{"id":3512,"date":"2020-11-16T09:24:43","date_gmt":"2020-11-16T15:24:43","guid":{"rendered":"http:\/\/blogs.luc.edu\/compliance\/?p=3512"},"modified":"2020-11-16T09:24:43","modified_gmt":"2020-11-16T15:24:43","slug":"hospitals-across-the-country-at-serious-risk-for-coordinated-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/compliance\/?p=3512","title":{"rendered":"Hospitals Across the Country at Serious Risk for Coordinated Ransomware Attacks"},"content":{"rendered":"<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\"><em>Kennedy<\/em><em> Chiglo<br \/>\nAssociate Editor<br \/>\n<\/em><em>Loyola University Chicago School of Law, JD <\/em><em>2022<\/em><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">The Federal Bureau of Investigation (\u201cFBI\u201d), the Department of Health and Human Services (\u201cHHS\u201d), and the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (\u201cCISA\u201d) <a style=\"color: #000000\" href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-302a\">recently announced<\/a> that hackers have been and will continue to target the United States hospitals and health-care providers. These attacks are cyber in nature and often lead to ransomware attacks, data left, and inevitable disruption of health care services when patient information is locked until the ransom can be paid.<\/span><!--more--><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\"><strong>What is the nature of the cyber-attacks targeting the health care sector?<\/strong><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Cybercriminals have increased their efforts to target hospital systems with new malware functionalities that allow for the increased ease and speed to scam and defraud victims. These cyber campaigns utilize <a style=\"color: #000000\" href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf\">sophisticated ransomware<\/a>, a computer virus that locks up computers until a sum of money is paid for the decryption key. These attacks often occur in the form of phishing email campaigns with links or downloadable attachments that host the malware that can infect a user\u2019s computer.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Phishing emails are the <a style=\"color: #000000\" href=\"https:\/\/www.beckershospitalreview.com\/cybersecurity\/9-recent-phishing-attacks-on-hospitals.html\">most common vehicle<\/a> for the delivery of ransomware into a provider\u2019s internal network. These emails usually contain a link to a criminally-controlled Google Drive document or other file hosting solution that appears to be a PDF file. Typically, this counterfeit document will report a failure to open the PDF file and will provide a link to access the file online. This link usually contains the ransomware and will subsequently be installed on the device upon the user\u2019s decision to click the link and access the information. Many phishing emails are personalized to the user or appear to be routine business correspondence with customer complaints, hiring decisions, updated internal policies, or other important tasks that would capture the email recipient\u2019s attention.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">The health care industry has become the most targeted for ransomware, cyber-attacks are more frequent and <a style=\"color: #000000\" href=\"https:\/\/blog.checkpoint.com\/2020\/10\/29\/hospitals-targeted-in-rising-wave-of-ryuk-ransomware-attacks\/\">expected to increase<\/a> in the coming months. These attacks have resulted in more than <a style=\"color: #000000\" href=\"https:\/\/healthitsecurity.com\/news\/the-10-biggest-healthcare-data-breaches-of-2020-so-far\">5.6 million<\/a> patient records that have been breached this year alone and may result in lawsuits against providers for comprising the most private individual data.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\"><strong>How does the current public health emergency impact health care providers at risk for cyber-crime?<\/strong><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">The COVID-19 pandemic has resulted in unprecedented regulatory requirements for health care providers that have resulted in the postponing of otherwise standard health care operational decision-making. Most health care providers have transitioned their daily procedures to revolve around tracking and reporting suspected and confirmed COVID-19 cases, maintaining adequate PPE supplies, installing new safety protocols for staff and patients, and communicating with patient families who are not allowed access into the facilities.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">However, as COVID-19 cases and hospitalizations surge across the country, so has <a style=\"color: #000000\" href=\"https:\/\/healthitsecurity.com\/news\/covid-19-impact-on-ransomware-threats-healthcare-cybersecurity\">coordinated ransomware attacks<\/a>. Six large hospital systems have suffered significant cyber-attacks <a style=\"color: #000000\" href=\"https:\/\/www.healthcareitnews.com\/news\/significant-cyber-attack-targets-uvm-health-network-vermont-northern-new-york\">in the past week alone<\/a>, with many more anticipated attacks to come this winter as COVID-19 cases spike again. These attacks can cause total disruption of care delivery and can expose patient data to criminals. The rapid expansion of telehealth has left many health care providers vulnerable as they quickly work to expand and secure their networks, but this has led to a swell of cybercriminal activity that <a style=\"color: #000000\" href=\"https:\/\/www.healthcareitnews.com\/news\/cybercriminals-seek-take-advantage-rapid-telehealth-scale\">targets uninformed patients<\/a> and their medical devices for monetary benefit.