AMIA and AHIMA Demand Changes to HIPAA to Improve Access and Movability of Health Data

December 14, 2018

Dec 8, 2018   The American Medical Informatics Association (AMIA) and the American Health Information Management Association (AHIMA) have required modifications to HIPAA to be made to improve patients’ access to their health information, make health data more moveable, and to better safeguard health data in the app ecosystem. At a Wednesday, December 5, 2018, Capitol Hill briefing gathering, named “Unlocking Patient Data – Pulling the Linchpin of Data Exchange and Patient Empowerment,” leaders from AMIA and AHIMA met other industry specialists in a conversation about the effect federal policies are having on the capability of patients to access and use their health information. Presently, users have access to their private information and add and use that information to reserve Read More

EmblemHealth Pays $100,000 HIPAA Violation Fine to New Jersey for 2016 Data Breach

December 14, 2018

Dec 13, 2018   The health insurance provider EmblemHealth has been penalized $100,000 by New Jersey for a 2016 data breach that disclosed the protected health information (PHI) of over 6,000 New Jersey plan members. On October 3, 2016, EmblemHealth dispatched Medicare Part D Prescription Drug Plan Proof of Coverage documents to its members. The mailing labels contained beneficiary identification codes and Medicare Health Insurance Claim Numbers (HCIN), which mirror Social Security numbers. The documents were dispatched to over 81,000 policy members, 6,443 of whom were New Jersey inhabitants. The New Jersey Division of Consumer Affairs probed the breach and identified policy, procedural, and training breakdowns. Earlier mailings of Evidence of Coverage documents were managed by a trained worker, but Read More

2018 Safety Awareness Training Statistics

December 13, 2018

Dec 14, 2018   A new survey carried out by Mimecast has produced some fascinating safety mindfulness training figures for 2018. The survey indicates many companies are taking substantial risks by not providing sufficient training to their workers on cybersecurity. Question the IT division what is the greatest cybersecurity risk and several will say end users. IT teams put a substantial amount of effort into applying and maintaining cybersecurity defenses, only for workers to take actions that introduce malware or lead to an electronic mail breach. It is understandable that they are frustrated with workers. Most cyberattacks begin with end users. By compromising one appliance, an attacker gains a footing in the network which can be used as a Launchpad Read More

2018 Safety Awareness Training Statistics

December 13, 2018

Dec 14, 2018   A new survey carried out by Mimecast has produced some fascinating safety mindfulness training figures for 2018. The survey indicates many companies are taking substantial risks by not providing sufficient training to their workers on cybersecurity. Question the IT division what is the greatest risk cybersecurity risk and several will say end users. IT teams put a substantial amount of effort into applying and maintaining cybersecurity defences, only for workers to take actions that introduce malware or lead to an electronic mail breach. It is understandable that they are frustrated with workers. Most cyber attacks begin with end users. By compromising one appliance, an attacker gains a footing in the network which can be used as Read More

DHS/FBI Issue Fresh Warning About SamSam Ransomware

December 13, 2018

Dec 12, 2018   In late November, the Division of Justice indicted two Iranians over the use of SamSam ransomware, but there is unlikely to be any slowdown in attacks. Because of the high risk of constant SamSam ransomware attacks in the United States, the Division of Homeland Security (DHS) and FBI have issued a fresh warning to crucial infrastructure companies regarding SamSam ransomware. Up to now, there have been over 200 SamSam ransomware attacks, most of which have been on companies and firms in the United States. The threat actors behind SamSam ransomware have received roughly $6 million in ransom payments and the attacks have led to over $30 million in financial losses from computer system stoppage. The key ways of Read More

Adobe Patches Actively Abused 0-Day Vulnerability in Flash Player

December 13, 2018

Dec 8, 2018   On Wednesday, December 5, 2018, Adobe released an update to rectify a vulnerability in Adobe Flash Player that is being leveraged by a threat group in targeted attacks in Russia. The threat group has previously attacked a healthcare service in Russia that is used by senior civil servants. The vulnerability was recognized by researchers at Gigamon who passed on details of the vulnerability to Adobe in late November. Qihoo 360 scientists lately identified an advanced constant threat campaign that was actively abusing the vulnerability. The vulnerability is being abused using a particularly created Word document which is being dispersed using a spear phishing campaign. The campaign is extremely targeted; however, it is possible that other threat groups might try Read More

Eutelsat Selects TitanHQ to Safeguard its WiFi Networks

December 13, 2018

Nov 11, 2018   The prominent European satellite operator Eutelsat has implemented a new Wi-Fi sieving solution to safeguard its Wi-Fi networks. Eutelsat is among the world’s main satellite operators. The firm has international coverage and offers video, data and broadband facilities in 150 countries all over Europe, Africa, and the Middle East. The firm has bases in 44 countries and hires over 1,000 technical, operational, and commercial experts and its satellite facilities help a big ecosystem of high-tech businesses. Eutelsat has installed Wi-Fi hotspots in its business offices; however, the provision of Wi-Fi hotspots presents safety risks. In order to improve its safety position and safeguard its company and guest Wi-Fi users from online dangers such as malware, ransomware, Read More

Z Services Increases TitanHQ Association to Provide New Cloud-Based Safety Facilities

December 13, 2018

Nov 9, 2018   The Dubai-based managed facility supplier Z Services has increased its association with TitanHQ and is now offering cloud-based web filtering and in-country electronic mail archiving as a facility to clients all over the MENA region. Cybersecurity is a crucial business concern all over the MENA region and businesses are increasingly looking to managed facility suppliers to provide solutions to improve their safety posture. It makes much more intelligence to have cybersecurity as an operational expenditure rather than a capital expenditure, which is achieved through cloud-based facilities instead of appliance-based solutions. Z Services has been increasing its customer base by supplying these solutions to SMEs through ISPs. Z Services increased its cybersecurity facilities earlier this year with Read More

Irish Government Department Probed in Possible GDPR Breach

December 12, 2018

December 7, 2018   In a turn up for the books, the Irish Data Protection Commission (DPC) is being probed for possible General Data Protection Regulation breaches in relation to the body’s data safety officers being prohibited from successfully finishing their work. Article 80 of GDPR states that it is allowable for an individual to appoint a not-for-profit organization acting in the public interest to lodge a grievance with a national watchdog where he or she charges violations of their privileges under the EU rule. Together with this, GDPR also allows not-for-profit organizations to seek “an effective legal solution” on behalf of such complainants, where they think their rights have been infringed. Using Article 80 Digital Rights Ireland, on behalf of technology reporter and Irish Read More

Up to 500 Million People Affected in Marriott International Data Secrecy Breach

December 12, 2018

December 6, 2018   The secret private data of roughly 500 million people has been obtained in a hacking attack on Marriott International as per a statement filed with US watchdogs by the hotel chain previous Friday, December 1, which might also have General Data Protection Regulation implications in the EU. The data secrecy breach was originally revealed on Marriott International databases around September 10 on its guests’ database. It is supposed that it might impact records going back as far as 2014. Marriott International is the parent company of a group of hotel chains including W, Westin, Le Méridien and Sheraton. A public announcement by the President and Chief Executive of Marriott International said: “We deeply bemoan this incident occurred. Read More

GDPR-like Law to be Drafted by the US Senate in early 2019

December 12, 2018

December 1, 2018   A United States Senate subcommittee has disclosed that it is working on a draft of a GDPR-style law for the United States. Senators Richard Blumenthal (Democrat) and Jerry Moran (Republican) are putting together a two-party bill that would preserve much of the same safeguards in the US that GDPR implements in the EU. Senator Blumenthal, remarking on the latest happenings, said that a system of fines for data breaches is essential. He said: “A much-anticipated bill that might provide the U.S. government the capability to collect civil fines if a firm abuses consumer data on the internet or lets it to be stolen could be prepared early next year. I have been working with Senator Moran on Read More

Google Confronting Numerous GDPR Complaints because of Location Tracking

December 12, 2018

November 29, 2018   A group of European Union-based consumer regulators has submitted data secrecy compliant, under the new General Data Protection Regulation, against Google in the belief that the firm is using ways to note web users’ places for ad-targeting campaigns which are violating the data secrecy law. As per GDPR rules data processing approval should be provided by the individual in a way which is precise, informed and freely provided. The group thinks that this, in relation to Google is not the case. The group started the GDPR grievance after an inquiry by the Associated Press found that a number of Google facilities running on Android and Apple appliances determine the user’s place and save it although the user Read More

Instagram GDPR Tool Discloses Subscriber Passwords

December 12, 2018

November 24, 2018   A warning has been issued by Instagram that a number of users of the social media platform have had their password details disclosed by a safety leak. Unluckily, this breach happened because of a fault in the ‘Download Your Data’ instrument that Instagram added to the platform to permit users to download a copy of their own data. Instagram delivered these users their passwords in plain text. This aspect was applied in April in order to make sure compliance with the EU General Data Protection legislation which became enforceable on May 25 this year. The instrument was developed because of secrecy concerns in the aftermath of Facebook’s Cambridge Analytica scandal. The disclosed passwords were also saved on Read More

