AMIA and AHIMA Demand Changes to HIPAA to Improve Access and Movability of Health Data

December 14, 2018

Dec 8, 2018   The American Medical Informatics Association (AMIA) and the American Health Information Management Association (AHIMA) have required modifications to HIPAA to be made to improve patients’ access to their health information, make health data more moveable, and to better safeguard health data in the app ecosystem. At a Wednesday, December 5, 2018, Capitol Hill briefing gathering, named “Unlocking Patient Data – Pulling the Linchpin of Data Exchange and Patient Empowerment,” leaders from AMIA and AHIMA met other industry specialists in a conversation about the effect federal policies are having on the capability of patients to access and use their health information. Presently, users have access to their private information and add and use that information to reserve Read More

EmblemHealth Pays $100,000 HIPAA Violation Fine to New Jersey for 2016 Data Breach

December 14, 2018

Dec 13, 2018   The health insurance provider EmblemHealth has been penalized $100,000 by New Jersey for a 2016 data breach that disclosed the protected health information (PHI) of over 6,000 New Jersey plan members. On October 3, 2016, EmblemHealth dispatched Medicare Part D Prescription Drug Plan Proof of Coverage documents to its members. The mailing labels contained beneficiary identification codes and Medicare Health Insurance Claim Numbers (HCIN), which mirror Social Security numbers. The documents were dispatched to over 81,000 policy members, 6,443 of whom were New Jersey inhabitants. The New Jersey Division of Consumer Affairs probed the breach and identified policy, procedural, and training breakdowns. Earlier mailings of Evidence of Coverage documents were managed by a trained worker, but Read More

2018 Safety Awareness Training Statistics

December 13, 2018

Dec 14, 2018   A new survey carried out by Mimecast has produced some fascinating safety mindfulness training figures for 2018. The survey indicates many companies are taking substantial risks by not providing sufficient training to their workers on cybersecurity. Question the IT division what is the greatest cybersecurity risk and several will say end users. IT teams put a substantial amount of effort into applying and maintaining cybersecurity defenses, only for workers to take actions that introduce malware or lead to an electronic mail breach. It is understandable that they are frustrated with workers. Most cyberattacks begin with end users. By compromising one appliance, an attacker gains a footing in the network which can be used as a Launchpad Read More

2018 Safety Awareness Training Statistics

December 13, 2018

Dec 14, 2018   A new survey carried out by Mimecast has produced some fascinating safety mindfulness training figures for 2018. The survey indicates many companies are taking substantial risks by not providing sufficient training to their workers on cybersecurity. Question the IT division what is the greatest risk cybersecurity risk and several will say end users. IT teams put a substantial amount of effort into applying and maintaining cybersecurity defences, only for workers to take actions that introduce malware or lead to an electronic mail breach. It is understandable that they are frustrated with workers. Most cyber attacks begin with end users. By compromising one appliance, an attacker gains a footing in the network which can be used as Read More

DHS/FBI Issue Fresh Warning About SamSam Ransomware

December 13, 2018

Dec 12, 2018   In late November, the Division of Justice indicted two Iranians over the use of SamSam ransomware, but there is unlikely to be any slowdown in attacks. Because of the high risk of constant SamSam ransomware attacks in the United States, the Division of Homeland Security (DHS) and FBI have issued a fresh warning to crucial infrastructure companies regarding SamSam ransomware. Up to now, there have been over 200 SamSam ransomware attacks, most of which have been on companies and firms in the United States. The threat actors behind SamSam ransomware have received roughly $6 million in ransom payments and the attacks have led to over $30 million in financial losses from computer system stoppage. The key ways of Read More

Adobe Patches Actively Abused 0-Day Vulnerability in Flash Player

December 13, 2018

Dec 8, 2018   On Wednesday, December 5, 2018, Adobe released an update to rectify a vulnerability in Adobe Flash Player that is being leveraged by a threat group in targeted attacks in Russia. The threat group has previously attacked a healthcare service in Russia that is used by senior civil servants. The vulnerability was recognized by researchers at Gigamon who passed on details of the vulnerability to Adobe in late November. Qihoo 360 scientists lately identified an advanced constant threat campaign that was actively abusing the vulnerability. The vulnerability is being abused using a particularly created Word document which is being dispersed using a spear phishing campaign. The campaign is extremely targeted; however, it is possible that other threat groups might try Read More