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">In the face of the public health emergency, maintaining best practices and compliance with technology requirements is not on the forefront of many health care provider\u2019s agendas. However, technology administrators in hospitals and clinics need to balance the risk of a data breach with other daily demands in order to secure the integrity of their internal networks. \u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\"><strong>What can be done to protect an institution\u2019s network from being attacked?<\/strong><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">It is important to first note that the FBI, HHS, and CISA <a style=\"color: #000000\" href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf\">do not ever recommend paying ransoms<\/a> to cybercriminals as this can embolden adversaries to target similarly situated health care organizations and encourage other criminal actors to engage in ransomware attacks. Instead, these government entities encourage best practices such as:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Patching operating systems whenever manufacturers release updates to the technology;<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Regularly changing passwords to network systems and accounts and avoid reusing passwords for different accounts;<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Utilizing multi-factor authentication where possible;<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Auditing user accounts with administrative privileges and configuring access controls with least privilege in mind;<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Auditing logs to ensure new accounts are legitimate;<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Implementing network segmentation so that sensitive data does not reside on the same server and network segment as the email environment; and<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Setting antivirus and anti-malware solutions to automatically update or conduct regular scans of the solutions to ensure they are up to date.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">Health care providers should also <a style=\"color: #000000\" href=\"https:\/\/www.techrepublic.com\/article\/how-hospitals-can-be-proactive-to-prevent-ransomware-attacks\/\">emphasize regular educational trainings<\/a> and exercises to alert employees about the dangers of malware. Some providers elect to send fake ransomware emails to give employees some indicators of what may appear in their inbox and what should be avoided. Health care providers should also create clear reporting channels for employees to escalate any suspicious activity online. CISA has created <a style=\"color: #000000\" href=\"https:\/\/www.cisa.gov\/cyber-resource-hub\">free cybersecurity resource<\/a> for all providers to reference as threats of cybercrime continue to rise. Cybersecurity is not the first priority in the health care sector during a pandemic, but it should be.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif;color: #000000\">The current public health emergency can only be combatted with seamless health care delivery to patients through safe and secure technology. Health care providers must take heed of the warnings from the FBI, HHS, and CISA to ensure that their internal technology protocols and safeguards can prevent a cyber-attack. Compliance officers consider internal auditing of their institution for an accurate assessment of <a style=\"color: #000000\" href=\"https:\/\/www.aha.org\/guidesreports\/2017-11-03-regulatory-overload-report\">conformity with the current guidance<\/a> on secured technology offered by the Centers for Medicare &amp; Medicaid Services, the Office of Inspector General, the Office for Civil Rights, and the Office of the National Coordinator for Health Information Technology.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Federal Bureau of Investigation (\u201cFBI\u201d), the Department of Health and Human Services (\u201cHHS\u201d), and the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (\u201cCISA\u201d) recently announced that hackers have been and will continue to target the United States hospitals and health-care providers. These attacks are cyber in nature and often lead to ransomware attacks, data left, and inevitable disruption of health care services when patient information is locked until the ransom can be paid.<\/p>\n","protected":false},"author":71,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[400,432,552,554,571,805,1014,1030,1032,1205,1470,1623,1673],"class_list":["post-3512","post","type-post","status-publish","format-standard","hentry","category-fraud-abuse","tag-cisa","tag-cms","tag-cyber-fraud","tag-cyber-security","tag-data-privacy","tag-fbi","tag-healthcare","tag-hhs","tag-hipaa-2","tag-journal-of-regulatory-compliance","tag-oig","tag-cybersecurity","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts\/3512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3512"}],"version-history":[{"count":0,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts\/3512\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}