UK ICO Laws Washington Post Cookie Approval is not GDPR Compliant

December 12, 2018

Nov 22, 2018 The United Kingdom’s Information Commissioner’s Office (ICO) has found that the Washington Post online subscription alternatives are not in compliance with the EU’s General Data Protection Regulation (GDPR). The online subscription alternatives are not subjected to GDPR, nevertheless, ICO might issue it with a reprimand. The Washington Post makes three separate subscription stages available, however, only the highest level lets users the alternatives of turning off tracking cookies. Tying this “approval” to access has elevated the eyebrows of secrecy activists earlier, who have asked whether this meets the requirements for approval set out in EU data safety rules. According to GDPR rule, Washington Post must have proposed subscribers a free substitute to accept cookies. The ICO case manager studying the case Read More

Marriott Announces 500 Million-Record Breach of Starwood Hotel Guests’ Files

December 11, 2018

Nov Dec 2, 2018   The Marriott hotel chain has announced it has suffered a massive data breach that has resulted in the theft of the personal information of up to 500 million guests of the Starwood Hotels and Resorts group. Marriott discovered the data breach on September 8, 2018, after an alert was generated by its internal security system following an attempt by an unauthorized individual to access the Starwood guest reservation database. Third-party computer forensics experts were called in to assist with the investigation, which confirmed that to the Starwood network was first gained in 2014. It is currently unclear how the hacker breached security defenses and gained access to the network. The hacker had encrypted data on Read More

49% of All Phishing Sites Have SSL Credentials and Show Green Padlock

December 11, 2018

Dec 1, 2018   Nearly half of the phishing sites now have SSL credentials, begin with HTTPS, and show the green lock to display the sites are safe, as per new research by PhishLabs. The number of phishing websites that have SSL credentials has been rising gradually since Q3, 2016 when about 5% of phishing websites were showing the green lock to show a safe connection. The proportion increased to roughly 25% of all phishing sites by this time last year, and by the end of Q1, 2018, 35% of phishing websites had SSL credentials. At the end of Q3, 2018, the proportion had risen to 49%. It is no shock that so many phishers have chosen to change to Read More

Main Malvertising Campaign Identified: 300 Million Browser Sessions Hijacked in 48 Hours

December 11, 2018

Nov 30, 2018   The main malvertising campaign is being conducted that is redirecting web users to phishing and scam websites. While malvertising campaigns are nothing new, this one stands out due to the scale of the campaign. In 48 hours, more than 300 million users have had their browsers redirected to malicious web pages. The campaign was uncovered by researchers at cybersecurity firm Confiant on November 12. The researchers note that the actor behind this campaign has been tracked and was found to have been conducting campaigns continuously since August; however, the latest campaign is on a totally different scale. Previously, the scammer has conducted much smaller campaigns not involving tier 1 publishers. The campaign is targeting mobile iOS Read More

APT28 Group Uses New Cannon Trojan in Spear Phishing Campaign Targeting US and EU Government Organizations

December 11, 2018

Nov 24, 2018   A new spear-phishing campaign is being carried out by the AP28 (Sofacy Group/Fancy Bear/Sednit) on government agencies in the United States, Europe, and a former USSR state using the earlier unidentified Cannon Trojan. The campaign was noticed by Palo Alto Networks’ Unit 42 team and was first known in late October. The campaign is being carried out through spam electronic mail and uses weaponized Word document to deliver two malware variations. The first, the Zebrocy Trojan, has been used by APT28 in earlier campaigns and was first identified in 2015. The main purpose of the Zebrocy Trojan is to provide access to an appliance and establish a link with a C2 server. It serves as a Read More

Vital AMP for WP Plugin Vulnerability Allows Any User to Gain Admin Rights

December 11, 2018

Nov 23, 2018   A recent critical WordPress plugin vulnerability has been recognized that might let site users increase rights to admin level, providing them the capability to add custom code to a vulnerable website or upload malware. The vulnerability is in the AMP for WP plugin, a trendy plugin that changes standard WordPress posts into the Google Accelerated Mobile Pages format to improve load speeds on mobile browsers. The plugin has over 100,000 active users. Although the plugin was expected to carry out checks to decide whether a particular user is allowed to carry out certain administrative jobs, inadequate checks were carried out to confirm the existing user’s account permissions. As a consequence, any user, including a user listed on Read More

TA505 APT Group Dispersing tRat Malware in New Fraud Campaigns

December 11, 2018

November 22, 2018   The abounding APT group TA505 is carrying out fraud electronic mail campaigns dispersing a new, modular malware variation called tRAT. tRAT malware is a distant access Trojan capable of downloading extra modules. Besides adding infected users to a botnet, the danger actors have the option of vending access to various elements of the malware to other danger groups for use in different attacks. Threat scientists at Proofpoint interrupted two separate electronic mail campaigns dispersing tRAT malware this fall, one of which was a typical fraud electronic mail campaign using social engineering methods to get electronic mail receivers to open an attached Word document and allow macros. Allowing macros caused the download of the tRAT payload. One Read More

12 State Attorneys General File HIPAA Breach Complaint Versus Medical Informatics Engineering

December 11, 2018

Dec 7, 2018   A multi-state federal litigation has been filed versus Medical Informatics Engineering and NoMoreClipboard over the 2015 data breach that displayed the data of 3.9 million people. Indiana Attorney General Curtis Hill is heading the litigation and 11 other states are partaking – Arizona, Nebraska, Minnesota, Louisiana, Kentucky, Kansas, Iowa, Florida, Arkansas, North Carolina, and Wisconsin. This is the first time that state attorneys general have combined forces in a central litigation over a data breach caused by violations of the Health Insurance Portability and Accountability Act. The litigation seeks a financial verdict, civil fines, and the adoption of a remedial action plan to tackle all compliance failures. A Failure to Implement Sufficient Security Controls The complaint Read More

OCR Penalizes Florida Contractor Doctors’ Group $500,000 for Several HIPAA Compliance Failures

December 11, 2018

Dec 6, 2018   An HHS’ Office for Civil Rights (OCR) inquiry into an impermissible revelation of PHI by a business associate of a HIPAA-covered entity revealed grave HIPAA compliance failures. Advanced Care Hospitalists (ACH) is a Lakeland, FL-based contractor doctors’ group that supplies internal medicine doctors to nursing homes and hospitals in West Florida. ACH falls under the description of a HIPAA-covered unit and is required to abide by the HIPAA Secrecy, Safety, and Breach Notification Laws. ACH serves roughly 20,000 patients a year and hired between 39 and 46 staff members per year during the time frame under inquiry. Between November 2011 and June 2012, ACH hired the services of a person who declared to be a representative Read More

OCR Penalizes Allergy Practice $125,000 for Impermissible PHI Disclosure

December 11, 2018

Nov 28, 2018   The Division of Health and Human Services’ Office for Civil Rights (OCR) has penalized a Hartford allergy practice $125,000 over suspected violations of the HIPAA Secrecy Law. On October 6, 2015, OCR got a copy of a civil rights grievance that had been filed with the Department of Justice (DOJ). The plaintiff suspected Allergy Associates of Hartford – A Connecticut healthcare supplier that specializes in treating patients with allergies – had impermissibly divulged her protected health information to a TV correspondent. The plaintiff had earlier got in touch with a local TV station after she had been turned away from the allergy practice due to her service animal. The TV correspondent subsequently contacted the practice requesting Read More

October 2018 Healthcare Data Breach Statement

December 11, 2018

Nov 23, 2018   Our October 2018 healthcare data breach report demonstrates there has been a month-over-month rise in healthcare data breaches with October seeing more than one healthcare data breach reported daily. 31 healthcare data breaches were informed by HIPAA-covered units and their business partners in October – 6 occurrences more than the preceding month. It must be noted that one breach at a business associate was informed to OCR as three separate breaches. The number of breached records in September (134,006) was the lowest total for 6 months, however, the descending tendency didn’t continue in October. There was a huge rise in disclosed protected health information (PHI) in October. 2,109,730 records were disclosed, stolen or impermissibly disclosed – Read More

2.65 Million Atrium Health Patients Affected by Business Associate Data Breach

December 10, 2018

Dec 1, 2018   AccuDoc Solutions Inc., a supplier of healthcare billing facilities, has suffered a main data breach in which the protected health information of 2,650,000 patients of Atrium Health was disclosed. Morrisville, NC-based AccuDoc Solutions makes bills for patients and manages the online payment system used by Atrium Health, a network of 44 hospitals all over North Carolina, South Carolina, and Georgia. On October 1, 2018, AccuDoc Solutions informed Atrium Health that a few of its databases had been undermined. The breach inquiry disclosed hackers had gained access to AccuDoc Solutions databases between September 22 and September 29, 2018. A wide-ranging forensic inquiry into the attack verified that patient information had been undermined, but the information saved in its Read More

