Health care computers remain targets for emerging hacker groups
HHS’ cybersecurity wing publishes notices on three ransomware threats.
The
The U.S. Department of Health and Human Services’ (HHS) Health Sector CyberSecurity Center (HC3) has published an alert and two analyst notes naming three attackers that infiltrate organizations’ computer networks and hold data for pay.
Royal Ransomware
Royal is a human-operated program first observed in September this year and increasing in appearances, according to HC3. Ransom demands have ranged from $250,000 to more than $2 million and “Royal should be considered a threat” to the health care and public health (HPH) sector.
“Royal is an operation that appears to consist of experienced actors from other groups, as there have been observed elements from previous ransomware operations.” It appears to be a private group with financial motivation as the goal, said the
Advertisement
The group has embedded malicious links in malvertising, phishing emails, fake forums, blog comments, and in Google ads and with malicious installer files on software sites that look legitimate.
Cuba
Cuba ransomware is not known to be connected with the Republic of Cuba. But it is a threat to the HPH sector, infecting at least 65 organizations in critical infrastructures in the last year,
Cuba “has continued to compromise their victims through a variety of software vulnerabilities, phishing, stolen credentials, and legitimate remote desktop protocols,” the HC3 alert said. “The group also threatens to publicly release the exfiltrated data if a payment is not made.
“Due to the historical nature of their targeting and the frequency with which ransomware gangs victimize the greater healthcare community, organizations should maintain awareness of the threat group’s activity,” the alert said.
Lorenz
Lorenz is human-operated ransomware that has been operating about two years in “big game hunting,” or targeting larger organizations in English-speaking organizations. Ransom demands can total in the hundreds of thousands of dollars.
Relatively little is known about Lorenz, which operates a data leak site, but “their leaking process is non-typical,” the
Bolster security
HC3 has recommended the following actions to help protect
- Protect each account with
complex, unique passwords . Use a passphrase and/or a complex combination of letters, numbers, and symbols. - In general, avoid opening unsolicited emails from senders you do not know.
- Do not open a link or an attachment in an email unless you’re confident it comes from a legitimate source.
- Do not download or install programs if you do not have complete trust in the publisher.
- Do not visit unsafe websites and do not click on pop-up windows that promise free programs that perform useful tasks.
This article originally appeared on Medical Economics®.
Newsletter
Get the latest clinical updates, case studies, and expert commentary in obstetric and gynecologic care. Sign up now to stay informed.