Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Major Cyberattacks On Healthcare Grew 63% In 2016
Newest First  |  Oldest First  |  Threaded View
haemorrhoiden-selbst-behandeln
50%
50%
haemorrhoiden-selbst-behandeln,
User Rank: Apprentice
1/16/2017 | 6:42:03 AM
security issue
Healtcare IT departments often lags on security. Last year randsomware attacks showed the weakness and IT-admins got some homework to do. Hopefully it will not happen again in this dimension.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2016 | 11:56:22 AM
Attacking healthcare
"Article mentioned "people wouldn't want to attack a healthcare facility because they didn't believe anyone would want to do harm to the patients"

We know that is not the case, patients are people, and they want to attack anything they can including people.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2016 | 11:55:51 AM
Re: Hacking Healthcare
"your EHR usage and allocate that to beefing up both your software/network and personnel/building security practices."

Another good point. Sometimes it is not the system everything else around it. Gmail is quite secure with two factor authentication and yet we see they are able to hack Gmail account.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2016 | 11:52:00 AM
hospitals unaware of breaches
Hospitals are unaware of breaches and as many other organizations, remember Yahoo, they told us they were hacked a few years earlier. Damage may be worse if we do not know early enough
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2016 | 11:51:31 AM
Re: Hacking Healthcare
"A good social engineer only needs to get a malware USB plugged into one or two devices to have access to the hospital network. "

Good point. As we know we will all take the USB drive we found in the parking lot and plug in the computers to see what is inside. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/28/2016 | 11:49:07 AM
Ransomware and healthcare data
As article stated hackers target healthcare because organizations will usually pay ransom for patient data simply because the alternative is more costly. They will pay and may not even reveal that there was ransomware attack.
Techgmyth
50%
50%
Techgmyth,
User Rank: Strategist
12/23/2016 | 4:51:16 PM
Microsoft Professional Support
This is really a nice post. Thanks for sharing this to us !
RetiredUser
100%
0%
RetiredUser,
User Rank: Ninja
12/22/2016 | 7:09:40 PM
Hacking Healthcare
There are a couple different mindsets that need to change here.  The first is that idea of some of the smaller healthcare organizations (mostly individual practices) that hackers aren't interested in hurting patients.  Technically most aren't, but it isn't anything to do with their well-being anyway, but more to do with their personal information.  Once healthcare practices understand that data is used to create new identities, obtain credit cards and used for insurance fraud, they'll realize that by setting up more secure practices they are directly impacting their patients in a positive way. 

The other mindset that needs to change is how larger organizations (the Cedars and Kaisers of the world) deal with drug and device vendors.  These people come and go, sometimes getting into patient care areas, with access to medical devices on the floor.  A good social engineer only needs to get a malware USB plugged into one or two devices to have access to the hospital network.  Even easier, convincing a young intern to plug in a USB and "print something" for them will do the trick, too. 

Some of the larger hospitals are now implementing large Electronic Health Records that require various levels of security even to run properly so that's a plus on one hand, but on the other hand the distraction of large implementations can cover up the low-tech hacks that never get old, and never go away.  Let's take some of that money you're now earning from the governement, folks, for your EHR usage and allocate that to beefing up both your software/network and personnel/building security practices. 


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness
Robert Lemos, Contributing Writer,  7/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4560
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2019-4589
PUBLISHED: 2020-08-03
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to privlege escalation where the "My schedules and subscriptions" page is visible and accessible to a less privileged user. IBM X-Force ID: 167449.
CVE-2020-4328
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 177839.
CVE-2020-4377
PUBLISHED: 2020-08-03
IBM Cognos Anaytics 11.0 and 11.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 179156.
CVE-2020-4534
PUBLISHED: 2020-08-03
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local authenticated attacker to gain elevated privileges on the system, caused by improper handling of UNC paths. By scheduling a task with a specially-crafted UNC path, an attacker could exploit this vulnerability to execute arbi...