UPMC Data Breach Trial Reinstated by Pennsylvania Supreme Court

December 10, 2018

Nov 30, 2018   Litigation filed by workers affected by a data breach at the University of Pennsylvania Medical Center (UPMC) has been revitalized by the Pennsylvania Supreme Court. The litigation was filed after hackers stole the information of roughly 62,000 current and former UPMC workers in a data breach noticed by UPMC in February 2014. The stolen information included names, tax information, Social Security numbers, addresses, and bank account numbers. The information was used to file fake tax returns in workers’ names to get tax refunds. According to the charge, “As a consequence of UPMC’s negligence, workers incurred damages relating to falsely filed tax returns and are at an increased and impending risk of becoming sufferers of identity theft Read More

HealthCare.gov Data Breach Disclosed Confidential Information of 94,000 People

December 10, 2018

Nov 17, 2018   Last month, the Centers for Medicare & Medicaid Services (CMS) declared that the HealthCare.gov website had been hacked and the confidential data of roughly 75,000 people had possibly been compromised. This week, the CMS released an update on the breach verifying more people had been affected than was originally thought. The revised estimation has seen the number of breach sufferers increased to 93,689. The original breach declaration was light on details concerning the precise nature of the breach and the kinds of information that had possibly been compromised. In the original announcement, the CMS clarified that doubtful activity was noticed on the site on October 13 and on October 16 a breach was verified. Steps were Read More

Altus Hospital Baytown Experiences Dharma Ransomware Attack

December 10, 2018

November 12, 2018   Altus Hospital in Baytown, TX, has suffered a ransomware attack that led to the encryption of several hospital files. The electronic medical record system was unaffected, even though some of the encrypted files had patients’ protected health information (PHI) including names, credit card information, Social Security numbers, birth dates, contact telephone numbers, home addresses, driver’s license numbers, and medical information. The attack was found on September 3, 2018. Altus Hospital received a ransom demand; nevertheless, helped by a third-party safety advisor, Altus Hospital was able to restore all affected files from backups. The investigator decided that the attacker gained access to the hospital’s servers prior to deploying a Dharma ransomware variation. Altus Hospital thinks the purpose Read More

Billing Files of 12,331 Patients of Inova Health System Have Been Compromised

December 10, 2018

November 11, 2018   Falls Church, VA-based Inova Health System has begun informing 12,331 patients that some of their protected health information (PHI) has been retrieved by an illegal person. Inova Health System was communicated by law enforcement on September 5, 2018 over a supposed breach of patients’ billing information. A prominent computer forensics company was hired to carry out an inquiry into the breach to decide the type of the attack and the level of the breach. The inquiry disclosed its billing system was first retrieved by an illegal person in January 2017, and once again between July and October 2017. Access was gained using the login identifications of an Inova worker. Peculiarly, Inova also informed that the same Read More

Q3 Healthcare Data Breach Report: 4.39 Million Records Disclosed in 117 Breaches

December 10, 2018

November 10, 2018   The latest part of the Breach Barometer Report from Protenus demonstrates there was a three-monthly reduction in the number of healthcare data breaches compared to Q2, 2018; nevertheless, the number of healthcare files exposed, thieved or impermissibly disclosed rose in Q3. In each quarter of 2018, the number of healthcare files exposed in data breaches has increased. Between January and March 1,129,744 healthcare files were disclosed in 110 breaches. Between April and June, 3,143,642 files were disclosed in 142 breaches, and 4,390,512 healthcare files were disclosed, thieved, or impermissibly exposed between July and September in 117 breaches. The biggest healthcare data breach in Q3 was informed by the Iowa Health System UnityPoint Health. The breach was Read More

566,217 Clients of Chicago-Based Health Underwriter Impacted by Data Breach

December 10, 2018

November 9, 2018   The Chicago-based health underwriter Bankers Life, a branch of CNO Financial Group Inc., has found hackers gained access to its systems and possibly thieved the private information of over half a million people. Bankers Life offers a variety of insurance facilities to clients, including life insurance, long-term care insurance, health insurance, and Medicare additional insurance and is the biggest branch of CNO Financial Group. Hackers initially gained access to its systems between May 30 and September 13, 2018. Bankers Life said it found the breach on August 7, 2018. The hackers gained access to a variety of sensitive personal information of a ‘limited number’ of its workers. A ‘limited group’ of clients had names, diagnoses, medication Read More

Stolen Raley’s Pharmacy Laptop Might Have Contained PHI of 10,000 Patients

December 10, 2018

November 1, 2018   Roughly 10,000 patients of Raley’s Pharmacy are being informed that some of their protected health information (PHI) has possibly been compromised. On September 24, 2018, a laptop computer was stolen from a Raley’s drugstore that might have contained some patients’ PHI. Raley’s pharmacy instantly started an inquiry to decide what information was saved on the appliance. Interviews were carried out with staff members who had used the appliance in an attempt to know the kinds of content that might have been disclosed. The electronic mail accounts of workers were also checked for attachments and links to documents that had ePHI, to decide which records had been downloaded or were saved in cache files in a provisional Read More

Adobe Patches Actively Abused 0-Day Vulnerability in Flash Player

December 9, 2018

Dec 8, 2018   On Wednesday, December 5, 2018, Adobe released an update to rectify a vulnerability in Adobe Flash Player that is being leveraged by a threat group in targeted attacks in Russia. The threat group has previously attacked a healthcare service in Russia that is used by senior civil servants. The vulnerability was identified by researchers at Gigamon who passed on details of the vulnerability to Adobe in late November. Qihoo 360 scientists lately identified an advanced constant threat campaign that was actively abusing the vulnerability. The vulnerability is being abused using a particularly created Word document which is being dispersed using a spear phishing campaign. The campaign is extremely targeted; however, it is possible that other threat Read More

Phishing Accounts for 50% of All Fraud Attacks

December 9, 2018

November 17, 2018   A study of existing cyber fraud dangers by network safety company RSA demonstrates that phishing attacks have risen by 70% since Q2 and now account for 50% of all fraud attacks experienced by companies. Phishing attacks are trendy since they are easy to carry out and have a high success rate. An attacker can set up a webpage that imitates a famous brand such as Microsoft or Google that demands login particulars. Electronic mails are then transmitted containing hyperlinks to the site together with a valid reason for clicking. As per a research carried out by Verizon, 12% of users click hyperlinks in phishing electronic mails. RSA notes that the bulk of phishing attacks are carried Read More

Marriott Announces 500 Million-Record Breach of Starwood Hotel Guests’ Data

December 9, 2018

Dec 2, 2018   The Marriott hotel chain has announced it has experienced a huge data breach that has led to the theft of the private information of up to 500 million visitors of the Starwood Hotels and Resorts group. Marriott found the data breach on September 8, 2018, after an alert was generated by its internal safety system after an attempt by an illegal person to access the Starwood visitor reservation database. Third-party computer forensics specialists were called in to help with the probe, which verified that the Starwood network was first gained in 2014. It is presently unclear how the hacker breached safety fortifications and gained access to the network. The hacker had encrypted data on the network Read More

49% of All Phishing Sites Have SSL Credentials and Show Green Padlock

December 9, 2018

Dec 1, 2018   Nearly half of the phishing sites now have SSL credentials, begin with HTTPS, and show the green lock to display the sites are safe, as per new research by PhishLabs. The number of phishing websites that have SSL credentials has been rising gradually since Q3, 2016 when about 5% of phishing websites were showing the green lock to show a safe connection. The proportion increased to roughly 25% of all phishing sites by this time last year, and by the end of Q1, 2018, 35% of phishing websites had SSL credentials. At the end of Q3, 2018, the proportion had risen to 49%. It is no shock that so many phishers have chosen to change to Read More

Main Malvertising Campaign Identified: 300 Million Browser Sessions Hijacked in 48 Hours

December 9, 2018

Nov 30, 2018   A major malvertising campaign is being carried out that is redirecting web users to phishing and cheat websites. Although malvertising campaigns are nothing new, this one stands out because of the size of the campaign. In 48 hours, over 300 million users have had their browsers redirected to malevolent web pages. The campaign was found by scientists at a cybersecurity company Confiant on November 12. The scientists noted that the actor behind this campaign had been trailed and was found to have been carrying out campaigns continuously since August; nevertheless, the latest campaign is on a completely different level. Earlier, the scammer had carried out much smaller campaigns not involving level 1 publishers. The campaign is Read More

