{"id":15223,"date":"2019-04-30T08:10:02","date_gmt":"2019-04-30T16:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/30\/news-8972\/"},"modified":"2019-04-30T08:10:02","modified_gmt":"2019-04-30T16:10:02","slug":"news-8972","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/30\/news-8972\/","title":{"rendered":"Sophisticated threats plague ailing healthcare industry"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Tue, 30 Apr 2019 15:00:00 +0000<\/strong><\/p>\n<p>The healthcare industry is no longer circling the drain, but it&#8217;s still in critical condition.<\/p>\n<p>While many organizations in healthcare have aimed at or made positive strides toward a more robust cybersecurity and privacy posture, they still have a long way to go. <\/p>\n<p>In 2018, healthcare had the highest number of breaches recorded compared to other industries. This is according to BakerHostetler\u2019s <a href=\"http:\/\/e.bakerlaw.com\/rv\/ff00498db267a11ce4182d53934889997a36f6d4\/p=8213342\">2019 Data Security Incident Response Report<\/a>, which is in its fifth annual iteration this year.<\/p>\n<p>Even today, black hat hackers are continuing to go after patient healthcare data, and as such <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.businessinsider.com\/why-healthcare-data-breach-epidemic-will-intensify-2019-4?r=US&amp;IR=T\" target=\"_blank\">breaches will only intensify<\/a>, according to Business Insider. <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.hipaajournal.com\/\" target=\"_blank\">The HIPAA Journal<\/a>, a website dedicated to covering HIPAA-related news, corroborates this intensity after seeing a steady reporting of at least one breach per day from January through March, 2019. <\/p>\n<p>What\u2019s causing these daily breaches? <\/p>\n<p>Hacking and IT incidents, which include malware attacks, have been consistently topping the list.<\/p>\n<h3>Malware in healthcare sectors <\/h3>\n<p>Healthcare falls short on a lot of security measures: unpartitioned networks, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.helpnetsecurity.com\/2019\/04\/25\/healthcare-industry-security-risks\/\" target=\"_blank\">reliance on legacy infrastructure<\/a>, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.hipaajournal.com\/healthcare-organizations-found-not-to-be-in-conformance-with-nist-csf-and-hipaa-rules\/\" target=\"_blank\">non-compliance with HIPAA security rules and NIST CSF controls<\/a>, unmanaged IoT devices, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/04\/managing-security-medical-management-apps\/\" target=\"_blank\">vulnerable medical management apps<\/a>, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.hipaajournal.com\/hhs-slow-to-implement-gao-health-it-and-cybersecurity-recommendations\/\" target=\"_blank\">the slow implementation of government-recommended IT and cybersecurity practices<\/a> over the last four years, and the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/otalliance.org\/2018HonorRoll\" target=\"_blank\">lack of email authentication and low adoption of always-encrypted sessions<\/a>. For starters.<\/p>\n<p>More importantly, healthcare systems are massively susceptible to malware infection and hijacking, since there are little-to-no protections in place. And when the threats being lobbed at healthcare are more advanced, all that lagging on security takes its toll.<\/p>\n<p>So which types of malware are targeting healthcare organizations? We have collated and analyzed data from our own product telemetry to determine the top malware aiming to infect systems and networks, exfiltrate patient data, and disrupt operations. Here are our results.<\/p>\n<h3>Trojans and riskware are common on healthcare systems<\/h3>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"38434\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/sophisticated-threats-plague-ailing-healthcare-industry\/attachment\/healthcare-mal-cat-all\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-mal-cat-all.png\" data-orig-size=\"566,380\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"healthcare-mal-cat-all\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-mal-cat-all-300x201.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-mal-cat-all.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-mal-cat-all.png\" alt=\"\" class=\"wp-image-38434\" width=\"605\" height=\"406\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-mal-cat-all.png 566w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-mal-cat-all-300x201.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><figcaption>Malicious and risky files plague healthcare systems worldwide<br \/><\/figcaption><\/figure>\n<\/div>\n<p>Among the five types of malware we found affecting healthcare systems, more than three-quarters (79 percent) are <a rel=\"noreferrer noopener\" aria-label=\"Trojans (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/trojans-whats-the-real-deal\/\" target=\"_blank\">Trojans<\/a>. This is followed by riskware (11 percent)\u2014those pieces of software that are not inherently malicious, but could still pose a risk to systems on which they\u2019re installed. Others are ransomware, spyware, and worms\u2014all with an equal share of 3 percent. <\/p>\n<p>We take a deep dive into each.