Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/24/2012
10:46 AM
50%
50%

Cyber Crooks Target Healthcare For Financial Data

Identity thieves looking for a quick buck often don't even know they are attacking healthcare organizations, Verizon investigation finds.

Health Data Security: Tips And Tools
Health Data Security: Tips And Tools
(click image for larger view and for slideshow)
Contrary to conventional wisdom, the vast majority of hackers targeting healthcare IT systems are searching for financial information, not snooping for personal health data or targeting individuals, a new study suggests. That, according to Verizon Communications research, makes healthcare not much different than any other industry.

"While blackmailing patients and hacking pacemakers are common hand-waving examples used by some to stress the importance of protecting medical records, the actual threat landscape is much more in line with run-of-the-mill cybercrime seen in other industries. The vast majority of attackers seek information from which they can directly or indirectly profit," reads the 2012 Verizon Data Breach Investigations Report, released Wednesday morning.

Additionally, criminals tend to target smaller organizations--think physician and dental practices with fewer than 100 employees rather than hospitals--and look for the easiest electronic defenses to exploit. In many cases, they go after credit/debit card readers, otherwise known as point-of-sale (POS) terminals, the Verizon RISK (Research Investigations Solutions Knowledge) Team, which has been collecting data on breaches since 2004, reported.

"POS systems and desktops were at the forefront of breaches in the healthcare sector. At first glance, this may seem counterintuitive, since electronic health records would almost certainly be stored in a file or database server, and surely this is what the criminals are after. But this likely represents an incorrect assumption; most cybercriminals are more interested in accessing your bank account and applying for loans in your name than they are the details of your last medical exam," the report said.

[ Practice management software keeps the medical office running smoothly. For a closer look at KLAS' top-ranked systems, see 10 Top Medical Practice Management Software Systems. ]

"Their MO is to scan large areas of the Internet to see if there are portals left open," Mark Spitler, one of the report's authors, told InformationWeek Healthcare. The card terminal is the "weakest link," according to Spitler, and once a thief is in, it is easy to move laterally among systems if the server is part of a "flat" network.

POS servers might list the name of the hardware vendor, and more than a few end users just go with the manufacturer's default password, making the system easy to crack, Spitler explained. "In the majority of cases, the attacker gained initial access by exploiting default or guessable credentials, usually via Internet-facing remote access services," the report said.

The Verizon healthcare report focused on about 60 confirmed breaches over the past two years in healthcare and social services. Almost all the attacks involved both hacking and the introduction of malware into the host system, and 95% of security threats against healthcare entities came from external sources, Verizon reported.

Spitler explained that the typical lost laptop or USB drive responsible for so many compromised healthcare records does not fall into Verizon's definition of a data breach investigation because victims in such cases rarely call in forensic investigators.

Since late 2009, healthcare organizations have been required to report any breaches affecting at least 500 people to the U.S. Department of Health and Human Services (HHS), the affected individuals, and, in some cases, news media.

Health data is not usually the primary target in the kinds of breaches involving forensic investigators, Spitler said, but it can be involved. "[Criminals] don't know if it's a physician office or a retail location," Spitler explained. "They're looking for one that's open to the Internet and with weak security credentials."

Although thieves might not know if they have hit a medical practice, protected health information--the kind of data covered by Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations--often is not segmented from other databases, according to the Verizon security analyst. "We do get cases where PHI is at risk," he said.

To protect against such threats, Spitler first recommended putting a firewall in front of the POS server so nobody can access the system from an outside IP address. "No. 2, just change the password," he added.

The healthcare security analysis is part of a series of industry-specific "snapshots" Verizon released Wednesday. In addition to healthcare, the telecommunications giant examined data breaches in retail, hospitality, and financial services, and issued a report on theft of intellectual property.

Intellectual property does not seem to be what criminals are targeting in healthcare. "That was one of the most interesting things we found when we pulled out healthcare data," Spitler said.

InformationWeek Healthcare brought together eight top IT execs to discuss BYOD, Meaningful Use, accountable care, and other contentious issues. Also in the new, all-digital CIO Roundtable issue: Why use IT systems to help cut medical costs if physicians ignore the cost of the care they provide? (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jaysimmons
50%
50%
jaysimmons,
User Rank: Apprentice
10/30/2012 | 2:34:26 AM
re: Cyber Crooks Target Healthcare For Financial Data
FairWarning: I couldn't agree more. It's obvious that the average 'hacker' would go for the data they can quickly sell and easily monetize off of, but that doesn't mean that access to data wouldn't provide other opportunities for them. I'm not sure how effective privacy monitoring is though, as a skilled hacker would probably be able to circumvent those filters. It seems they are based off usage patterns and how they are snooping. I guess it would all depend on the type of attack and how the information was being accessed.

Jay Simmons
InformationWeek Contributor
FairWarning
50%
50%
FairWarning,
User Rank: Apprentice
10/26/2012 | 4:07:51 PM
re: Cyber Crooks Target Healthcare For Financial Data
Indeed, those who are stealing financial information may not care, nor be aware, that they have accessed a health information database, and be GǣonlyGǥ after a quick gain of financial information, which can obviously create enormous havoc in many lives. Yet G and sadly, as we are seeing in this publication and others - many crooks are realizing that GǣancillaryGǥ personal medical information is many times worth even more in some criminal circles. Safeguards such as encryption, firewalls and single sign-on should be used as a matter of course, along with regular staff training, sanctions, and tools to monitor user activities such as FairWarningGs patient privacy monitoring (www.FairWarning.com). Only with coordinated and enforced policies, procedures and tools will healthcare providers be able to fully protect patients and their information - be it financial or medical.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27388
PUBLISHED: 2020-10-23
Multiple Stored Cross Site Scripting (XSS) vulnerabilities exist in the YOURLS Admin Panel, Versions 1.5 - 1.7.10. An authenticated user must modify a PHP plugin with a malicious payload and upload it, resulting in multiple stored XSS issues.
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.