Spotify Phishing Cheat Noticed: User Accounts Breached

December 9, 2018

Dec 3, 2018   Scientists at AppRiver have noticed a Spotify phishing cheat that tries to get users to disclose their Spotify identifications. The electronic mails use brand imaging that makes the electronic mails seem to have been transmitted by the music streaming facility. The emails are genuine, even though there are indications that the messages are not genuine. The electronic mail template used in the Spotify phishing cheat asserts the user requires to verify their account details to get rid of limitations and make sure they can carry on to use their account. The messages contain the Spotify symbol and contact information in the footer. The electronic mails have a link that account holders are requested to click to Read More

Marriott Annonces 500 Million-Record Breach of Starwood Hotel Guests’ Data

December 9, 2018

Dec 2, 2018   The Marriott hotel chain has announced it has experienced a huge data breach that has led to the theft of the private information of up to 500 million visitors of the Starwood Hotels and Resorts group. Marriott found the data breach on September 8, 2018, after a warning was generated by its internal safety system after an attempt by an illegal person to access the Starwood visitor reservation database. Third-party computer forensics specialists were called in to help with the probe, which verified that the access to Starwood network was first gained in 2014. It is presently unclear how the hacker breached safety fortifications and gained access to the network. The hacker had encrypted data on Read More

49% of All Phishing Sites Have SSL Credentials and Show Green Padlock

December 9, 2018

Dec 1, 2018   Nearly half of the phishing sites now have SSL credentials, beginning with HTTPS, and show the green lock to display the sites are safe, as per new research by PhishLabs. The number of phishing websites that have SSL credentials has been rising gradually since Q3, 2016 when about 5% of phishing websites were showing the green lock to show a safe connection. The proportion increased to roughly 25% of all phishing sites by this time last year, and by the end of Q1, 2018, 35% of phishing websites had SSL credentials. At the end of Q3, 2018, the proportion had risen to 49%. It is no shock that so many phishers have chosen to change to Read More

Main Malvertising Campaign Identified: 300 Million Browser Sessions Hijacked in 48 Hours

December 8, 2018

Nov 30, 2018   A major malvertising campaign is being carried out that is redirecting web users to phishing and cheat websites. Although malvertising campaigns are nothing new, this one stands out because of the size of the campaign. In 48 hours, over 300 million users have had their browsers redirected to malevolent web pages. The campaign was found by scientists at a cybersecurity company Confiant on November 12. The scientists noted that the actor behind this campaign had been trailed and was found to have been carrying out campaigns continuously since August; nevertheless, the latest campaign is on a completely different level. Earlier, the scammer had carried out much smaller campaigns not involving level 1 publishers. The campaign is Read More

California Wildfire-Themed BEC Attack Identified

December 8, 2018

Nov 29, 2018   It’s usual for phishers to use natural catastrophes as a lure to get ‘donations’ to line their pouches instead of helping the sufferers and the California wildfires are no exception. A lot of people have lost their lives in the fires and the death toll is likely to increase further as hundreds of people are still unaccounted for. Entire towns such as Paradise have been completely devastated by the wildfires and hundreds of people have lost their homes. Numerous are suffering, have nowhere to reside, and have lost everything. As expected many people desire to donate money to assist the sufferers to rebuild their lives. The attackers are using the sympathy of others to deceive companies. Read More

2,393 Patients of Southwest Washington Regional Surgery Center Affected by Phishing Attack

December 8, 2018

Nov 18, 2018   Southwest Washington Regional Surgery Center in Vancouver, WA, has experienced a phishing attack that has led to the disclosure of 2,393 patients’ protected health information. The breach was restricted to a single electronic mail account and no proof was found to indicate any electronic mails have been accessed or downloaded by the attacker. An extensive inquiry was carried out with help provided by a third-party cybersecurity company. The inquiry finished on September 25. The inquiry included a manual analysis of all electronic mails in the undermined account to recognize patients affected and the kinds of information that might have been undermined. Southwest Washington Regional Surgery Center clarified in its breach notification that the beach was restricted Read More

2,393 Patients of Southwest Washington Regional Surgery Center Affected by Phishing Attack

December 8, 2018

Nov 18, 2018   Southwest Washington Regional Surgery Center in Vancouver, WA, has experienced a phishing attack that has led to the disclosure of 2,393 patients’ protected health information. The breach was restricted to a single electronic mail account and no proof was found to indicate any electronic mails have been accessed or downloaded by the attacker. An extensive inquiry was carried out with help provided by a third-party cybersecurity company. The inquiry finished on September 25. The inquiry included a manual analysis of all electronic mails in the undermined account to recognize patients affected and the kinds of information that might have been undermined. Southwest Washington Regional Surgery Center clarified in its breach notification that the beach was restricted Read More

1,800 Patients’ PHI Undermined in Metrocare Services Phishing Attack

December 8, 2018

Nov 16, 2018   Metrocare Services, the biggest supplier of mental health facilities in North Texas, has experienced a phishing attack that has led to the disclosure of 1,804 patients’ protected health information. Numerous worker electronic mail accounts were undermined in the attack, with the first account breach happening on August 2, 2018. Metrocare didn’t notice the phishing attacks until September 4. As soon as the breach was noticed, measures were taken to safeguard the accounts. Metrocare has also provided its workers with additional training on information safety, additional methods are being launched to improve the safety of its information technology infrastructure, and electronic mail safety has been reinforced. The inquiry into the breach could not decide whether any electronic Read More

Health First Phishing Attack Affects 42,000 Clients

December 8, 2018

Nov 15, 2018   Health First Inc., a four-hospital Florida-based health system, suffered a hacking/IT occurrence earlier this year that was informed to the Division of Health and Human Services’ Office for Civil Rights on October 5. As per the OCR breach summary, 42,000 clients were affected by the breach. Additional information has now been issued on the type of the breach. As per Health First, the electronic mail accounts of several workers were undermined in the phishing attack. The disclosed protected health information was contained in the undermined electronic mail accounts. The electronic medical record system was unchanged by the attack. An inquiry into the breach disclosed the attackers first gained access to worker electronic mail accounts in February Read More

Ransomware Attacks Informed by Healthcare Suppliers in Illinois and Rhode Island

December 8, 2018

Dec 7, 2018   A roundup of latest healthcare ransomware attacks, secrecy breaches, and security incidents that have been publicized in the past few days. Center for Vitreo-Retinal Diseases Ransomware Attack Affects 20,371 Patients The Center for Vitreo-Retinal Diseases in Libertyville, IL, suffered a ransomware attack that led to the encryption of data on its servers. The attack was noticed on September 18, 2018. The inquiry into the breach indicates the attacker might have gained access to the protected health information of 20,371 patients that was saved on the affected servers. The attack seemed to have been carried out with the purpose of extracting money from the practice. Although it is possible that patient information was accessed by the attacker, Read More

Spotify Phishing Scam Exposed: User Accounts Breached

December 8, 2018

Dec 2, 2018   Researchers at AppRiver have noticed a Spotify phishing cheat that tries to get users to disclose their Spotify identifications. The electronic mails use brand imaging that makes the electronic mails seem to have been sent by the music streaming facility. The messages are realistic, even though there are indications that the messages are not genuine. The electronic mail template used in the Spotify phishing scam asserts the user needs to verify their account details to get rid of restrictions and make sure they can carry on to use their account. The messages contain the Spotify logo and contact information in the footer. The electronic mails have a connection that account holders are requested to click to Read More

DOJ Charges Two Iranian Hackers for Part in SamSam Ransomware Attacks

December 8, 2018

Dec 1, 2018   The U.S. Department of Justice has proclaimed substantial progress has been made in the scrutiny of the threat actors behind the SamSam ransomware attacks that have plagued the healthcare industry over a previous couple of years. The DOJ, helped the Royal Canadian Mounted Police, Calgary Police Service, and the UK’s National Crime Agency and West Yorkshire Police, have recognized two Iranians who are supposed to be behind the SamSam ransomware attacks. Both persons – Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri – have been working out of Iran since 2016 and have been charged on four allegations: Plan to commit a scam and related computer activity Plan to commit wire fraud Deliberate damage to a Read More

Ransomware Attack Results in Limited Closing of Emergency Rooms at Two Hospitals

December 8, 2018

Nov 30, 2018   Computer systems used by East Ohio Regional Hospital (EORH) in Martins Ferry, OH, and Ohio Valley Medical Center (OVMC) in Wheeling, WV, were taken down over the weekend of 24/25 November as a consequence of a ransomware attack. The ransomware began encrypting files on the evening of Friday, November 23. Though the attackers succeeded in gaining access to some systems by infiltrating the first layer of safety, the following layer was not breached, and the protected health information of its patients was not undermined. Even so, the attack led to interruption to certain medical facilities at both hospitals. Patients walking into the emergency room might still be processed and cured, but the hospitals were unable to Read More