<\/p>\n<h3>Trojans<\/h3>\n<p>Based on our data, a sizable chunk of information-stealing Trojans and downloaders, as well as files posing as legitimate Microsoft (MS) files are present on healthcare systems. We detect them as <a rel=\"noreferrer noopener\" aria-label=\"Trojan.Emotet (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-emotet\/\" target=\"_blank\">Trojan.Emotet<\/a> (35 percent) and <a rel=\"noreferrer noopener\" aria-label=\"Trojan.FakeMS (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-fakems\/\" target=\"_blank\">Trojan.FakeMS<\/a> (33 percent), respectively.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38435\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/sophisticated-threats-plague-ailing-healthcare-industry\/attachment\/healthcare-trojans2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-trojans2.png\" data-orig-size=\"567,343\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"healthcare-trojans2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-trojans2-300x181.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-trojans2.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-trojans2.png\" alt=\"\" class=\"wp-image-38435\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-trojans2.png 567w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-trojans2-300x181.png 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><figcaption>The top 6 Trojans detected in healthcare, with Trojan.Emotet leading.<br \/><\/figcaption><\/figure>\n<\/div>\n<p><a rel=\"noreferrer noopener\" aria-label=\"Emotet (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/\" target=\"_blank\">Emotet<\/a> is an information stealer that can target user credentials stored in browsers and listen to network traffic. Known new versions of Emotet act as downloaders, dropping other banking Trojans, such as <a rel=\"noreferrer noopener\" aria-label=\"TrickBot (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/11\/trickbot-takes-top-business-threat\/\" target=\"_blank\">TrickBot<\/a> and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/worm-qakbot\/\" target=\"_blank\">Qakbot<\/a>, ransomware, such as <a rel=\"noreferrer noopener\" aria-label=\"Ryuk (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/malware\/2019\/01\/ryuk-ransomware-attacks-businesses-over-the-holidays\/\" target=\"_blank\">Ryuk<\/a>, and, at times, cryptominers and cryptowallet stealers. <\/p>\n<p>Emotet has had success in penetrating organizations and spreading because of its simple, yet tried-and-true delivery method\u2014<a rel=\"noreferrer noopener\" aria-label=\"phishing emails (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sophisticated-phishing-a-roundup-of-noteworthy-campaigns\/\" target=\"_blank\">phishing emails<\/a>\u2014as well as its use of an NSA exploit called <a rel=\"noreferrer noopener\" href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\" target=\"_blank\">EternalBlue<\/a>, which pushes the infection laterally through networks. In addition, Emotet contains its own malspam module, which churns out additional phishing to continue the cycle. <\/p>\n<p>To add insult to injury, once on networks, Emotet is notoriously difficult to remediate. <\/p>\n<p>Information stealers, in general, are particularly dangerous to have in healthcare systems, as they put electronic health records (EHRs) at risk. Staff credentials can also be swiped and re-used by threat actors to gain access to more information and resources they can use, misuse, or sell to the highest bidders in the dark market.<\/p>\n<p>Emotet has widely affected the health insurance, hospital, pharmaceutical, biotechnology, and medical device sectors. In fact, this threat has been consistently gaining ground on all organizations over the last year, increasing in both persistence and volume to the tune of almost 650 percent from the same time last year.<\/p>\n<p>Trojan.FakeMS, on the other hand, is the detection we use for malware posing as legitimate Microsoft files. Healthcare personnel may or may not have been aware of such files ending up on their work systems. Either way, their presence on machines that staff rely on to processes sensitive records or pull up correct patient data at critical times isn&#8217;t ideal. <\/p>\n<p>Meanwhile, cryptominer infections, which we sometimes detect as Trojans, often present machine slowdown as a common symptom, and 17 percent of healthcare systems have been showing this sign.<\/p>\n<p>Cryptomining schemers, who may or may not be part of healthcare staff, can manually download miners, which we generically detect as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-bitcoinminer\/\">Trojan.BitCoinMiner<\/a>, from the Internet and discreetly install them onto machines that are used for record keeping. This resource abuse was the case for the <a href=\"https:\/\/www.bankinfosecurity.com\/hospital-hit-cryptocurrency-mining-malware-a-10639\">Decatur County General Hospital<\/a> in Tennessee when their electronic medical records (EMR) server has been hijacked in <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"\/dcgh.org\/wp\/wp-content\/uploads\/2018\/01\/Substitute-notice-for-website.pdf\" target=\"_blank\">September 2017<\/a> to house a miner.<\/p>\n<h3>Riskware<\/h3>\n<p>As mentioned earlier, riskware is non-malicious; however, we flag it for <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/riskware\/\" target=\"_blank\">a number of reasons<\/a>, one of which is its ability to block other programs from receiving patches. This leaves the user\u2019s machine open for exploitation by a number of threats, including EternalBlue mentioned above. <\/p>\n<p><a rel=\"noreferrer noopener\" aria-label=\"RiskWare.MicTray (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/riskware-mictray\/\" target=\"_blank\">RiskWare.MicTray<\/a> makes up 98 percent of our riskware detections in several healthcare sectors, primarily in health insurance and pharmaceuticals. MicTray is the name of our detection for the keylogger component present in the Conexant audio driver set.