ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Pandemic: Hackers Have Stolen More Than 100 Million Healthcare Records

Pandemic: Hackers Have Stolen More Than 100 Million Healthcare Records

Healthcare organizations are a hot topic when it comes to cybersecurity, as even a small data breach could turn into a goldmine for hackers. Recently, IBM’s 2016 Cyber Security Intelligence Index has reported a data breach that exposed more than 10 million medical records, which shows us just how scary a breach of this kind can be. The secret weapon, in many cases, is a threat called ransomware.

Ransomware is a common and painful threat in its own right, even when it’s not used to target healthcare organizations. Yet, the nature of healthcare records makes it an extraordinarily difficult threat to work around. For one, hospitals often have no choice but to pay the ransom, since they need access to important files in order to continue doing their jobs. This has left many hospital administrations with no choice other than to pay the ransom, in order to guarantee the safety and protection of their patients, and to avoid nasty falling-outs that could come in the form of legal ramifications.

Granted, medical records also contain plenty of sensitive information in their own right, including financial details, home addresses, Social Security numbers, and plenty more. Basically, a healthcare-based security breach hands over all of the data necessary to steal someone’s identity.

One hacker with the overzealous and somewhat hilarious monicker, TheDarkOverlord, posted over 650,000 patient records for sale on the dark web. TheDarkOverlord used an unknown vulnerability in the Windows operating system to infiltrate a hospital’s systems, and then located the database credentials in an unencrypted plain text file, which allowed him to steal the medical records. Instead of posting them immediately, TheDarkOverlord thought that he would be able to get more money for them from the affected companies.

The breach affected three companies: one in Farmington, Missouri, one in Georgia, and another in an unspecified location somewhere in the Central/Midwest United States. Naturally, they all refused to pay, so the hacker determined that the best course of action was to auction them off to the highest bidder. The Georgia haul has reportedly already been quite fruitful for the hacker, and someone has offered to purchase all of the data from insurance provider BlueCross BlueShield (which you may recall getting hacked last year). To these companies, TheDarkOverlord has issued a statement: “Next time an adversary comes to you and offers you an opportunity to cover this up and make it go away for a small fee to prevent the leak, take the offer. There is a lot more to come.”

This ultimatum seems to be just the beginning, as intrusions into the hospital networks themselves seem inevitable. Hackers that can gain access to internal hospital networks can steal medical and financial records of patients, as well as potentially interfere with any connected devices on the network. Criminals could change or alter settings on devices, with patients’ lives hanging in the balance. For doctors and hospital administrators, this possibility must be terrifying, as the institution could face paying an immense ransom fee, or charges for malpractice.

You would think that organizations would have preventative measures put into place that keep sensitive data from being exposed to dangerous hackers. Yet, this is simply not true in some cases. While it’s required that preventative measures are put into place, encryption often isn’t required in order to comply with HIPAA. Thus, the lack of preparation leads to hacks. Additionally, some organizations lack the dedicated internal IT department that can keep systems secure, and that’s not even mentioning data backup. To make matters worse, 25 percent of healthcare institutions have no way to determine if they’ve been hacked, and by the time they know they’ve been the target of ransomware, it’s far too late.

Healthcare, and other high-profile hacking targets, need to understand that they have a giant bullseye painted on their sensitive information. Even a small business has something to offer hackers, however. In order to protect your business, be sure to follow these two steps.

Establish an Iisolated Backup Solution
Whenever there is critical data involved in the day-to-day operation, a backup solution is something that is absolutely necessary for the organization’s safety and security. In the case of a healthcare organization losing their files to some nefarious intruder, a backup will allow them to continue their operations without putting the health and safety of the patients at risk. However, for this backup to be truly effective, it must be isolated from the original system; otherwise, the hacker will likely be able to access the backup as well. As an added advantage, this separation also protects the data against disasters, such as fires, floods, or user error.

Implement a Reliable Defense Strategy
Considering that most external attacks take advantage of system vulnerabilities, this facet is intended to remove the vulnerabilities from your system. As vulnerabilities come in different varieties, your strategy will need to be multifaceted to cover all of your bases. Install and maintain reliable antivirus and malware blockers, and educate yourself and your users on industry best practices for data security.