30,000 Patients Affected by May Eye Care Center Ransomware Attack

December 8, 2018

Nov 16, 2018   A July 2018 ransomware attack on May Eye Care Center in Hanover, PA saw a variety of confidential patient information encrypted, including data in its electronic medical record system. The ransomware attack was found by May Eye Care on July 29, 2018. The ransomware was downloaded on a server that had patients’ names, treatment information, clinical information, diagnoses, insurance information, dates of birth, addresses, and a limited number of Social Security numbers. May Eye Care Center called in a prominent computer forensics firm to probe the breach and an IT firm that concentrates in data safety was hired to carry out a complete examination of safety systems and procedures. Safety has now been improved to avoid Read More

Cofense Searches the Status of Phishing Protections in 2018

November 29, 2018

October 20, 2018   The anti-phishing solution supplier Cofense has issued its 2018 Status of Phishing Protection report. The report provides insights into the most usual phishing electronic mails being used by cybercriminals and the message topics that are most effective at deceiving workers into clicking and disclosing secret information. The report also breaks down phishing attacks by industry sector and demonstrates which industries are most vulnerable to phishing attacks. In addition to describing the most effective phishing electronic mails, Cofense also offers anti-phishing guidelines and proposes best practices that must be adopted to make phishing simulation exercises and safety consciousness training more effective. To put together the report, Cofense examined the reactions to 135 million phishing electronic mail replications Read More

KnowBe4 Starts ‘Domain Doppelgänger’ Bogus Domain Identification Tool

November 29, 2018

October 3, 2018   A new tool has been announced by the safety consciousness training and phishing simulation platform supplier KnowBe4 that can assist firms to identify ‘evil twin domains’ – lookalike deceived domains that are usually used by cybercriminals for phishing and spreading malware. An evil twin domain is very similar to a real website that is used by a firm. It might contain an additional letter such as faceboook.com, have lost letters such as welsfargo.com, contain altered letters such as faecbook.com to catch out uncaring typists, or use substitute TLDs such as a.co.uk or .ca in place of a .com. Evil twin domains are exceptionally common.  A study carried out by Farsight Security between Oct. 17, 2017 and Read More

CloudHealth Platform Updates Provide Additional Help for Azure Users

November 29, 2018

September 27, 2018   Microsoft is making up ground on AWS. Income from the Microsoft Azure platform soared 98% in the infrastructure-as-a-service (IaaS) market in 2017, surpassing the market growth of AWS. In order to better meet customer requirements and to cater to the surge in adoption of Microsoft Azure, CloudHealth Technologies, the prominent cloud management platform supplier, has increased its Azure capabilities with the latest updates to its cloud management platform. “If managed properly, Azure will accelerate your business,” said Joe Kinsella, CTO, and Founder of CloudHealth Technologies. “CloudHealth removes the ‘if’ by enabling clients to travel with confidence, simplify decision making, increase efficiency, and centralize control. The improved characteristics for Microsoft Azure users include assistance for Azure Reserved Read More

Cofense Looks Closely at Healthcare Phishing Attacks

November 29, 2018

September 26, 2018   Cofense, the prominent supplier of human-based phishing threat management solutions, has issued new research that demonstrates the healthcare industry lags behind other industry sectors for phishing protections and is consistently attacked by cybercriminals who often succeed in gaining access to secret patient health data. The Division of Health and Human Services’ Office for Civil Rights issues a synopsis of data breaches informed by healthcare companies that have involved over 500 records. Each week, many electronic mail breaches are registered on the portal. The Cofense report examines deeper into these attacks and demonstrates that a third of all data breaches happen at healthcare companies. There are several instances of how simple phishing attacks have led to attackers Read More

Microsoft Office Under Probe Big GDPR Breach

November 29, 2018

November 17, 2018   Dutch investigators are carrying out an inquiry after claims that Microsoft Office is in breach of the European Union General Data Protection Regulations in relation to the data the software has been collecting including the content of confidential electronic mails. Those studying the alleged breach in the Netherlands have disclosed, during their search of Microsoft Office, that they exposed large-scale collection of private data. It is believed that users had not been informed that this was happening and had not provided official approval. A Microsoft spokesman said: “We are dedicated to our customers’ secrecy, putting them in control of their data and making sure that Office ProPlus and other Microsoft products and facilities abide by GDPR and Read More

WordPress GDPR Compliance Tool Fault Leads to Data Secrecy Breach

November 29, 2018

November 15, 2018   The operators of content Management platform WordPress have released an advisory advising users to refresh the WP GDPR Compliance plug-in as soon as possible because of a fault in the software resulting in a possible secrecy breach. The plug-in in question, unluckily, was developed to help website proprietors are compliant with all General Data Protection Regulation, the new EU data secrecy law. WP GDPR Compliance was found to be a serious weakness that lets illegal users gain access to the back end of websites. It is even possible for illegal people to get access and set up administrator user privileges, letting them to return and to the back end of the website at a later date. Read More

UK-Based Secrecy Protection Group Focuses on GDPR Breaches by US Companies

November 29, 2018

November 10, 2018   Privacy International, a UK-based listed charity that protects and promotes the right to secrecy throughout the world, last week filed a number of grievances against US-based Businesses to European based Data Protection bodies regarding supposed breaches of the General Data Protection Regulation. The General Data Protection Regulation was launched by the European Union on May 25 this year in an attempt to safeguard the confidential information of all people within the European Union and to protect all data exported outside of the EU. It necessitates all firms, groups, and organizations administering data like this to fulfill a particular requirement or else they, the businesses, will be found as breaching the law. The fines for GDPR violations are excessive, going as high Read More

Facebook Facing GDPR Inquiry over Audience Targeting Ways

November 29, 2018

November 8, 2018   Facebook is confronting the anger of the European Union’s General Data Protection Regulation (GDPR) once again after a complaint made by the UK Information Commissioner Office (ICO) to the Irish Data Protection Commission (DPC) in relations to the social media titan’s user targeting methods. Facebook has come in for heavy denunciation in recent weeks after a number of news reporters showed how easy it was to post bogus ads that appear to be funded/financed by real politicians. Other reports included targeting people with tremendously traditional opinions and views. The Irish Data Protection Commission is the pertinent body to probe the complaint as the Facebook European head office is based in Dublin. Communications representative for the DPC Read More

Key Dental Group Warns Patients About Possible HIPAA Violation

November 29, 2018

November 28, 2018   Florida-based Key Dental Group has made contact with its patients about a doubted HIPAA breach which might have resulted in the illegal disclosure of their protected health information (PHI). After altered its electronic medical record (EMR) database supplier, Key Dental Group asked its earlier provider, MOGO, the return its EMR database. Although the end user license agreement (EULA) said that all patient data should be delivered over on cessation of the contract, MOGO has not returned the database. MOGO suggested to Key Dental Group, through its lawyer, that the database would not be handed over. The Pembroke Pines dental practice asserts that together with breaching the EULA, MOGO, as a HIPAA business associate, is in violation of Read More

Reports: Ransomware Attacks Increase as Healthcare Sector is Heaviest Hit

November 29, 2018

November 7, 2018   As per the latest Beazley’s Q3 Breach Insights Report, Cyber Criminal campaigns attacks are rising again and healthcare is the most targeted sector. Ransomware attacks on healthcare groups comprised 37% of those managed by Beazley Breach Response (BBR) Services. This figure is more than three times the number of attacks faced by Professional facilities, the second most targeted industry with 11%. Other cybersecurity firms including Kaspersky Lab, McAfee, and Malwarebytes have all issued reports in 2018 that show ransomware attacks are decreasing; nevertheless, Beazley’s figures show that monthly rises in attacks happened in August and September, with double the number of attacks in September compared to August. The report emphasizes a clear tendency in cyberattacks involving Read More

Medtronic Implantable Cardiac Device Programmers Subjected to FDA Problems Warning Concerning Faults

November 29, 2018

October 24, 2018   The U.S. Food and Drug Administration (FDA) has issued a warning about faults in certain Medtronic implantable cardiac appliance programmers which might possibly be targeted by hackers to change the functionality of the programmer during inserting or follow up visits. About 34,000 susceptible programmers are presently active. The programmers are used by doctors to collect performance data, to check the status of the battery, and to reset Medtronic cardiac implantable electrophysiology devices (CIEDs) including pacemakers, cardiac resynchronization devices, implantable defibrillators, and insertable cardiac monitors. The faults are present in Medtronic CareLink 2090 and CareLink Encore 29901 programmers, especially how the appliances transmit to the Medtronic Software Distribution Network (SDN) online. The link is essential to download Read More

BSI Study: One in Six European Businesses Unready for GDPR Breach

November 28, 2018

October 20, 2018   The British Standards Institution (BSI) has announced the results of a study which demonstrate that one in six European businesses is not adequately ready to face the danger of a data breach. This is mainly worrying as the European Union’s General Data Protection Regulation (GDPR) turned into enforceable on May 25 this year. According to the new GDPR rule businesses face penalties of €20m or 4 percent of yearly international revenue, whichever figure is higher. BSI Group is the federal standards body, of the UK, which generates technical standards on a wide variety of products and services including accreditation and standards-related facilities to companies. The report demonstrated that 73 percent of groups who took part in the BSI research was ‘worried Read More

AMIA Requires Greater Alignment of Federal Data Secrecy Laws

November 28, 2018

November 22, 2018   The American Medical Informatics Association (AMIA) is requesting for the Trump Administration to tighten up data secrecy laws through better alignment of HIPAA and the Common Law and adoption of a more integrated approach to secrecy that includes both the healthcare sector as well as consumer sector. The call follows a request for remark by the NTIA to start a talk concerning consumer secrecy. In a letter to the National Telecommunications and Information Administration (NTIA), a branch of the Division of Commerce, AMIA clarified that its remarks are informed by the wide experience of dealing with both the Health Insurance Portability and Accountability Act and the Central Protections for Human Subjects Research (Common Rule). Presently, there is a Read More

Do HIPAA Laws Create Blockades That Avoid Information Sharing?

