Breaking Compliance News Blog

Healthcare Provider Ransomware Risk is Elevated – What Do We Do???

Posted by Scott Gima on 11/5/20 10:00 AM

cdn2.hubspot.nethubfs378557ransomware bang copyright

On October 28, a joint cybersecurity advisory was issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) that provided a warning of imminent ransomware attacks to U.S. hospitals and healthcare providers.

This advisory provides technical information on the methods used by the hackers so healthcare providers can better protect themselves. In particular, the advisory mentioned the hackers’ use of Ryuk and Conti ransomware.

Leading up to this advisory, Universal Health Services was a recent target of a ransomware attack in late September. UHS is a large health care provider with 26 hospitals in the U.S., Puerto Rico and the U.K. It is believed that the Ryuk ransomware was used in the attack.

I don’t know about you, but for me, a non-IT person, the technical details are way over my head. However, the user awareness best practices are relevant to anybody who uses a workstation or laptop. Here are the user awareness best practices found in the advisory (direct quote):

  • Focus on awareness and training. Because end users are targeted, make employees and stakeholders aware of the threats—such as ransomware and phishing scams—and how they are delivered.

  • Additionally, provide users training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities.

  • Ensure that employees know who to contact when they see suspicious activity or when they believe they have been a victim of a cyberattack. This will ensure that the proper established mitigation strategy can be employed quickly and efficiently.

CISA offered the following Network Best Practices (direct quote):

  • Patch operating systems, software, and firmware as soon as manufacturers release updates.
  • Check configurations for every operating system version for HPH organization-owned assets to prevent issues from arising that local users are unable to fix due to having local administration disabled.
  • Regularly change passwords to network systems and accounts and avoid reusing passwords for different accounts.
  • Use multi-factor authentication where possible.
  • Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP logs.
  • Implement application and remote access allow listing to only allow systems to execute programs known and permitted by the established security policy.
  • Audit user accounts with administrative privileges and configure access controls with least privilege in mind.
  • Audit logs to ensure new accounts are legitimate.
  • Scan for open or listening ports and mediate those that are not needed.
  • Identify critical assets such as patient database servers, medical records, and telehealth and telework infrastructure; create backups of these systems and house the backups offline from the network.
  • Implement network segmentation. Sensitive data should not reside on the same server and network segment as the email environment.
  • Set antivirus and anti-malware solutions to automatically update; conduct regular scans.

Finally, CISA’s alert included Ransomware Best Practices (direct quote):

  • Regularly back up data, air gap, and password protect backup copies offline.
  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, secure location.

What else you can do

With these Ryuk and Conti ransomware attacks, phishing emails are the primary method of access using either attached files or malicious links. To protect yourself:

  • Email attachments should never be opened unless the recipient is 100% sure that the email is legitimate. All it takes is a quick phone call to the sender to verify.
  • Never click on any links in the email, unless the recipient is 100% sure that email safe. If the link is malicious, clicking on the link can initiate the downloading of malware onto the recipient’s desktop without ever knowing that it is happening. From there, the hacker can gain access to the network, execute the Ryuk ransomware which encrypts and shuts down servers and computers. At MPA, sending news article links to each other is a common occurrence. Instead of clicking on the article link, a safer practice would be to open a browser window and search for the title of the article. It does add additional steps, but decreasing or eliminating email clicks is the best way to reduce the risk of a ransomware attack.

MPA can hep

MPA makes HIPAA easier with HIPAA Toolkits, HIPAA Training, and HIPAA awareness flyers.

HIPAA Moments cyberscams

SCOTT SIGNATURE 2020

 

Topics: HIPAA, data breach, security, compliance

    Privacy Policy           Terms of Use