To protect your business’s infrastructure from external threats, reach out to us at 866-326-7214, and subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Communication Data Recovery Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Windows 10 Managed Service Apps IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Gadgets Workplace Strategy Artificial Intelligence Managed IT services Networking Windows Virtualization Mobile Device Management Information Spam Business Technology Remote Bandwidth Server Encryption Blockchain WiFi App Office Two-factor Authentication Office 365 Apple History Information Technology Employee/Employer Relationship Gmail Budget BDR Health Cybercrime Analytics Access Control Data Security Wi-Fi Big Data Conferencing Hacking Remote Monitoring Cost Management Vendor IT Management Hacker Employer-Employee Relationship Training Document Management Compliance Save Money Remote Computing Voice over Internet Protocol Patch Management Help Desk Project Management Computing Vendor Management Hard Drive Applications Search... Best Practice Money Vulnerabilities Customer Service Legal Retail Unified Threat Management Alert Firewall Data storage Augmented Reality Hiring/Firing Word Outlook Password IBM Data loss Website Mobile Office Managed Services BYOD YouTube How To Mobile Computing Data Breach Websites Marketing Laptop Running Cable Meetings Mobility Twitter Google Maps Storage Law Enforcement Scam End of Support Social Printer Monitoring Sports SaaS DDoS Healthcare VPN Windows 11 User iPhone Update Education Cortana Travel Content Filtering Virtual Reality Social Engineering Cryptocurrency Black Market Remote Workers Chrome Paperless Office Router Antivirus Cleaning Windows 7 Robot Free Resource Maintenance The Internet of Things Administration Current Events Virtual Assistant Solid State Drive Presentation Specifications Solutions Start Menu IT Consultant Computer Care Wireless Technology Downloads eWaste Images 101 Integration Vulnerability Chromebook Drones Processor Customer Relationship Management Display Co-Managed IT Automobile Software as a Service Downtime Entertainment Safety Data Protection How To Employees Virtual Desktop Avoiding Downtime Microchip Flexibility Experience Holidays Multi-factor Authentication Hack Cooperation Identity Theft Saving Time Video Conferencing Tech Terms Notifications Unified Communications HIPAA Disaster Virtual Machines Managed IT Digital Google Docs Computer Repair Computers Bitcoin Bluetooth Distributed Denial of Service Professional Services Lithium-ion battery Telephone Office Tips Taxes Private Cloud Memory Processors Excel Managed Services Provider Physical Security Virtual Private Network Politics Machine Learning Settings PowerPoint Smartwatch Telephone System Communitications Regulations Microsoft 365 Banking Google Wallet Deep Learning Electronic Payment Directions CCTV Procurement Backup and Disaster Recovery Point of Sale Printing Messenger Desktop Public Speaking Touchscreen FinTech Content CES Electronic Medical Records Streaming Media Computer Malfunction IT Assessment Accountants Shortcuts Emergency Business Metrics Hosted Solution Vendor Mangement Supply Chain Management Phone System Database Value Keyboard Books Cyber security Hard Drives Language Samsung Society Organization Health IT Webcam Smart Devices Equifax Be Proactive intranet Uninterrupted Power Supply Business Mangement Monitors Visible Light Communication Remote Working Tactics Wireless Hard Drive Disposal Shortcut Reading Trend Micro Heating/Cooling Environment Tablets Windows 8 AI Username Digital Security Cameras Windows XP Electronic Health Records Computer Accessories Startup Workplace Strategies Transportation Freedom of Information Social Networking Google Calendar Relocation Displays Navigation Supercomputer Advertising Addiction Wasting Time email scam eCommerce Mobile Security Modem Virus Work/Life Balance Tech Support Videos User Tip Motion Sickness Surveillance Legislation News Comparison Google Drive Evernote Network Management Managing Costs In Internet of Things SSID Corporate Profile Network Congestion Media Proxy Server Development Emails Smart Technology Employer/Employee Relationships Fake News Knowledge Hacks Television Reliable Computing Telephony Writing Employer Employee Relationship Service Level Agreement Staffing Virtual Machine Computing Infrastructure Optimization Device security IP Address Cabling Reviews Troubleshooting Management Tablet 2FA G Suite Wireless Headphones Teamwork Microsoft Excel Mouse Scalability VoIP Tech Tracking Data Storage Going Green Hypervisor Business Cards Administrator Medical IT Text Messaging Proactive IT Shopping Error Paperless Bookmark Web Server Supply Chain SQL Server Bring Your Own Device SharePoint Term Digital Payment PCI DSS Download Recovery Licensing Piracy Competition Humor HTML Worker Music Gig Economy Business Owner Access Business Communications Browsers LiFi Internet Service Provider Nanotechnology Workplace Azure Entrepreneur Application Time Management Google Play Public Cloud Regulations Compliance Upload Documents Managed IT Service Software License Social Network Memes Botnet Business Intelligence Spyware Micrsooft Human Resources Data Analysis Net Neutrality Screen Reader Scams Audit Rental Service Mobile Technology Flash Security Cameras File Sharing Financial Data Trends Securty Risk Management Inbound Marketing Customer Resource management IT Devices Domains Redundancy Telephone Systems Business Growth Cache Google Apps Fileless Malware Cables Tip of the week Company Culture Unified Threat Management Workers Telework Gamification

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?