26/2020 | 8:14:03 PM
Great Concise Article
Author has done an excellent job of capturing the main avenues of getting breached with very good case selection. Great succinct read. Thanks for the time and effort that you put into this worth. Best Regards.
Matt Middleton-Leal Netwrix
50%
50%
Matt Middleton-Leal Netwrix,
User Rank: Apprentice
12/20/2019 | 9:37:05 AM
Cloud data security is a huge concern
Great article. We can all learn from the mistakes made in these big breaches. In particular, I agree that there is continued concern about the risks of cloud storage. In a recent survey, 48% of organizations that store sensitive data in the cloud would consider moving that data back on premises. To best secure data in the cloud, it's important to know just how much data you have, who has access to it and which data is most critical in your IT environment, so you can prioritize your security efforts.
albertscales
0%
100%
albertscales,
User Rank: Apprentice
12/16/2019 | 9:05:30 AM
informative
Nice article
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-6095
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
CVE-2020-10817
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
CVE-2020-10952
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.