November 28, 2018

November 21, 2018   The HHS has prepared a Request for Information (RFI) to find out how HIPAA Laws are obstructing patient information sharing and are making it tough for healthcare suppliers to organize patient care. HHS desires remarks from the public and healthcare industry sponsors on any provisions of HIPAA Laws which are discouraging or restraining organized care and case management among hospitals, doctors, patients, and payers. The RFI is part of a new initiative, called Regulatory Sprint to Coordinated Care, the purpose of which is to get rid of barricades that are avoiding healthcare companies from sharing patient information while retaining safeguards to make sure patient and data secrecy are safeguarded. The remarks received through the RFI will Read More

OCR Starts Campaign to Increase Consciousness of Civil Rights Protections for Patients Being Treated for Opioid Use Disorder

November 28, 2018

October 31, 2018   On October 26, 2017, President Donald Trump announced the opioid disaster a national public health disaster. The one-year anniversary of that announcement has seen a new opioid bill initialed into law. On October 24, 2018, President Donald Trump added his signature to the Substance Use–Disorder Prevention that Encourages Opioid Recovery and Treatment for Patients and Communities Act – or “SUPPORT for Patients and Communities Act” for short. The Act will assist reinforce the government’s reaction to the opioid disaster, improve access to addiction treatment facilities, and increase data sharing in instances of opioid misuse. There have been calls for modifications to be made to 42 CFR Part 2 to align the law with the HIPAA Secrecy Read More

Aetna Resolves HIPAA Violation Case with State AGs

November 28, 2018

October 17, 2018   In 2017, mistakes occurred with two Aetna mailings that led to the impermissible revelation of the protected health information of plan members, including HIV conditions and AFib analyses. A class action court case was filed on behalf of the sufferers of the HIV status breach which was resolved for $17 million in January. Now Aetna has reached resolutions with the attorneys general for New Jersey, Connecticut, and the District of Columbia to settle the supposed HIPAA violations exposed during an inquiry into the secrecy breaches. The first mailing was transmitted on July 28, 2017 by an Aetna business associate. Over-sized windowed covers were used for the posting, through which it was probable to see the names Read More

53% Of Healthcare Data Breaches Because of Insiders and Carelessness

November 27, 2018

November 27, 2018   The healthcare industry has had more than its reasonable share of hacking occurrences, however, the biggest threat comes from within. The actions of healthcare suppliers, health underwriters, and their workers cause more breaches than hacks, malware, and ransomware attacks. Scientists at Michigan State University and Johns Hopkins University studied data breaches reported to the Division of Health and Human Services’ Office for Civil Rights (OCR) over the past 7 years and observed that over half of breaches were the result of internal carelessness. The research study, which was lately printed in the journal JAMA Internal Medicine, is a follow-on from a 2017 study that explored the danger of hospital data breaches and the kinds of hospitals that were most Read More

Stolen FHN Healthcare Laptop Had the PHI of 4,458 Patients

November 27, 2018

November 26, 2018   FHN Healthcare, which manages FHN Memorial Hospital in Freeport, IL, and a network of family healthcare complexes all over northwest Illinois, has learned that a laptop computer having the protected health information of 4,458 patients has been stolen from the automobile of a worker. The theft was instantly reported to law enforcement, but the appliance has not been recovered. FHN Healthcare recreated the data saved on the appliance and found it contained names, medical information, health insurance information, medical record numbers, birth dates, addresses, Social Security numbers, and driver’s license numbers. FHN healthcare already encrypts all its laptop computers, even though the inquiry into the occurrence disclosed that the stolen appliance had not been encrypted and Read More

Main Dental Group Warns Patients About Possible HIPAA Violation

November 27, 2018

November 25, 2018   Key Dental Group, a dental practice in Pembroke Pines, FL, is notifying its patients concerning a suspected HIPAA violation which has the possibility to result in the illegal retrieving of their protected health information (PHI). After altering its electronic medical record (EMR) database supplier, Key Dental Group requested its past supplier, MOGO, to return its EMR database. Although the end user license agreement (EULA) stated that all patient data should be returned on termination of the agreement, MOGO has declined to return the database. MOGO communicated to Key Dental Group, through its lawyer, that the database would not be returned. The Pembroke Pines dental practice claims that in addition to violating the EULA, MOGO, as a Read More

October 2018 Healthcare Data Breach Statement

November 26, 2018

November 24, 2018   Our October 2018 healthcare data breach report demonstrates there has been a month-over-month rise in healthcare data breaches with October seeing more than one healthcare data breach informed per day. 31 healthcare data breaches were informed by HIPAA-covered units and their business associates in October – 6 incidents more than the preceding month. It should be noted that one breach at a business associate was reported to OCR as three separate breaches. The number of breached records in September (134,006) was the lowest total for 6 months, however, the downward tendency didn’t carry on in October. There was a huge surge in disclosed protected health information (PHI) in October. 2,109,730 records were exposed, stolen or impermissibly Read More

Email Hacking Incident Informed by Episcopal Health Facilities

November 26, 2018

November 23, 2018   Specified existing and previous patients of St. John’s Episcopal Hospital and Episcopal Health Facilities in New York are being informed that some of their protected health information has possibly been compromised. On September 18, 2018, Episcopal Health Facilities became conscious of doubtful activity in several worker electronic mail accounts. An inquiry was instantly launched, and a third-party digital forensics company was called in to decide the nature and scope of the breach. The inquiry exposed many worker electronic mail accounts had been compromised between August 28, 2018 and October 5, 2018. A detailed examination of the compromised electronic mail accounts was finished on November 1. The kinds of information exposed varied from patient to patient but Read More

128,400 Workers and Patients Impacted by Phishing Attack on Albany Cancer Cure Center

November 26, 2018

November 22, 2018   New York Oncology Hematology in Albany, NY, has declared that hackers have gained access to 15 worker electronic mail accounts which had the confidential information of as many as 128,400 existing and former patients and workers. As is usual in phishing attacks, the electronic mails had a hyperlink to an apparently genuine electronic mail login page which requested usernames and passwords. When the information was submitted it was harvested by the attackers. As per the alternate breach notice on the New York Oncology Hematology website, each compromised electronic mail account only remained accessible for a brief period of time before access was ended. The electronic mail breaches were identified by New York Oncology Hematology’s IT seller, Read More

APT28 Group Uses New Cannon Trojan in Spear Phishing Campaign Targeting US and EU Government Organizations

November 26, 2018

November 24, 2018   A new spear-phishing campaign is being carried out by the AP28 (Sofacy Group/Fancy Bear/Sednit) on government agencies in the United States, Europe, and a former USSR state using the earlier unidentified Cannon Trojan. The campaign was noticed by Palo Alto Networks’ Unit 42 team and was first known in late October. The campaign is being carried out through spam electronic mail and uses weaponized Word document to deliver two malware variations. The first, the Zebrocy Trojan, has been used by APT28 in earlier campaigns and was first identified in 2015. The main purpose of the Zebrocy Trojan is to provide access to an appliance and establish a link with a C2 server. It serves as a Read More

TA505 APT Group Dispersing tRat Malware in New Spam Campaigns

November 26, 2018

November 23, 2018   The abounding APT group TA505 is carrying out spam electronic mail campaigns dispersing a new, modular malware variation called tRAT. tRAT malware is a distant access Trojan capable of downloading extra modules. Besides adding infected users to a botnet, the danger actors have the option of vending access to various elements of the malware to other danger groups for use in different attacks. Threat scientists at Proofpoint interrupted two separate electronic mail campaigns dispersing tRAT malware this fall, one of which was a typical spam electronic mail campaign using social engineering methods to get electronic mail receivers to open an attached Word document and allow macros. Allowing macros caused the download of the tRAT payload. One Read More