<\/p>\n<p>The remaining 2 percent of detections are for <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/riskware-tool-hck\/\" target=\"_blank\">Riskware.Tool.HCK<\/a>, the name we use for tools or applications that may be illegal to use in certain countries. Cracked versions of paid software are examples of this.<\/p>\n<h3>Ransomware<\/h3>\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/ransom-wannacrypt\/\" target=\"_blank\">Ransom.WannaCrypt<\/a>, otherwise known as WannaCry, is the ransomware responsible for crippling the UK\u2019s National Health Services (NHS) in 2017, costing them <a href=\"https:\/\/www.telegraph.co.uk\/technology\/2018\/10\/11\/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"a total of \u00a392 million (opens in a new tab)\">a total of \u00a392 million<\/a> (approximately $120 million) from cancelled appointments due to unusable systems to remediation and IT system upgrades. It\u2019s also the malware that forced the healthcare industry to take cybersecurity and privacy seriously.<\/p>\n<p>More than a year later, WannaCry is still at large and continues to affect organizations across industries and countries, disrupting normal operations and putting patient lives and data at risk.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38436\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/sophisticated-threats-plague-ailing-healthcare-industry\/attachment\/ransomscreen-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RansomScreen.png\" data-orig-size=\"1146,570\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"RansomScreen\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RansomScreen-300x149.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RansomScreen-600x298.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RansomScreen-600x298.png\" alt=\"\" class=\"wp-image-38436\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RansomScreen-600x298.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RansomScreen-300x149.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RansomScreen.png 1146w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>The Ransom.WannaCrypt ransom note <\/figcaption><\/figure>\n<\/div>\n<p>Our data shows that WannaCry is currently in the top five malware families affecting healthcare. This could also mean that a vast number of systems are still open to the EternalBlue vulnerability, waiting to be exploited.<\/p>\n<h3>Spyware<\/h3>\n<p>When it comes to spyware in healthcare, Spyware.TrickBot and Spyware.Emotet have dominated the detection count at 45 percent each. <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/spyware-agent\/\" target=\"_blank\">Spyware.Agent<\/a> accounted for 10 percent of our total spyware detections in healthcare.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38437\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/sophisticated-threats-plague-ailing-healthcare-industry\/attachment\/healthcare-spyware\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-spyware.png\" data-orig-size=\"564,377\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"healthcare-spyware\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-spyware-300x201.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-spyware.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-spyware.png\" alt=\"\" class=\"wp-image-38437\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-spyware.png 564w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/healthcare-spyware-300x201.png 300w\" sizes=\"(max-width: 564px) 100vw, 564px\" \/><figcaption>The top 3 spyware detected in healthcare, with Spyware.TrickBot leading. <\/figcaption><\/figure>\n<\/div>\n<p>As secondary infections to Trojan.TrickBot and Trojan.Emotet, it\u2019s no surprise to see TrickBot and Emotet spyware on healthcare systems. Normal users hardly notice how these information stealer modules work in the background; however, network admins may be able to spot odd connections to blacklisted domains as an attempt to reach command-and-control (C&amp;C) servers to upload stolen data.<\/p>\n<h3>Worms<\/h3>\n<p><a rel=\"noreferrer noopener\" aria-label=\"Worm.Parite (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/worm-parite\/\" target=\"_blank\">Worm.Parite<\/a>, a detection name we use for a <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/glossary\/polymorphism\/\" target=\"_blank\">polymorphic<\/a> file infector targeting executable programs (files ending in .exe) and screensavers (files ending in <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/fileinfo.com\/extension\/scr\" target=\"_blank\">.scr<\/a>) on local and shared networked drives, is the only one of its kind affecting systems within the biotech\/medical sector.<\/p>\n<p>One thing to note about Parite is that systems it infects may not show any obvious signs of infection\u2014at least at first. Once a user executes an infected file, the virus code attached to it runs, and then passes back the control to the .exe or .scr file so it executes as normal.<\/p>\n<p>If users don\u2019t address a worm or virus infection, the system is at risk of further infection and exploitation from other malware.