{"id":12103,"date":"2018-04-23T16:17:10","date_gmt":"2018-04-24T00:17:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/23\/news-5872\/"},"modified":"2018-04-23T16:17:10","modified_gmt":"2018-04-24T00:17:10","slug":"news-5872","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/23\/news-5872\/","title":{"rendered":"Transcription Service Leaked Medical Records"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Mon, 23 Apr 2018 21:18:33 +0000<\/strong><\/p>\n<p><strong>MEDantex<\/strong>, a Kansas-based company that provides medical transcription services for hospitals, clinics and private physicians, took down its customer Web portal last week after being notified by KrebsOnSecurity that it was leaking sensitive patient medical records &#8212; apparently for thousands of physicians.<\/p>\n<p>On Friday, KrebsOnSecurity learned that the portion of MEDantex&#8217;s site which was supposed to be a password-protected portal physicians could use to upload audio-recorded notes about their patients was instead completely open to the Internet.<\/p>\n<p>What&#8217;s more, numerous online tools intended for use by MEDantex employees were exposed to anyone with a Web browser, including pages that allowed visitors to add or delete users, and to search for patient records by physician or patient name. No authentication was required to access any of these pages.<\/p>\n<div id=\"attachment_43497\" style=\"width: 595px\" class=\"wp-caption aligncenter\"><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/04\/adminsearch.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-43497\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/04\/adminsearch.png\" alt=\"\" width=\"585\" height=\"387\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">This exposed administrative page from MEDantex&#8217;s site granted anyone complete access to physician files, as well as the ability to add and delete authorized users.<\/p>\n<\/div>\n<p>Several MEDantex portal pages left exposed to the Web suggest that the company recently was the victim of <strong>WhiteRose<\/strong>, a strain of ransomware that encrypts a victim&#8217;s files unless and until a ransom demand is paid &#8212; usually in the form of some virtual currency such as bitcoin.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-43502\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/04\/whiterose-highlighted.png\" alt=\"\" width=\"596\" height=\"197\" \/><\/p>\n<p>Contacted by KrebsOnSecurity, MEDantex founder and chief executive <a href=\"https:\/\/www.linkedin.com\/in\/sreeram-pydah\/\" target=\"_blank\" rel=\"noopener\"><strong>Sreeram Pydah<\/strong><\/a> confirmed that the Wichita, Kansas based transcription firm recently rebuilt its online servers after suffering a ransomware infestation. Pydah said the MEDantex portal was taken down for nearly two weeks, and that it appears the glitch exposing patient records to the Web was somehow incorporated into that rebuild.<\/p>\n<p>&#8220;There was some ransomware injection [into the site], and we rebuilt it,&#8221; Pydah said, just minutes before disabling the portal (which remains down as of this publication). &#8220;I don&#8217;t know how they left the documents in the open like that. We&#8217;re going to take the site down and try to figure out how this happened.&#8221;<\/p>\n<p>It&#8217;s unclear exactly how many patient records were left exposed on MEDantex&#8217;s site. But one of the main exposed directories was named &#8220;\/documents\/userdoc,&#8221; and it included <a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1P4DLPjCO9Y64dCf6YWYAuhQ8Wr4vUaoV2cCYZxY8RpI\/edit?usp=sharing\" target=\"_blank\" rel=\"noopener\">more than 2,300 physicians<\/a> listed alphabetically by first initial and last name. Drilling down into each of these directories revealed a varying number of patient records &#8212; displayed and downloadable as Microsoft Word documents and\/or raw audio files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-43495 size-full\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/04\/medantex.png\" alt=\"\" width=\"453\" height=\"962\" \/><\/p>\n<p>Although many of the exposed documents appear to be quite recent, some of the records dated as far back as 2007. It&#8217;s also unclear how long the data was accessible, but <a href=\"http:\/\/webcache.googleusercontent.com\/search?q=cache:wJyJ6QYOKZoJ:medantex2.com\/+&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;client=firefox-b-ab\" target=\"_blank\" rel=\"noopener\">this Google cache<\/a> of the MEDantex physician portal seems to indicate it was wide open on April 10, 2018.