Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

7/20/2018
09:35 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

LabCorp Investigating Possible Attack & Data Breach

LabCorp, one of the largest medical and diagnostic companies in the world, is investigating a possible attack against its network and a potential data breach, according to paperwork filed with the SEC.

LabCorp, a medical and diagnostic firm that serves about 115 million patients every year, is investigating a possible cyber attack against its network and potential data breach, according to paperwork filed with the US Securities and Exchange Commission.

The incident, which happened sometime over the weekend of July 14, was first noticed by the company's IT staff, which then took the infected systems offline. While the investigation is ongoing, it doesn't initially appear that any data was transferred out, although customers could not access their records and tests results were delayed.

LabCorp first reported the incident in a filing with the SEC on July 16.

"Work has been ongoing to restore full system functionality as quickly as possible, testing operations have substantially resumed today, and we anticipate that additional systems and functions will be restored through the next several days. Some customers of LabCorp Diagnostics may experience brief delays in receiving results as we complete that process," according to the company's 8-K form.

(Source: Flickr)
(Source: Flickr)

The incident was only detected on the network that served LabCorp Diagnostics systems, and not the ones used by Covance Drug Development, the company's subsidiary.

An article in the Wall Street Journal indicates that some form of ransomware hit the Burlington, N.C. company although it's not clear which variant, and the SEC report did not mention any particular malware.

Earlier this year, several reports found that the SamSam ransomware attack had resurfaced in hospitals and other healthcare organizations, usually locking up systems and demanding payment in Bitcoin. (See SamSam Ransomware Continues Making Hospitals Sick.)

In 2017, WannaCry found its way into the UK's National Health Service. (See WannaCry: How the Notorious Worm Changed Ransomware.)


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

This latest incident shows what a rich seam hospitals and healthcare organization remain for attackers looking to steal personal data and other information, said Hitesh Sheth, the president and CEO of Vectra, which uses artificial intelligence and machine learning to protect and diagnosis enterprise networks.

"In our view, they [ransomware attacks and data breaches] are on the upswing, and we're hearing that from our customers as well," Sheth said in an interview with Security Now. "Our view as to why this is happening is at two levels. One is that despite all this noise around cybersecurity, there are many customers who do not exercise basic security hygiene in their infrastructure, and they make it so easy for someone to come in. And as easy as they make it, they still have this mindset that their defenses are sufficient to stop these attacks from coming in versus recognizing that things are going to get in and having the mindset to contain the attack. These twin mindsets are why you see these same stories happen time and time again."

Sheth's view is backed up by other reports that indicate the number of ransomware attacks increased between 2016 and 2017, with healthcare taking the brunt of these incidents, whether the end goal is stealing data or collecting a payoff. (See Ransomware Attacks Against Healthcare Increased in 2017.)

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26814
PUBLISHED: 2021-03-06
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service sc...
CVE-2021-27581
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-28042
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
CVE-2021-28041
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2021-3377
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.