Eutelsat Selects TitanHQ to Safeguard its WiFi Networks

December 13, 2018

Nov 11, 2018   The prominent European satellite operator Eutelsat has implemented a new Wi-Fi sieving solution to safeguard its Wi-Fi networks. Eutelsat is among the world’s main satellite operators. The firm has international coverage and offers video, data and broadband facilities in 150 countries all over Europe, Africa, and the Middle East. The firm has bases in 44 countries and hires over 1,000 technical, operational, and commercial experts and its satellite facilities help a big ecosystem of high-tech businesses. Eutelsat has installed Wi-Fi hotspots in its business offices; however, the provision of Wi-Fi hotspots presents safety risks. In order to improve its safety position and safeguard its company and guest Wi-Fi users from online dangers such as malware, ransomware, Read More

Z Services Increases TitanHQ Association to Provide New Cloud-Based Safety Facilities

December 13, 2018

Nov 9, 2018   The Dubai-based managed facility supplier Z Services has increased its association with TitanHQ and is now offering cloud-based web filtering and in-country electronic mail archiving as a facility to clients all over the MENA region. Cybersecurity is a crucial business concern all over the MENA region and businesses are increasingly looking to managed facility suppliers to provide solutions to improve their safety posture. It makes much more intelligence to have cybersecurity as an operational expenditure rather than a capital expenditure, which is achieved through cloud-based facilities instead of appliance-based solutions. Z Services has been increasing its customer base by supplying these solutions to SMEs through ISPs. Z Services increased its cybersecurity facilities earlier this year with Read More

Irish Government Department Probed in Possible GDPR Breach

December 12, 2018

December 7, 2018   In a turn up for the books, the Irish Data Protection Commission (DPC) is being probed for possible General Data Protection Regulation breaches in relation to the body’s data safety officers being prohibited from successfully finishing their work. Article 80 of GDPR states that it is allowable for an individual to appoint a not-for-profit organization acting in the public interest to lodge a grievance with a national watchdog where he or she charges violations of their privileges under the EU rule. Together with this, GDPR also allows not-for-profit organizations to seek “an effective legal solution” on behalf of such complainants, where they think their rights have been infringed. Using Article 80 Digital Rights Ireland, on behalf of technology reporter and Irish Read More

Up to 500 Million People Affected in Marriott International Data Secrecy Breach

December 12, 2018

December 6, 2018   The secret private data of roughly 500 million people has been obtained in a hacking attack on Marriott International as per a statement filed with US watchdogs by the hotel chain previous Friday, December 1, which might also have General Data Protection Regulation implications in the EU. The data secrecy breach was originally revealed on Marriott International databases around September 10 on its guests’ database. It is supposed that it might impact records going back as far as 2014. Marriott International is the parent company of a group of hotel chains including W, Westin, Le Méridien and Sheraton. A public announcement by the President and Chief Executive of Marriott International said: “We deeply bemoan this incident occurred. Read More

GDPR-like Law to be Drafted by the US Senate in early 2019

December 12, 2018

December 1, 2018   A United States Senate subcommittee has disclosed that it is working on a draft of a GDPR-style law for the United States. Senators Richard Blumenthal (Democrat) and Jerry Moran (Republican) are putting together a two-party bill that would preserve much of the same safeguards in the US that GDPR implements in the EU. Senator Blumenthal, remarking on the latest happenings, said that a system of fines for data breaches is essential. He said: “A much-anticipated bill that might provide the U.S. government the capability to collect civil fines if a firm abuses consumer data on the internet or lets it to be stolen could be prepared early next year. I have been working with Senator Moran on Read More