Vital AMP for WP Plugin Weakness Allows Any User to Gain Admin Rights

November 26, 2018

November 22, 2018   A recent critical WordPress plugin weakness has been recognized that might let site users increase rights to admin level, providing them the capability to add custom code to a weak website or upload malware. The weakness is in the AMP for WP plugin, a trendy plugin that changes standard WordPress posts into the Google Accelerated Mobile Pages format to improve load speeds on mobile browsers. The plugin has over 100,000 active users. Although the plugin was expected to carry out checks to decide whether a particular user is allowed to carry out certain administrative jobs, inadequate checks were carried out to confirm the existing user’s account permissions. As a consequence, any user, including a user listed Read More

Phishing Accounts for 50% of All Scam Attacks

November 25, 2018

November 17, 2018   An analysis of existing cyber fraud dangers by network safety company RSA demonstrates that phishing attacks have risen by 70% since Q2 and now account for 50% of all scam attacks experienced by companies. Phishing attacks are trendy since they are easy to carry out and have a high success ratio. An attacker can set up a webpage that imitates a famous brand such as Google or Microsoft that requests login particulars. Electronic mails are then transmitted having hyperlinks to the site together with a valid reason for clicking. As per a research carried out by Verizon, 12% of users click hyperlinks in phishing electronic mails. RSA notes that the bulk of phishing attacks are carried Read More

Microsoft Patches 12 Vital Weaknesses on November Patch Tuesday

November 25, 2018

November 16, 2018   Microsoft has released patches for 12 critical weaknesses in November Patch Tuesday and has repaired a fault that is being actively abused by at least one threat group. Altogether, 64 weaknesses have been repaired across Windows, Edge, IE, and other Microsoft products. The 12 critical weaknesses might allow hackers to execute a malevolent code and take complete control of a weak appliance. The bulk of the critical weaknesses are in the Chakra Scripting Engine, which accounts for 8 of the 12 critical faults. CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557, and CVE-2018-8588, are all memory corruption weaknesses regarding how the Chakra Scripting Engine manages things in the memory in Microsoft Edge. All eight weaknesses might be Read More

WordPress GDPR Compliance Plugin Weakness Being Actively Exploited

November 25, 2018

November 14, 2018   Websites with the WordPress GDPR Compliance plugin connected are being hijacked by hackers. A weakness in the plugin is being abused, letting attackers change site settings and register new user accounts with admin rights. The weakness can be distantly abused by unauthenticated users, several of whom have automated abuse of the weakness to capture as many sites as possible before the weakness is rectified. The fault was recognized by safety scientists at Defiant, who noted that in a number of attacks, after abusing the fault the attackers have rectified the weakness. Defiant’s scientists propose that this method makes sure other hackers are avoided from hijacking compromised sites. In some instances, after access to a weak site Read More

APT28 Group Utilizes New Cannon Trojan in Spear Phishing Campaign Targeting US and EU Government Organizations

November 25, 2018

November 25, 2018   A new spear phishing campaign is being carried out by the AP28 (Sofacy Group/Fancy Bear/Sednit) on government companies in the United States, Europe, and a former USSR state using the earlier unidentified Cannon Trojan. The campaign was noticed by Palo Alto Networks’ Unit 42 team and was first recognized in late October. The campaign is being carried out through spam electronic mail and uses weaponized Word document to supply two malware variations. The first, the Zebrocy Trojan, has been utilized by APT28 in earlier campaigns and was first identified in 2015. The main objective of the Zebrocy Trojan is to provide access to an appliance and establish a link with a C2 server. It works as Read More

Gmail Weakness Allows Phishing Emails to Be Transmitted Anonymously

November 25, 2018

November 24, 2018   A Gmail weakness has been found that lets electronic mails to be transmitted anonymously with no information contained in the sender field. The weakness might easily be abused by cybercriminals for use in phishing attacks. Phishers often hide the sender of an electronic mail in phishing campaigns to deceive the receiver into believing the electronic mail is genuine. The sender’s electronic mail address can be deceived so the shown name seems to be a known contact or well-known organization. Nevertheless, if there is no information in the from field, several end users might be deceived into thinking the electronic mail has come from a genuine source. The weakness was found by software developer Tim Cotton. It Read More

Increase in Phishing Emails Using .Com File Extensions

November 25, 2018

November 23, 2018   The anti-phishing solution supplier Cofense, formerly PhishMe, has informed a noticeable rise in phishing campaigns utilizing files with the .com extension. The .com extension is utilized for text files with executable bytecode. The code can be performed on Microsoft NT-kernel-based and DOS operating systems. The campaigns recognized through Cofense Intelligence are mainly being transmitted to financial facility divisions and are utilized to download a range of malevolent payloads including the Loki Bot, Pony, and AZORult information stealers and the Hawkeye keylogger. Some of the electronic mails in the campaigns clarify the user must open a .iso file attached to the electronic mail to see information linked to the electronic mail notification. The .iso file contains the Read More

Phishing Accounts for 50% of All Scam Attacks

November 25, 2018

November 17, 2018   A study of existing cyber scam dangers by network safety company RSA demonstrates that phishing attacks have risen by 70% since Q2 and now account for 50% of all scam attacks experienced by companies. Phishing attacks are trendy since they are easy to carry out and have a high success rate. An attacker can set up a webpage that imitates a famous brand such as Microsoft or Google that demands login particulars. Electronic mails are then transmitted containing hyperlinks to the site together with a valid reason for clicking. As per a research carried out by Verizon, 12% of users click hyperlinks in phishing electronic mails. RSA notes that the bulk of phishing attacks are carried Read More

Cofense Increases 24/7 Global Phishing Defense Facilities

November 25, 2018

November 2, 2018   Cofense has declared that it has increased its 24/7 Phishing Defense Facility to deliver even greater help to clients beyond business hours and make sure that phishing dangers are recognized in the shortest possible time. The Cofense Phishing Defense Center (PDC) was introduced to ease the load on IT safety teams by letting them unload some of the load of searching through electronic mails informed by their end users and analyzing those electronic mails to recognize the actual threats. When workers report doubtful electronic mails – through Cofense Reporter for example – the electronic mails are transmitted to Cofense Triage for scrutiny. The malware and danger experts in the Cofense PDC team carry out an in-depth Read More

U.S. Treasury Probing $700,000 Loss to Phishing Scam

November 25, 2018

November 1, 2018   In July 2018, the Washington D.C. government fell for an electronic mail cheat that led to wire transfers totaling approximately $700,000 being sent to a scammer’s account. The scammer mimicked a seller used by the city and demanded unsettled bills for construction work be paid. The seller had been hired to work on a design and build the project on a permanent supportive lodging facility. The electronic mails demanded the payment method be altered from check to bank transfer, and particulars of a Bank of America account was specified where the payments needed to be directed. Three separate payments were made adding up $690,912.75. The account details provided were for an account managed by the scammer. Read More

75% of Workers Lack Security Consciousness

November 25, 2018

October 30, 2018   MediaPro has published its 2018 State of Secrecy and Safety Consciousness Report which evaluates the level of safety consciousness of workers across various industry sectors. The report is based on the replies to surveys sent to 1,024 workers throughout the United States that investigated their knowledge of real-world dangers and safety best practices. This is the third year that MediaPro has carried out the survey, which classifies respondents in one of three groups –Risk, Novice, or Hero – based on their knowledge of safety dangers and understanding of best practices that will keep them and their company secure. In 2016, when the survey was first carried out, 16% of respondents rated a risk, 72% were rated beginners, and Read More

United States Steers the World as Key Host of Malware C2 Infrastructure

November 25, 2018

October 29, 2018   The United States is home to the maximum proportion of malware command and control (C2) infrastructure – 35% of the international total, as per fresh research circulated by phishing defense and threat intelligence company Cofense.  27% of network Indicators of Compromise (IoCs) from phishing-borne malware are also either situated in or proxied through the United States. Cofense data indicate that Russia is in the second position with 11%, followed by the Netherlands and Germany with 5% each and Canada with 3%. C2 infrastructure is utilized by hackers to communicate with malware-infected hosts and deliver orders, download new malware modules, and exfiltrate data. Cofense clarified that simply because the C2 infrastructure is hosted in the United States Read More

Stealthy sLoad Downloader Executes Extensive Investigation to Improve Quality of Infected Hosts

November 24, 2018

October 28, 2018   A new PowerShell downloader has been found – the sLoad downloader – which is being utilized in silent, highly targeted attacks in the UK and Italy. The sLoad downloader executes a wide variety of tests to find out a lot of information regarding the system on which it lives, before picking the most suitable malevolent payload to install – if a payload is installed at all. The sLoad downloader was first known in May 2018 when it was mainly being utilized to download the Ramnit banking Trojan, even though more lately it has been providing a much wider variety of malevolent payloads including DarkVNC, PsiBot, Ursnif, and Gootkit, as per safety scientists at Proofpoint who have Read More

