The Department of Health and Human Services’ Healthcare Cybersecurity and Communications Integration Center (HCCIC) has released new resources to keep health information technology (IT) and information security professionals up-to-date on several threats and protection recommendations.
A threat intelligence brief on the operations and tactics of Fin7, a hacking group responsible for many high-profile data breaches, details how they target victim companies’ employees to gain access to point of sale (POS) systems and steal information. These types of attacks are particularly dangerous for hospitals given that, in many instances, POS systems are on the same network as more sensitive information like electronic health records.
HCCIC also released a threat intelligence brief on malware loaders or small, difficult-to-detect remote access files. They can be used to interact with and control a compromised computer, leading to the installation of more potent malware, such as ransomware.
In a third intelligence brief update on NetSpectre, HCCIC outlines a new version of the Spectre attack that can be executed over a network connection and does not require the victim to download and execute malicious code.
Report, Fact Sheet on Phishing Prevention
Separately, the 2018 Public-Private Analytic Exchange Program, in collaboration with the Department of Homeland Security and the Office of the Director of National Intelligence, released a report and a fact sheet with best practices to prevent phishing in health IT systems. Phishing refers to tactics used by malicious actors to acquire data, such as passwords or financial information, to gain unauthorized access to IT systems. The report and fact sheet describe different types of phishing and how to prevent and counter phishing attacks.
America’s Essential Hospitals has established a resource page on IT Security for Essential Hospitals. Visit this page for new information and updates.