Google Confronting Numerous GDPR Complaints because of Location Tracking

December 12, 2018

November 29, 2018   A group of European Union-based consumer regulators has submitted data secrecy compliant, under the new General Data Protection Regulation, against Google in the belief that the firm is using ways to note web users’ places for ad-targeting campaigns which are violating the data secrecy law. As per GDPR rules data processing approval should be provided by the individual in a way which is precise, informed and freely provided. The group thinks that this, in relation to Google is not the case. The group started the GDPR grievance after an inquiry by the Associated Press found that a number of Google facilities running on Android and Apple appliances determine the user’s place and save it although the user Read More

Instagram GDPR Tool Discloses Subscriber Passwords

December 12, 2018

November 24, 2018   A warning has been issued by Instagram that a number of users of the social media platform have had their password details disclosed by a safety leak. Unluckily, this breach happened because of a fault in the ‘Download Your Data’ instrument that Instagram added to the platform to permit users to download a copy of their own data. Instagram delivered these users their passwords in plain text. This aspect was applied in April in order to make sure compliance with the EU General Data Protection legislation which became enforceable on May 25 this year. The instrument was developed because of secrecy concerns in the aftermath of Facebook’s Cambridge Analytica scandal. The disclosed passwords were also saved on Read More

UK ICO Laws Washington Post Cookie Approval is not GDPR Compliant

December 12, 2018

Nov 22, 2018 The United Kingdom’s Information Commissioner’s Office (ICO) has found that the Washington Post online subscription alternatives are not in compliance with the EU’s General Data Protection Regulation (GDPR). The online subscription alternatives are not subjected to GDPR, nevertheless, ICO might issue it with a reprimand. The Washington Post makes three separate subscription stages available, however, only the highest level lets users the alternatives of turning off tracking cookies. Tying this “approval” to access has elevated the eyebrows of secrecy activists earlier, who have asked whether this meets the requirements for approval set out in EU data safety rules. According to GDPR rule, Washington Post must have proposed subscribers a free substitute to accept cookies. The ICO case manager studying the case Read More

Marriott Announces 500 Million-Record Breach of Starwood Hotel Guests’ Files

December 11, 2018

Nov Dec 2, 2018   The Marriott hotel chain has announced it has suffered a massive data breach that has resulted in the theft of the personal information of up to 500 million guests of the Starwood Hotels and Resorts group. Marriott discovered the data breach on September 8, 2018, after an alert was generated by its internal security system following an attempt by an unauthorized individual to access the Starwood guest reservation database. Third-party computer forensics experts were called in to assist with the investigation, which confirmed that to the Starwood network was first gained in 2014. It is currently unclear how the hacker breached security defenses and gained access to the network. The hacker had encrypted data on Read More

49% of All Phishing Sites Have SSL Credentials and Show Green Padlock

December 11, 2018

Dec 1, 2018   Nearly half of the phishing sites now have SSL credentials, begin with HTTPS, and show the green lock to display the sites are safe, as per new research by PhishLabs. The number of phishing websites that have SSL credentials has been rising gradually since Q3, 2016 when about 5% of phishing websites were showing the green lock to show a safe connection. The proportion increased to roughly 25% of all phishing sites by this time last year, and by the end of Q1, 2018, 35% of phishing websites had SSL credentials. At the end of Q3, 2018, the proportion had risen to 49%. It is no shock that so many phishers have chosen to change to Read More

Main Malvertising Campaign Identified: 300 Million Browser Sessions Hijacked in 48 Hours

December 11, 2018

Nov 30, 2018   The main malvertising campaign is being conducted that is redirecting web users to phishing and scam websites. While malvertising campaigns are nothing new, this one stands out due to the scale of the campaign. In 48 hours, more than 300 million users have had their browsers redirected to malicious web pages. The campaign was uncovered by researchers at cybersecurity firm Confiant on November 12. The researchers note that the actor behind this campaign has been tracked and was found to have been conducting campaigns continuously since August; however, the latest campaign is on a totally different scale. Previously, the scammer has conducted much smaller campaigns not involving tier 1 publishers. The campaign is targeting mobile iOS Read More

APT28 Group Uses New Cannon Trojan in Spear Phishing Campaign Targeting US and EU Government Organizations

