Threat Report 2019
Total Page:16
File Type:pdf, Size:1020Kb
Healthcare Threat Report 2019 THREAT REPORT Healthcare 2019 As a highly regulated industry, healthcare organizations struggle to balance patient data security and quick accessibility by both patients and medical staff. Shockingly, the greatest threats to healthcare organizations aren’t all that new, they’re just getting harder to fix. The BluVector Threat Team examines the threats that target healthcare and offers suggestions on how to reduce breach risk. © 2019 BluVector, Inc. bluvector.io 1 Healthcare Threat Report 2019 Table of Contents 3. Threat Chart 4. Infographics 5. Infographics Continued 6. Summary 7. Summary Continued 8. APT: Operation Oceansalt 9. APT: Rising Sun 10. APT: Kwampirs 11. APT: Operation GhostSecret 12. RANSOMWARE: BitPaymer 13. RANSOMWARE: BitPaymer/FriedEx 14. RANSOMWARE: SamSam 15. RANSOMWARE: Gandcrab 16. TROJAN: RtPOS 17. About BluVector © 2019 BluVector, Inc. bluvector.io 2 Healthcare Threat Report 2019 MONTHS IN ADVANCE BLUVECTOR WOULD HAVE DETECTED THREATS APTs RANSOMWARE TROJANS 43 50 8 Rising Sun BitPaymer RtPOS 32 43 Operation Gandcrab Oceansalt 30 29 Operation BitPaymer/ GhostSecret FriedEx BluVector runs all discovered malware samples through historical classifiers to 11 12 identify when our machine learning engine would have first detected the named threat. Kwampirs SamSam BluVector currently supports over 35 file- specific machine learning classifiers. © 2019 BluVector, Inc. bluvector.io 3 Healthcare Threat Report 2019 Infographics $1.4 MILLI N AVERAGE COST FOR HEALTHCARE CYBERATTACK RECOVERY Source: https://healthitsecurity.com/news/healthcare-cyberattacks-cost-1.4-million-on-average-in-recovery MOST CYBER ATTACKED INDUSTRIES: #1 GOVERNMENT HEALTHCARE#2 Source: https://healthitsecurity.com/news/healthcare-cyberattacks-cost-1.4-million-on-average-in-recovery © 2019 BluVector, Inc. bluvector.io 4 Healthcare Threat Report 2019 Infographics Continued $335 AVERAGE COST PER HEALTHCARE RECORD DURING A DATA BREACH Source: https://www.cisecurity.org/blog/data-breaches-in-the-healthcare-sector/ 85,000 AVERAGE CONNECTED DEVICES IN A LARGE HOSPITAL OPEN TO CYBERATTACKS Source: https://www.cisecurity.org/blog/data-breaches-in-the-healthcare-sector/ © 2019 BluVector, Inc. bluvector.io 5 Healthcare Threat Report 2019 Summary Unhealthy Malware Diagnosis in Healthcare a site that looks official but isn’t. Healthcare workers are well-educated, work under pressure It’s not only the patients who are infected at with a lot of complicated equipment and have hospitals. In 2018, healthcare became the number to pivot to describe diagnoses to patients who two most attacked industry sector, second only to don’t understand the terms. Like other modern government, according to the Radware 2018-2019 workforces, healthcare workers assume that the 1 Global Application and Network Security Report . IT team has it figured out. The IT team assumes It is a persistent threat that healthcare IT teams that medical and support staff are knowledgeable need to address - 39% of respondents to the enough to not click on phishing emails. Yet, the survey said that they face daily or weekly attacks data is clearly showing that’s not helping. Unlike on their networks. a computer worm, these threats are localized to the computer that they infect. The more that a Finding and remediating the threat is only part malicious attachment is clicked on and opened, of the challenge. While IT teams are working to the wider the threat becomes. contain the breach, healthcare organizations have to address the impact of any negative publicity Just like diet and exercise, the cure might be as that thrust them into the news. The American simple as going back to the basics. Enacting a 2 Journal of Managed Care uncovered a shocking 101-style email security classes is a great place statistic for hospitals that were victims of a data to start. While many will likely already know the breach. basics, it will be a refresher course for many but might help those who aren’t practicing good email After a breach, hospitals spent 64% more on security hygiene to elevate their efforts. Internal advertising in order to increase interest, patient email examples of sample emails that made it branding and reversing negative reactions to through can also help in solidifying and localizing the breach. Inside those facilities, respondents the impact. reported a 54% drop in productivity and revenue- related tasks. The point is pretty simple: It’s time Healthcare organizations with training programs to increase the health of healthcare security. should mandate cybersecurity training courses for all existing employees and should require that all Treating Healthcare Networks Like Patients new employees complete this training before they While healthcare IT teams may have not the access the organization’s email or networks. medical training that their colleagues have had, their methodologies are similar. They both Enabling Cybersecurity 911 in Email leverage technologies to diagnose an issue, While email is an effective