<\/p>\n<h3>Oh, and one more thing: fileless malware<\/h3>\n<p>Fileless malware is one of those new schemes that black hat hackers adopted <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2014\/09\/fileless-infections-from-exploit-kit-an-overview\/\" target=\"_blank\">several years ago<\/a>, and they continue to do so at an ever-increasing pace.<\/p>\n<p>A fileless infection means that traces of actual malware present on the affected system are so minute that it evades regular antivirus detection and makes the work of grabbing samples a challenge to security analysts.<\/p>\n<p>Our telemetry data has revealed that, although nominal, fileless malware are present in healthcare organization systems, among them the health insurance and pharmaceutical sectors.<\/p>\n<p>We are able to detect fileless infections flagged as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/rootkit-fileless-mtgen\/\">Rootkit.Fileless.MTGen<\/a>. They\u2019re our broad detection for fileless malware that use rootkits to hide their presence on affected systems.<\/p>\n<p>Some examples of fileless malware that we\u2019ve seen through the years include the following, which we have rounded up in a list below:<\/p>\n<ul>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/03\/fileless-infections-an-overview\/\" target=\"_blank\">Fileless infection: an overview<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/08\/fileless-malware-getting-the-lowdown-on-this-insidious-threat\/\" target=\"_blank\">Fileless malware: getting the lowdown on this insidious threat<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2014\/09\/fileless-infections-from-exploit-kit-an-overview\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Fileless infections from exploit kit: an overview<\/a><\/li>\n<\/ul>\n<h3>No better time to act <\/h3>\n<p>The healthcare industry is ripe with opportunity. Despite the cybersecurity and privacy challenges it is working to address, it continues to evolve by embracing innovative technologies\u2014such as <a rel=\"noreferrer noopener\" aria-label=\"blockchain (opens in a new tab)\" href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2017\/11\/29\/this-is-why-blockchains-will-transform-healthcare\/#585bf7b81ebe\" target=\"_blank\">blockchain<\/a>, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.wired.co.uk\/article\/virtual-reality-therapy-cancer-depression\" target=\"_blank\">virtual reality<\/a>, and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.cbc.ca\/news\/health\/artificial-intelligence-health-care-1.5110892\" target=\"_blank\">artificial intelligence<\/a>\u2014and adopting new models to better serve patients. Of course, adding new technologies can sometimes make protecting systems more complex than it already is.<\/p>\n<p>However healthcare organizations plan to move forward, there are still two simple objectives they must not lose sight of: the security of systems and devices from malware, zero-day vulnerabilities, and hardware hacks, and the protection of patient healthcare data from thieves and malicious insiders.<\/p>\n<p>In mid-April, researchers from the Ben Gurion University released their <a rel=\"noreferrer noopener\" aria-label=\"study on the malicious tampering of CT scans (opens in a new tab)\" href=\"https:\/\/www.c4isrnet.com\/cyber\/2019\/04\/16\/with-malware-and-access-hackers-can-hide-tumors-in-ct-scans\/\" target=\"_blank\">study on the malicious tampering of CT scans<\/a> using deep learning AI. According to <a rel=\"noreferrer noopener\" aria-label=\"their paper (opens in a new tab)\" href=\"https:\/\/arxiv.org\/abs\/1901.03597\" target=\"_blank\">their paper<\/a>, they were able to successfully demonstrate how threat actors can remove or add evidence of medical conditions on scans. They used a man-in-the-middle device, which is another computer loaded with malware to gain access to CT scans and feed medical devices with false information. If such a technology would be used in the wild, people&#8217;s medical records and treatment plans would be at risk, jeopardizing their overall health.<\/p>\n<p>Indeed, healthcare organizations have a lot of catching up to do to protect themselves from online threats that continue to grow in sophistication. A lot more is at stake within this sector than virtually any other. It&#8217;s not just potential earnings or sensitive data at risk if cybersecurity is breached. Patients&#8217; lives are at stake.<\/p>\n<p>To keep the aforementioned objectives in focus, we recommend healthcare organizations visit these guides to shape up their security posture:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/04\/physician-protect-thyself-an-ounce-of-prevention-is-worth-a-pound-of-cure\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Physician, protect thyself: An ounce of prevention is worth a pound of cure<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/business\/2018\/03\/building-an-incident-response-program-creating-the-framework\/\" target=\"_blank\">Building an incident response program: creating the framework<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/how-to-create-intentional-culture-of-security\/\" target=\"_blank\">How to create an intentional culture of security<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/04\/managing-security-medical-management-apps\/\" target=\"_blank\">Who is managing the security of medical management apps?