US Health System Warned of Coordinated Ransomware Attacks

Mintz - Health Care Viewpoints
Contact

Mintz - Health Care Viewpoints

US hospitals and healthcare facilities struggling to maintain normal operations during the COVID-19 emergency, were warned this week by the federal Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI) and the Department of Health and Human Services (HHS) of a “targeted and imminent cybercrime threat.”  Specifically, CISA, FBI and HHS have credible information that malicious cyber actors are targeting hospitals and other health care providers with Trickbot malware, leading to ransomware attacks, data theft, and, significantly, the disruption of healthcare services during the pandemic.

Trickbot malware has been around since at least 2016 and cybercriminals have been working to develop new functionality increasing the ease, speed and profitability of attacks.  The criminal enterprise behind Trickbot has created tools to help them evade network defense mechanisms and to blend in with legitimate system traffic so they can move throughout a provider’s IT infrastructure undetected.

A joint CICA, FBI and HHS Alert, Ransomware Activity Targeting the Healthcare and Public Health Sector, (the “Alert”) provides extensive detail regarding the mechanism and indicators of Trickbot malware. Trickbot is used to deploy Ryuk ransomware, which has reportedly forced multiple hospitals across the country off-line in a coordinated attack.    

The Alert includes best practices for health care providers to minimize risk and mitigate harm, including the following familiar, yet critically important practices:

Administrative Best Practices

  • Implement business continuity plans – or plans to continue essential functions through emergencies such as cyberattacks and to minimize service disruptions

Network Best Practices

  • Patch system, software and firmware as new patches are released
  • Require regular password changing
  • Implement multi-factor authentication

Ransomware Best Practices

  • Don’t pay ransom (it doesn’t guarantee that files will be recovered and it emboldens cyber criminals)
  • Regularly back up data and secure backup copies offline
  • Engage with CISA, FBI and HHS for information sharing, best practices and other resources
  • Retain 3 copies of all critical data on at least two different types of media with at least one stored offline.
  • Retain backup hardware to rebuild systems, if necessary

End User Best Practices

  • Maintain formal and informal training and security awareness programs, covering ransomware and phishing scams
  • Make sure that employees know who to contact to report suspicious activity

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Mintz - Health Care Viewpoints | Attorney Advertising

Written by:

Mintz - Health Care Viewpoints
Contact
more
less

Mintz - Health Care Viewpoints on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.