communications tool, determine what is working (and what is not) and it is also the preferred attack plane for threat use their training to determine a treatment plan actors. While existing security defenses are in for resolution. Treating a network like a patient place to weed out known malicious emails, new is a good grounding exercise for devising a threats from external emails continue to appear comprehensive security plan. in end-users’ inboxes. For additional defensive, healthcare organizations should add a mechanism First, behavior modification is a huge first step. to report suspicious emails to the organization’s In the eight malware examples we’ve studied in (official or designated) cybersecurity officer. this report, spearphishing is the most prevalent This might be as simple as having a “report a cause of many of the initial infection events. cybersecurity problem by clicking here” within the That can be a malicious macro in a Word or header of the inbound emails. This way, end-users Excel file, attached to an email embedded file can become proactive participants in the security attachments that look like an x-ray or a link to of organization and gain access to a quick © 2019 BluVector, Inc. bluvector.io 6 Healthcare Threat Report 2019 Summary Continued mechanism to report a cybersecurity incident. task but without active security and thoughtful leadership, breaches will come. Come up with An Ounce of Prevention realistic goals to help your organization improve its security mindfulness but designing simple but Of course, there’s no stronger way to protect impactful ways of making progress but in two IT networks than technology. This is where ways: one for end-users and the other for IT staff. security teams need to think just like their Then book a follow-up appointment to check in medical counterparts. Looking for obvious weak on the success metrics and access where you’re points like old systems that offer low-security at, where your teams need to go and deciding on gains or unpatched ghost servers within their the right solutions that fit your operational needs. infrastructure are easy places to start. Ensuring Of course, should that be a next generation IDS, that desktop workstations are on a schedule powered by AI for your network, BluVector Cortex to receive the latest patches and updates is detected the healthcare-related threats in this another, but challenges arise with some of the report, on average, 29 months before their release specialized medical devices that have been into the while. deployed. Because of the specialized nature of these devices, they might run a proprietary or embedded operating system that is not easy to patch or update. Each should go through rigorous security vulnerability assessments before being attached to the network and then monitored on the network. Kwampirs, one of the threats discussed in this report, created by the Orangeworm group, not only attacks healthcare facilities and pharmaceutical companies, it’s been going after medical device manufacturers. So far there are no reports of it spreading to those devices. But getting malware installed at the manufacturer could make it harder to detect and control. BluVector’s Threat Team uncovered a Windows malware code that showed up in an Android application. While the malware wouldn’t execute, it showed that attackers are getting very innovative on their attacks. Healthcare Findings In addition to monitoring for known threats, healthcare organizations need to proactively monitor their networks for the unknown threats MONTHS IN ADVANCE IN that come every day. Much like how an x-ray can EARLIEST DETECTION “see” inside the human body, the network needs to be monitored for things that the security team can not see. Following Up in Three Months NEW THREATS FOUND THIS QUARTER Implementing a top-down security mandate across any healthcare organization in no easy © 2019 BluVector, Inc. bluvector.io 7 Healthcare Threat Report 2019 APT: Rising Sun 43 What Is It? pointing toward Lazarus. However, they make no determination of attribution, as they state it is Researchers at McAfee identified a new Advanced also potentially an attempted false flag operation Persistent Threat (APT) campaign they have aimed at placing the blame on Lazarus. named Operation Sharpshooter, which uses a cyber espionage payload they named Rising Sun. How Does It Propagate? The Rising Sun backdoor uses the RC4 The Rising Sun malware does not contain the cipher to encrypt its configuration data and necessary code to self-propagate. The attack communications. As with most backdoors, vector in this case is embedded in malicious Word on initial infection, Rising Sun will send data documents containing macros which download regarding the infected system to a command the malicious payload. It is believed that targeted and control (C2) site. That information captures individuals were sent messages on social media computer and user name, IP address, operating containing links to the Word documents, claiming system version and network adapter information. to be work recruitment campaigns.