Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

7/20/2018
09:35 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

LabCorp Investigating Possible Attack & Data Breach

LabCorp, one of the largest medical and diagnostic companies in the world, is investigating a possible attack against its network and a potential data breach, according to paperwork filed with the SEC.

LabCorp, a medical and diagnostic firm that serves about 115 million patients every year, is investigating a possible cyber attack against its network and potential data breach, according to paperwork filed with the US Securities and Exchange Commission.

The incident, which happened sometime over the weekend of July 14, was first noticed by the company's IT staff, which then took the infected systems offline. While the investigation is ongoing, it doesn't initially appear that any data was transferred out, although customers could not access their records and tests results were delayed.

LabCorp first reported the incident in a filing with the SEC on July 16.

"Work has been ongoing to restore full system functionality as quickly as possible, testing operations have substantially resumed today, and we anticipate that additional systems and functions will be restored through the next several days. Some customers of LabCorp Diagnostics may experience brief delays in receiving results as we complete that process," according to the company's 8-K form.

(Source: Flickr)
(Source: Flickr)

The incident was only detected on the network that served LabCorp Diagnostics systems, and not the ones used by Covance Drug Development, the company's subsidiary.

An article in the Wall Street Journal indicates that some form of ransomware hit the Burlington, N.C. company although it's not clear which variant, and the SEC report did not mention any particular malware.

Earlier this year, several reports found that the SamSam ransomware attack had resurfaced in hospitals and other healthcare organizations, usually locking up systems and demanding payment in Bitcoin. (See SamSam Ransomware Continues Making Hospitals Sick.)

In 2017, WannaCry found its way into the UK's National Health Service. (See WannaCry: How the Notorious Worm Changed Ransomware.)


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

This latest incident shows what a rich seam hospitals and healthcare organization remain for attackers looking to steal personal data and other information, said Hitesh Sheth, the president and CEO of Vectra, which uses artificial intelligence and machine learning to protect and diagnosis enterprise networks.

"In our view, they [ransomware attacks and data breaches] are on the upswing, and we're hearing that from our customers as well," Sheth said in an interview with Security Now. "Our view as to why this is happening is at two levels. One is that despite all this noise around cybersecurity, there are many customers who do not exercise basic security hygiene in their infrastructure, and they make it so easy for someone to come in. And as easy as they make it, they still have this mindset that their defenses are sufficient to stop these attacks from coming in versus recognizing that things are going to get in and having the mindset to contain the attack. These twin mindsets are why you see these same stories happen time and time again."

Sheth's view is backed up by other reports that indicate the number of ransomware attacks increased between 2016 and 2017, with healthcare taking the brunt of these incidents, whether the end goal is stealing data or collecting a payoff. (See Ransomware Attacks Against Healthcare Increased in 2017.)

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-38562
PUBLISHED: 2021-10-18
Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5, and 5.0 before 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm.
CVE-2021-41611
PUBLISHED: 2021-10-18
An issue was discovered in Squid 5.0.6 through 5.1.x before 5.2. When validating an origin server or peer certificate, Squid may incorrectly classify certain certificates as trusted. This problem allows a remote server to obtain security trust well improperly. This indication of trust may be passed ...
CVE-2021-42565
PUBLISHED: 2021-10-18
myfactory.FMS before 7.1-912 allows XSS via the UID parameter.
CVE-2021-42566
PUBLISHED: 2021-10-18
myfactory.FMS before 7.1-912 allows XSS via the Error parameter.
CVE-2021-36097
PUBLISHED: 2021-10-18
Agents are able to lock the ticket without the "Owner" permission. Once the ticket is locked, it could be moved to the queue where the agent has "rw" permissions and gain a full control. This issue affects: OTRS AG OTRS 8.0.x version: 8.0.16 and prior versions.