<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/03\/how-to-create-a-successful-cybersecurity-policy\/\" target=\"_blank\">How to create a successful cybersecurity policy<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\" target=\"_blank\">The not-so-definitive guide to cybersecurity and data privacy laws<\/a><\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/08\/10-easy-ways-to-prevent-malware-infection\/\" target=\"_blank\">10 easy ways to prevent malware infection<\/a><\/li>\n<\/ul>\n<p>Stay safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/sophisticated-threats-plague-ailing-healthcare-industry\/\">Sophisticated threats plague ailing healthcare industry<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/sophisticated-threats-plague-ailing-healthcare-industry\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Tue, 30 Apr 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/sophisticated-threats-plague-ailing-healthcare-industry\/' title='Sophisticated threats plague ailing healthcare industry'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/shutterstock_248574760.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Black hat hackers are after patient healthcare data, and such breaches will only intensify. Which forms of malware are behind the attacks? We take a look at the advanced threats targeting a sector struggling to keep up.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/2019-data-security-incident-response-report\/\" rel=\"tag\">2019 data security incident response report<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/decatur-county-general-hospital-breach\/\" rel=\"tag\">decatur county general hospital breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eternalblue\/\" rel=\"tag\">EternalBlue<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/filess-malware\/\" rel=\"tag\">filess malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/healthcare\/\" rel=\"tag\">healthcare<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/healthcare-cybersecurity\/\" rel=\"tag\">healthcare cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/healthcare-malware\/\" rel=\"tag\">healthcare malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/healthcare-security\/\" rel=\"tag\">healthcare security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hipaa\/\" rel=\"tag\">HIPAA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransom-wannacrypt\/\" rel=\"tag\">Ransom.WannaCrypt<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/riskware\/\" rel=\"tag\">riskware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/riskware-mictray\/\" rel=\"tag\">riskware.mictray<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/riskware-tool-hck\/\" rel=\"tag\">riskware.tool.hck<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rootkit-fileless-mtgen\/\" rel=\"tag\">rootkit.fileless.mtgen<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spyware\/\" rel=\"tag\">spyware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spyware-agent\/\" rel=\"tag\">spyware.agent<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spyware-emotet\/\" rel=\"tag\">spyware.emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spyware-trickbot\/\" rel=\"tag\">spyware.trickbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-bitcoinminer\/\" rel=\"tag\">trojan.bitcoinminer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-emotet\/\" rel=\"tag\">trojan.emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-fakems\/\" rel=\"tag\">trojan.fakems<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-trickbot\/\" rel=\"tag\">Trojan.TrickBot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojans\/\" rel=\"tag\">Trojans<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wannacry\/\" rel=\"tag\">WannaCry<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/worm-parite\/\" rel=\"tag\">worm.parite<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/worm-qakbot\/\" rel=\"tag\">worm.qakbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/worms\/\" rel=\"tag\">worms<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/sophisticated-threats-plague-ailing-healthcare-industry\/' title='Sophisticated threats plague ailing healthcare industry'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/sophisticated-threats-plague-ailing-healthcare-industry\/\">Sophisticated threats plague ailing healthcare industry<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[21672,4503,21673,12319,21674,5976,17547,21675,13179,18118,3764,21676,3765,13864,21677,21678,21679,10443,21680,21681,21682,13256,21683,21684,21685,20126,12269,12252,21686,21687,12298],"class_list":["post-15223","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-2019-data-security-incident-response-report","tag-cybercrime","tag-decatur-county-general-hospital-breach","tag-eternalblue","tag-filess-malware","tag-healthcare","tag-healthcare-cybersecurity","tag-healthcare-malware","tag-healthcare-security","tag-hipaa","tag-malware","tag-ransom-wannacrypt","tag-ransomware","tag-riskware","tag-riskware-mictray","tag-riskware-tool-hck","tag-rootkit-fileless-mtgen","tag-spyware","tag-spyware-agent","tag-spyware-emotet","tag-spyware-trickbot","tag-trickbot","tag-trojan-bitcoinminer","tag-trojan-emotet","tag-trojan-fakems","tag-trojan-trickbot","tag-trojans","tag-wannacry","tag-worm-parite","tag-worm-qakbot","tag-worms"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15223"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15223\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15223"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}