ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Pandemic: Hackers Have Stolen More Than 100 Million Healthcare Records

Pandemic: Hackers Have Stolen More Than 100 Million Healthcare Records

Healthcare organizations are a hot topic when it comes to cybersecurity, as even a small data breach could turn into a goldmine for hackers. Recently, IBM’s 2016 Cyber Security Intelligence Index has reported a data breach that exposed more than 10 million medical records, which shows us just how scary a breach of this kind can be. The secret weapon, in many cases, is a threat called ransomware.

Ransomware is a common and painful threat in its own right, even when it’s not used to target healthcare organizations. Yet, the nature of healthcare records makes it an extraordinarily difficult threat to work around. For one, hospitals often have no choice but to pay the ransom, since they need access to important files in order to continue doing their jobs. This has left many hospital administrations with no choice other than to pay the ransom, in order to guarantee the safety and protection of their patients, and to avoid nasty falling-outs that could come in the form of legal ramifications.

Granted, medical records also contain plenty of sensitive information in their own right, including financial details, home addresses, Social Security numbers, and plenty more. Basically, a healthcare-based security breach hands over all of the data necessary to steal someone’s identity.

One hacker with the overzealous and somewhat hilarious monicker, TheDarkOverlord, posted over 650,000 patient records for sale on the dark web. TheDarkOverlord used an unknown vulnerability in the Windows operating system to infiltrate a hospital’s systems, and then located the database credentials in an unencrypted plain text file, which allowed him to steal the medical records. Instead of posting them immediately, TheDarkOverlord thought that he would be able to get more money for them from the affected companies.

The breach affected three companies: one in Farmington, Missouri, one in Georgia, and another in an unspecified location somewhere in the Central/Midwest United States. Naturally, they all refused to pay, so the hacker determined that the best course of action was to auction them off to the highest bidder. The Georgia haul has reportedly already been quite fruitful for the hacker, and someone has offered to purchase all of the data from insurance provider BlueCross BlueShield (which you may recall getting hacked last year). To these companies, TheDarkOverlord has issued a statement: “Next time an adversary comes to you and offers you an opportunity to cover this up and make it go away for a small fee to prevent the leak, take the offer. There is a lot more to come.”

This ultimatum seems to be just the beginning, as intrusions into the hospital networks themselves seem inevitable. Hackers that can gain access to internal hospital networks can steal medical and financial records of patients, as well as potentially interfere with any connected devices on the network. Criminals could change or alter settings on devices, with patients’ lives hanging in the balance. For doctors and hospital administrators, this possibility must be terrifying, as the institution could face paying an immense ransom fee, or charges for malpractice.

You would think that organizations would have preventative measures put into place that keep sensitive data from being exposed to dangerous hackers. Yet, this is simply not true in some cases. While it’s required that preventative measures are put into place, encryption often isn’t required in order to comply with HIPAA. Thus, the lack of preparation leads to hacks. Additionally, some organizations lack the dedicated internal IT department that can keep systems secure, and that’s not even mentioning data backup. To make matters worse, 25 percent of healthcare institutions have no way to determine if they’ve been hacked, and by the time they know they’ve been the target of ransomware, it’s far too late.

Healthcare, and other high-profile hacking targets, need to understand that they have a giant bullseye painted on their sensitive information. Even a small business has something to offer hackers, however. In order to protect your business, be sure to follow these two steps.

Establish an Iisolated Backup Solution
Whenever there is critical data involved in the day-to-day operation, a backup solution is something that is absolutely necessary for the organization’s safety and security. In the case of a healthcare organization losing their files to some nefarious intruder, a backup will allow them to continue their operations without putting the health and safety of the patients at risk. However, for this backup to be truly effective, it must be isolated from the original system; otherwise, the hacker will likely be able to access the backup as well. As an added advantage, this separation also protects the data against disasters, such as fires, floods, or user error.

Implement a Reliable Defense Strategy
Considering that most external attacks take advantage of system vulnerabilities, this facet is intended to remove the vulnerabilities from your system. As vulnerabilities come in different varieties, your strategy will need to be multifaceted to cover all of your bases. Install and maintain reliable antivirus and malware blockers, and educate yourself and your users on industry best practices for data security.