<\/p>\n<p>Among the <a href=\"http:\/\/medantex.com\/About-Us\/Clients.html\" target=\"_blank\" rel=\"noopener\">clients listed<\/a> on MEDantex&#8217;s site include <strong>New York University Medical Center<\/strong>; <strong>San Francisco Multi-Specialty Medical Group<\/strong>; <strong>Jackson Hospital<\/strong> in Montgomery Ala.; <strong>Allen County Hospital<\/strong> in Iola, Kan; <strong>Green Clinic Surgical Hospital<\/strong> in Ruston, La.; <strong>Trillium Specialty Hospital<\/strong> in Mesa and Sun City, Ariz.; <strong>Cooper University Hospital<\/strong> in Camden, N.J.; <strong>Sunrise Medical Group<\/strong> in Miami; the <strong>Wichita Clinic<\/strong> in Wichita, Kan.; the <strong>Kansas Spine Center<\/strong>; the <strong>Kansas Orthopedic Center<\/strong>; and <strong>Foundation Surgical Hospitals<\/strong> nationwide. MEDantex&#8217;s site states these are just some of the healthcare organizations partnering with the company for transcription services.<span id=\"more-43489\"><\/span><\/p>\n<p>Unfortunately, the incident at MEDantex is far from an anomaly. A <a href=\"https:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/\" target=\"_blank\" rel=\"noopener\">study of data breaches released this month<\/a> by\u00a0<strong>Verizon Enterprise<\/strong> found that nearly a quarter of all breaches documented by the company in 2017 involved healthcare organizations.<\/p>\n<p>Verizon says ransomware attacks account for 85 percent of all malware in healthcare breaches last year, and that healthcare is the only industry in which the threat from the inside is greater than that from outside.<\/p>\n<p>&#8220;Human error is a major contributor to those stats,&#8221; the report concluded.<\/p>\n<div id=\"attachment_43499\" style=\"width: 604px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-43499\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/04\/dbir-hc-2018.png\" alt=\"\" width=\"594\" height=\"402\" \/><\/p>\n<p class=\"wp-caption-text\">Source: Verizon Business 2018 Data Breach Investigations Report.<\/p>\n<\/div>\n<p>According to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-whiterose-ransomware-is-decryptable-and-tells-a-strange-story\/\" target=\"_blank\" rel=\"noopener\">a story<\/a> at <strong>BleepingComputer<\/strong>, a security news and help forum that specializes in covering ransomware outbreaks, WhiteRose was first spotted about a month ago. BleepingComputer founder <strong>Lawrence Abrams<\/strong> says it&#8217;s not clear how this ransomware is being distributed, but that reports indicate it is being manually installed by <a href=\"https:\/\/krebsonsecurity.com\/?s=rdp&amp;x=0&amp;y=0\" target=\"_blank\" rel=\"noopener\">hacking into Remote Desktop services<\/a>.<\/p>\n<p>Fortunately for WhiteRose victims, this particular strain of ransomware is decryptable without the need to pay the ransom.<\/p>\n<p>&#8220;The good news is this ransomware appears to be decryptable by <a href=\"https:\/\/twitter.com\/demonslay335\" target=\"_blank\" rel=\"noopener\">Michael Gillespie<\/a>,&#8221; Abrams wrote. &#8220;So if you become infected with WhiteRose, do not pay the ransom, and instead post a request for help in our <a href=\"https:\/\/www.bleepingcomputer.com\/forums\/t\/674697\/whiterose-ransomware-support-topic-how-to-recovery-filestxt\/\" target=\"_blank\" rel=\"noopener\">WhiteRose Support &amp; Help topic<\/a><a href=\"https:\/\/twitter.com\/demonslay335\" target=\"_blank\" rel=\"noopener\">.&#8221;<\/a><\/p>\n<p>Ransomware victims may also be able to find assistance in unlocking data without paying from <a href=\"https:\/\/www.nomoreransom.org\" target=\"_blank\" rel=\"noopener\">nomoreransom.org<\/a>.<\/p>\n<p>KrebsOnSecurity would like to thank India-based cybersecurity startup <a href=\"https:\/\/banbreach.com\/\" target=\"_blank\" rel=\"noopener\">Banbreach<\/a> for the heads up about this incident.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/04\/transcription-service-leaked-medical-records\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/04\/adminsearch.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Mon, 23 Apr 2018 21:18:33 +0000<\/strong><\/p>\n<p>MEDantex, a Kansas-based company that provides medical transcription services for hospitals, clinics and private physicians, took down its customer Web portal last week after being notified by KrebsOnSecurity that it was leaking sensitive patient medical records &#8212; apparently for thousands of physicians.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[18211,11740,12248,18212,18213,18214,18215,18216],"class_list":["post-12103","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-bleepingcomputer","tag-data-breaches","tag-lawrence-abrams","tag-medantex","tag-sreeram-pydah","tag-verizon-data-breach-investigations-report","tag-verizon-enterprise","tag-whiterose-ransomware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12103"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12103\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12103"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}