DomCyber BalkanMedical network targeted, US hospitals impacted. Data breach hits Colorado Department of...

Medical network targeted, US hospitals impacted. Data breach hits Colorado Department of Higher Education in the US.

Objavljeno na

spot_img

Prospect Medical Holdings, a major US hospital network operating in California, Connecticut, Pennsylvania, and Rhode Island, is currently grappling with the fallout from a recent cyberattack that has caused significant disruptions to its network infrastructure. The attack has led to network outages across many of Prospect’s sixteen hospitals, resulting in the closure of these facilities as they work to recover and secure their systems. The recovery process could potentially take weeks, leaving patients and staff alike facing significant challenges.

Upon discovering the attack, Prospect Medical Holdings immediately took their systems offline to protect them from further harm and launched an investigation in collaboration with third-party cybersecurity experts. The hospital network is working diligently to address the pressing needs of its patients and is focused on restoring normal operations as soon as possible. However, the extent and consequences of the attack have been substantial, necessitating a comprehensive response from various entities involved in cybersecurity.

The Federal Bureau of Investigation (FBI) is working closely with the affected hospitals, providing assistance and expertise in responding to the incident. While the investigation is ongoing, the FBI has refrained from disclosing specific details about the attack. Although the attack bears similarities to ransomware incidents, no ransomware group has claimed responsibility thus far. Eric Goldstein, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency, asserts that the agency stands ready to provide any necessary assistance.

The prevalence and severity of ransomware attacks targeting medical organizations have been increasing, a concerning trend noted by Dmitry Dontov, Founder and CEO of Spin.AI. These attacks often target cloud assets and data, exploiting the rising usage of Software-as-a-Service (SaaS) applications during the pandemic. Ransomware groups view this data as lucrative targets, leading to a surge in attacks of this nature. Dontov predicts that similar attacks, particularly those targeting SaaS applications and data, will continue to occur in the coming months. To mitigate this threat, organizations must proactively assess their ransomware readiness and ensure that their security measures, including ransomware detection and response protocols, are robust. Detecting ransomware before or during an attack allows for swift incident response and minimizes the impact on SaaS data, as recovering data after an attack can be a lengthy process.

In addition to the attack on Prospect Medical Holdings, the Colorado Department of Higher Education (CDHE) has also fallen victim to a data breach resulting from a ransomware attack. CDHE released a public notice disclosing the breach, which occurred in June and affected their systems. The attackers gained unauthorized access to CDHE’s network between June 11th and June 19th, extracting student and teacher data spanning thirteen years from 2004 to 2020.

While CDHE did not disclose the exact number of individuals affected, it is likely that the breach impacts anyone who attended a public high school, college, or university in Colorado during the thirteen-year period. The compromised data includes sensitive information such as full names, Social Security numbers, dates of birth, proof of street addresses, images of government IDs, and, in some cases, police reports or complaints related to identity theft. CDHE plans to notify those affected by mail or email and intends to fortify its cybersecurity measures moving forward.

Kevin Kirkwood, Deputy CISO at LogRhythm, believes that incidents like this data breach offer valuable opportunities for universities to strengthen their incident response procedures and enhance their overall security posture. Incorporating cybersecurity solutions that detect malicious activity and empower network infrastructure to block unauthorized access is crucial in proactively defending against ransomware threats. To safeguard higher education systems and protect the confidentiality of personally identifiable information (PII), elements such as authentication and access controls, detection and response capabilities, and real-time monitoring must take priority.

Emily Phelps, Director at Cyware, emphasizes that higher education institutions handle vast amounts of valuable data, making them attractive targets for cybercriminals. In order to defend against cyberattacks effectively, these institutions need to practice strong security hygiene, conduct regular cybersecurity awareness training, and maintain robust incident response plans. Collaboration, public-private partnerships, and increased threat intelligence sharing among public entities can lead to more comprehensive defenses, improving resilience and safeguarding organizations and their stakeholders.

Another expert, Carol Volk, EVP at BullWall, highlights the importance of containment and incident response strategies for educational institutions. In the wake of the CDHE data breach, which compromised thirteen years’ worth of data, Volk stresses that schools must implement a wide range of defensive measures to both prevent breaches and limit the exfiltration of data. While schools strive to deploy the best preventive security tools available, it is unrealistic to expect that they can stay ahead of determined attackers with limited budgets and resources. Therefore, focusing on tools and strategies to contain active attacks is crucial for educational institutions.

In conclusion, the cyberattacks on Prospect Medical Holdings and the Colorado Department of Higher Education underscore the increasing frequency and severity of ransomware incidents targeting critical sectors such as healthcare and education. These attacks have far-reaching consequences, disrupting essential services and compromising sensitive personal information. To combat these threats effectively, organizations must prioritize proactive measures, such as regular assessments of ransomware readiness, robust security postures, and the implementation of advanced cybersecurity solutions. Additionally, collaboration between public and private entities, along with the sharing of threat intelligence, can strengthen defenses and enhance the resilience of targeted organizations.

Link na izvor

Najnoviji članci

U.S. Rule Targets Foreign Threats Exploiting Sensitive Data

The United States is taking bold steps to protect its citizens' sensitive data from...

The Importance of Cybersecurity Threats in the Texas Water System Demonstrated by Russian Hackers

A recent video has emerged showing a potential hacking attempt on a water utility...

Windows 11 Passkey Shift Signals End of Password Era

Microsoft's upcoming shift towards passkeys as a primary form of account security has raised...

Major E2EE Cloud Storage Services Found to Have Severe Flaws

Severe cryptographic vulnerabilities have recently been discovered in several popular end-to-end encrypted (E2EE) cloud...

Još ovako

U.S. Rule Targets Foreign Threats Exploiting Sensitive Data

The United States is taking bold steps to protect its citizens' sensitive data from...

The Importance of Cybersecurity Threats in the Texas Water System Demonstrated by Russian Hackers

A recent video has emerged showing a potential hacking attempt on a water utility...

Windows 11 Passkey Shift Signals End of Password Era

Microsoft's upcoming shift towards passkeys as a primary form of account security has raised...
hrCroatian