To protect your business’s infrastructure from external threats, reach out to us at 866-326-7214, and subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Facebook Business Continuity Windows 10 Disaster Recovery Covid-19 Passwords Holiday Apps Managed Service IT Support Windows 10 Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Virtualization Blockchain Spam Server Information Remote Bandwidth Encryption WiFi Mobile Device Management App Business Technology Office Apple Two-factor Authentication Information Technology Office 365 History Employee/Employer Relationship Budget Gmail Conferencing Health Access Control Data Security Analytics Cybercrime Wi-Fi BDR Big Data Hacking Cost Management IT Management Training Employer-Employee Relationship Document Management Hacker Save Money Patch Management Remote Computing Vendor Compliance Remote Monitoring Voice over Internet Protocol Help Desk Managed Services Search... Data loss Best Practice Legal Retail Data storage Money Alert Customer Service Unified Threat Management Hiring/Firing Firewall Outlook Applications Password Augmented Reality Word Project Management BYOD Vulnerabilities IBM Website Computing Vendor Management Hard Drive Mobile Office YouTube Free Resource Twitter Marketing Google Maps Scam Running Cable How To Law Enforcement End of Support Laptop Printer VPN Storage Update Social Sports Travel SaaS DDoS Virtual Reality Data Breach User Social Engineering Cryptocurrency Paperless Office Antivirus Black Market Maintenance iPhone Cleaning Education Cortana Windows 11 Robot Chrome Content Filtering Monitoring Healthcare Websites Router Remote Workers Mobility Meetings Mobile Computing Windows 7 The Internet of Things Virtual Private Network Automobile IT Consultant Telephone How To Current Events Customer Relationship Management Wireless Technology Microchip Co-Managed IT Solutions eWaste Excel Flexibility Entertainment Integration Images 101 Downtime Tech Terms Hack Display Safety Identity Theft Notifications Managed IT Digital Unified Communications Virtual Assistant Virtual Desktop Employees Experience Google Docs Avoiding Downtime Bluetooth Taxes Distributed Denial of Service HIPAA Holidays Office Tips Private Cloud Processor Memory Disaster Cooperation Video Conferencing Physical Security Virtual Machines Politics Computer Repair Machine Learning Settings Lithium-ion battery Multi-factor Authentication Professional Services Start Menu Solid State Drive Downloads Computer Care Processors PowerPoint Vulnerability Saving Time Administration Managed Services Provider Chromebook Software as a Service Presentation Drones Data Protection Computers Bitcoin Specifications Google Calendar Term Download Phone System Windows 8 Supercomputer Piracy Google Apps Telework Virus HTML Microsoft 365 Cables Public Speaking Displays Nanotechnology Advertising Motion Sickness Smartwatch Communitications Relocation Browsers Procurement Streaming Media Comparison Google Play Work/Life Balance Google Drive Upload Tech Support Software License FinTech Social Network Keyboard Point of Sale Hard Drives Corporate Profile Screen Reader Computer Accessories CES IT Assessment Knowledge Data Analysis Supply Chain Management In Internet of Things Television Security Cameras Value Telephony Trends intranet Employer Employee Relationship Mobile Technology Organization Cyber security Wireless Hacks Customer Resource management Shortcuts Shortcut Network Congestion Cabling Devices Heating/Cooling Writing Tablet Environment G Suite Tip of the week Smart Devices Reliable Computing Fileless Malware Remote Working Windows XP Mouse VoIP Gamification Social Networking Tracking Company Culture AI Trend Micro Telephone System Be Proactive Regulations Transportation Backup and Disaster Recovery Web Server Digital Security Cameras Electronic Health Records Scalability Directions Administrator SharePoint Wasting Time Text Messaging Content Proactive IT Digital Payment Desktop eCommerce Bring Your Own Device Electronic Medical Records Troubleshooting Modem Workplace Strategies Worker Accountants Access Database Videos Surveillance Managing Costs Time Management Music Public Cloud Staffing Health IT SSID Equifax Audit Employer/Employee Relationships IP Address Spyware Tactics Hard Drive Disposal Media Development Botnet Virtual Machine Username File Sharing Micrsooft Startup Freedom of Information Reviews Optimization Rental Service Redundancy Business Owner Smart Technology Navigation Teamwork Flash Cache Addiction email scam 2FA Data Storage Hypervisor Telephone Systems Unified Threat Management Business Growth Workers Mobile Security Medical IT Competition Legislation News Shopping Recovery User Tip Printing Evernote SQL Server Network Management CCTV Paperless PCI DSS LiFi Licensing Banking Touchscreen Entrepreneur Google Wallet Supply Chain Application Deep Learning Emails Computer Malfunction Fake News Gig Economy Humor Documents Messenger Emergency Proxy Server Inbound Marketing Internet Service Provider Azure Vendor Mangement Service Level Agreement Business Intelligence Computing Infrastructure Business Communications Regulations Compliance Managed IT Service Business Metrics Management Hosted Solution Samsung Device security Workplace Uninterrupted Power Supply Wireless Headphones Webcam Microsoft Excel Memes Securty Books Net Neutrality Tech Electronic Payment Domains Language Business Mangement Going Green Society Business Cards Human Resources Financial Data Error Tablets Scams Monitors Visible Light Communication Risk Management IT Reading Bookmark

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?