Brands Most Usually Spoofed by Phishers Exposed

November 24, 2018

October 27, 2018   Vade Secure has issued a new report describing the brands most usually targeted by phishers in North America. The Phishers’ Favorites Top 25 list discloses the most usually spoofed brands in phishing electronic mails found in Q3, 2018. For the latest report, Vade Security followed 86 brands and rated them based on the number of phishing attacks in which they were mimicked. Those 86 brands account for 95% of all brands deceiving attacks in Q3, 2018. Vade Secure notices that there has been a 20.4% rise in phishing attacks in Q3. As was the case the preceding quarter, Microsoft is the most targeted brand. Phishers are trying to gain access to Azure, Office 365, and OneDrive Read More

30,000 Patients Impacted by May Eye Care Complex Ransomware Attack

November 24, 2018

November 16, 2018   A July 2018 ransomware attack on May Eye Care Center in Hanover, PA saw a variety of confidential patient information encrypted, including data in its electronic medical record system. The ransomware attack was detected by May Eye Care on July 29, 2018. The ransomware was downloaded on a server that had patients’ names, treatment information, diagnoses, insurance information, dates of birth, addresses, clinical information, and a restricted number of Social Security numbers. May Eye Care Center called in a prominent computer forensics firm to probe the breach and an IT firm that specializes in data safety was hired to carry out a complete review of safety systems and procedures. Safety has now been improved to avoid Read More

Healthcare Companies Account for a Quarter of SamSam Ransomware Attacks

November 24, 2018

November 7, 2018   The threat actors behind SamSam ransomware have been very active this year and most of the attacks have been carried out in the United States. Out of the 67 companies that the group is known to have attacked, 56 were on companies based in the United States, as per a recent analysis by cybersecurity company Symantec. The attacks have been carried out on a wide variety of organizations and businesses, although the healthcare industry has been widely targeted. Healthcare businesses account for 24% of the group’s ransomware attacks. It is unclear why healthcare businesses are accounted for so many attacks. Symantec proposes that it might be because of healthcare businesses being easier to attack than other Read More

Ransomware Attacks Rise: Healthcare Industry Most Heavily Targeted

November 23, 2018

November 4, 2018   Ransomware attacks are on the increase once more and healthcare is the most targeted industry, as per the lately issued Beazley’s Q3 Breach Insights Statement. 37% of ransomware attacks handled by Beazley Breach Response (BBR) Facilities affected healthcare companies – more than three times the number of attacks as the second most targeted industry: Professional services (11%). Kaspersky Lab, McAfee, and Malwarebytes have all issued reports in 2018 that indicate ransomware attacks are in decline; nevertheless, Beazley’s figures demonstrate monthly rises in attacks in August and September, with twice the number of attacks in September compared to the preceding month. It is too early to state if this is just a blip or if attacks will Read More

Ransomware Attack Impacts 16,000 National Ambulatory Hernia Institution Patients

November 23, 2018

October 24, 2018   On September 13, 2018, the National Ambulatory Hernia Institute in California suffered a ransomware attack that led to certain files on its system being encrypted. As per the breach notice uploaded to the healthcare provider’s website, the attackers were possibly capable to gain access to demographic data of patients recorded before July 19, 2018. Altogether, 15,974 patients have had some of their protected health information (PHI) disclosed as a consequence of the attack. The information possibly retrieved by the attackers was restricted to names, diagnoses, birth dates, addresses, appointment dates and times, and Social Security numbers. Patients who visited National Ambulatory Hernia Institute services for the first time after July 19, 2018 were unaffected by the Read More

Fetal Diagnostic Institute of the Pacific Suffers Ransomware Attack

November 23, 2018

September 19, 2018   The Fetal Diagnostic Institute of the Pacific (FDIP) in Honolulu, HI, suffered a ransomware attack on June 30, 2018. File-encrypting software was fitted on an FDIP server and encrypted a wide variety of file types, including patient medical records. FDIP hired the services of a prominent cybersecurity business to carry out a complete inquiry into the breach to decide whether patient data was retrieved by the attackers and also to help with breach remediation. The inquiry didn’t disclose any proof to indicate that patients’ protected health information (PHI) was retrieved, seen, or stolen by the people behind the attack, even though it wasn’t possible to exclude data access and data theft with a high level of Read More

Central Colorado Dermatology Ransomware Attack Possibly Led to PHI Access

November 23, 2018

August 23, 2018   Central Colorado Dermatology (CCD) has informed over 4,000 patients that some of their protected health information (PHI) has possibly been retrieved by hackers during a ransomware attack on its computer system. An illegal person gained access to CCD’s computer system and deployed ransomware on a server. Medical files and patients’ medical charts were not retrieved, even though certain files and scanned fax communications were encrypted. Some of those files had PHI. An inquiry was initiated to decide whether protected health information was retrieved or stolen even though it was not possible to decide with a high level of confidence whether any PHI was seen or copied. CCD didn’t disclose any proof to indicate that PHI had Read More

Golden Heart Administrative Experts Ransomware Attack Impacts 44,600 Patients

November 22, 2018

Jul 22, 2018   Golden Heart Administrative Professionals, a Fairbanks, AK-based billing firm and business associate of a number of healthcare suppliers in Alaska, is informing 44,600 people that some of their protected health information (PHI) has possibly been retrieved by illegal people as a consequence of a recent ransomware attack. The ransomware was downloaded to a server having the PHI of patients. As per a press release issued by the firm, “All client patient information must be assumed to be compromised.” Local and central law enforcement organizations have been informed concerning the cyberattack and attempts are continuing to regain files. The Golden Heart Administrative Experts ransomware attack is the biggest data breach informed by a healthcare business in July, Read More

ICANN Appeals Latest Decision of German Courts to Ban it Collecting Private Information

October 26, 2018

August 30, 2018   ICANN has pleaded the most recent decision made versus it in the Appellate Court of Cologne. The organization has contended that the German legal body has made an error in ruling that they had not “adequately explained,” nor given a “reliable reason” for requesting a restriction against German domain registrar, EPAG. This is the third successive time that ICANN has been unsuccessful in a legal attempt to compel EPAG to collect additional private information on anybody that registers a domain name. EPAG asserts that this requirement is in violation to GDPR secrecy law and, therefore, thinks that it would be breaking the EU law by completing this action. ICANN contradicts this, asserting that the law insists is Read More

AI-Assisted Virtual Safety Analyst Added to Ironscales’ Innovative Threat Protection Platform

October 26, 2018

August 4, 2018   Ironscales, the Tel Aviv-based anti-phishing solution supplier, has declared it has included a latest module into its innovative danger safety platform that assists safety teams evaluate doubtful incoming electronic mails more rapidly to decide whether they are benevolent or malevolent. When electronic mail dangers are informed to safety teams they should manually analyze the electronic mails to find the actual dangers concealed among the wrong positives. That procedure takes time and can lead to a delay in dealing with the gravest dangers. The new module acts as an AI helped virtual safety expert and automatically performs evaluations of doubtful incoming electronic mails in real time. The AI system has been trained to perform the same assessments Read More

Industry First Safety Consciousness Practitioner Certification Offered by InfoSec Institute

October 26, 2018

August 12, 2018   Safety consciousness training for workers is now a crucial part of any cybersecurity plan, yet until lately there was no certification program available to confirm expertise in the creation and administration of these crucial training plans. The InfoSec Institute has tackled this difficulty with the start of a boot camp. The boot camp offers necessary training in this area and verifies that IT experts have the required skills and knowledge to generate effective safety consciousness training plans and are capable of maintaining enterprise safety consciousness education programs that are effective at altering end users’ behavior. It is one thing to provide training for the staff to eliminate dangerous behaviors, teach workers the skills required to recognize Read More

Cofense Included in 2018 Inc. 5000 List of Fastest Rising Businesses for 4th Successive Year

October 26, 2018

August 19, 2018   Each year, Inc. Magazine collects and publishes the Inc. 5000 list of the fastest expanding privately owned small businesses in the United States – the most active part of the U.S economy. The firms in the 2018 Inc. 5000 list collectively made over $206.2 billion in income in 2017 with the top firm – SwanLeap – recording an astounding 3-year development rate of 75,661%. Even number 5,000 – Pedigree Technologies – recorded three-year expansion of 57%. For the fourth successive year, Cofense – the prominent human-driven anti-phishing solution supplier – has been incorporated on the list after recording remarkable cumulative three-year expansion of 429%. That was sufficient to get the Leesburg, VA-based firm position 1,145 in Read More

1 2 3 8