Healthcare Industry Targeted By Criminals For Fraud
HEALTHCARE INDUSTRY TARGETED BY CRIMINALS FOR FRAUD
Healthcare operators saw millions of patient records compromised in 2014. The many reports of data breaches in the healthcare industry are increasing the awareness of and requirement for cyber security services. One such report indicated that 90 percent of healthcare organizations have had a data breach, affecting one third of the U.S. population, or approximately 120 million people.
Why is the Healthcare industry being attacked? Healthcare records provide the most complete profile on individuals. Records often include: financial data, residence information, email accounts, points of contact and family data. This provides criminals with multiple opportunities to commit fraud against victims and their family members.
Criminals’ options range from standard credit card fraud and opening fraudulent lines of credit to filing phony tax refunds. One report states that instead of $1.00 per credit card record, stolen healthcare records can return as much as $60.00 to $70.00 per record to the hacker.
The need for network monitoring will only increase as industries like healthcare continue to experience a barrage of breaches. Monitoring networks for suspicious activity increases the chance for anomalies to be detected, traced and remedied before attackers have time to fully infiltrate networks and steal data.
MALWARE OPERATORS PROFIT FROM BITCOIN RANSOMS
In late August 2015, the popular automation tool – AutoIt – was engineered to transmit a Remote Access Trojan (RAT) to unsuspecting parties via a sophisticated phishing attack. AutoIt, which is a scripting language designed for automating the Windows GUI and general scripting, is also popularly used in Microsoft Word documents. The phishing attack was also coupled with basic social engineering tactics to trick victims to download the payload (the RAT).
Once utilized to deliver the payload, RATs maintain persistence on the host in a manner that’s similar to normal administration activity. RATs allow adversaries to fully control compromised hosts remotely to conduct malicious operations, such as exfiltrating sensitive information. The use of AutoIT is unusual and potentially a highly effective method of evading detection by traditional anti-virus technologies.
It is imperative that a layered security approach along with a proper backup procedure is used to protect the corporate enterprise. This type of approach will increase the chances of blocking or quickly catching this kind of activity.
- Maintain an elevated security posture and train staff to recognize potential phishing attacks.
- Intrusion Detection System (IDS) signatures to detect the malware attempting specifically observed call back information
- Daily log review is needed to review system logs for malicious activity
|188.8.131.52 – NEW||184.108.40.206 – NEW|
|220.127.116.11 – NEW||18.104.22.168 – NEW|
|22.214.171.124 – NEW||126.96.36.199 – NEW|
|188.8.131.52 – NEW||184.108.40.206 – NEW|
|220.127.116.11||18.104.22.168 – NEW|
|22.214.171.124 – NEW||126.96.36.199 – NEW|
|188.8.131.52 – NEW||184.108.40.206 – NEW|
|220.127.116.11 – NEW||18.104.22.168 – NEW|
|22.214.171.124 – NEW||126.96.36.199 – NEW|
|188.8.131.52 – NEW||184.108.40.206 – NEW|