December 11, 2018

Nov 24, 2018   A new spear-phishing campaign is being carried out by the AP28 (Sofacy Group/Fancy Bear/Sednit) on government agencies in the United States, Europe, and a former USSR state using the earlier unidentified Cannon Trojan. The campaign was noticed by Palo Alto Networks’ Unit 42 team and was first known in late October. The campaign is being carried out through spam electronic mail and uses weaponized Word document to deliver two malware variations. The first, the Zebrocy Trojan, has been used by APT28 in earlier campaigns and was first identified in 2015. The main purpose of the Zebrocy Trojan is to provide access to an appliance and establish a link with a C2 server. It serves as a Read More

Vital AMP for WP Plugin Vulnerability Allows Any User to Gain Admin Rights

December 11, 2018

Nov 23, 2018   A recent critical WordPress plugin vulnerability has been recognized that might let site users increase rights to admin level, providing them the capability to add custom code to a vulnerable website or upload malware. The vulnerability is in the AMP for WP plugin, a trendy plugin that changes standard WordPress posts into the Google Accelerated Mobile Pages format to improve load speeds on mobile browsers. The plugin has over 100,000 active users. Although the plugin was expected to carry out checks to decide whether a particular user is allowed to carry out certain administrative jobs, inadequate checks were carried out to confirm the existing user’s account permissions. As a consequence, any user, including a user listed on Read More

TA505 APT Group Dispersing tRat Malware in New Fraud Campaigns

December 11, 2018

November 22, 2018   The abounding APT group TA505 is carrying out fraud electronic mail campaigns dispersing a new, modular malware variation called tRAT. tRAT malware is a distant access Trojan capable of downloading extra modules. Besides adding infected users to a botnet, the danger actors have the option of vending access to various elements of the malware to other danger groups for use in different attacks. Threat scientists at Proofpoint interrupted two separate electronic mail campaigns dispersing tRAT malware this fall, one of which was a typical fraud electronic mail campaign using social engineering methods to get electronic mail receivers to open an attached Word document and allow macros. Allowing macros caused the download of the tRAT payload. One Read More

12 State Attorneys General File HIPAA Breach Complaint Versus Medical Informatics Engineering

December 11, 2018

Dec 7, 2018   A multi-state federal litigation has been filed versus Medical Informatics Engineering and NoMoreClipboard over the 2015 data breach that displayed the data of 3.9 million people. Indiana Attorney General Curtis Hill is heading the litigation and 11 other states are partaking – Arizona, Nebraska, Minnesota, Louisiana, Kentucky, Kansas, Iowa, Florida, Arkansas, North Carolina, and Wisconsin. This is the first time that state attorneys general have combined forces in a central litigation over a data breach caused by violations of the Health Insurance Portability and Accountability Act. The litigation seeks a financial verdict, civil fines, and the adoption of a remedial action plan to tackle all compliance failures. A Failure to Implement Sufficient Security Controls The complaint Read More

OCR Penalizes Florida Contractor Doctors’ Group $500,000 for Several HIPAA Compliance Failures

December 11, 2018

Dec 6, 2018   An HHS’ Office for Civil Rights (OCR) inquiry into an impermissible revelation of PHI by a business associate of a HIPAA-covered entity revealed grave HIPAA compliance failures. Advanced Care Hospitalists (ACH) is a Lakeland, FL-based contractor doctors’ group that supplies internal medicine doctors to nursing homes and hospitals in West Florida. ACH falls under the description of a HIPAA-covered unit and is required to abide by the HIPAA Secrecy, Safety, and Breach Notification Laws. ACH serves roughly 20,000 patients a year and hired between 39 and 46 staff members per year during the time frame under inquiry. Between November 2011 and June 2012, ACH hired the services of a person who declared to be a representative Read More

OCR Penalizes Allergy Practice $125,000 for Impermissible PHI Disclosure

December 11, 2018

Nov 28, 2018   The Division of Health and Human Services’ Office for Civil Rights (OCR) has penalized a Hartford allergy practice $125,000 over suspected violations of the HIPAA Secrecy Law. On October 6, 2015, OCR got a copy of a civil rights grievance that had been filed with the Department of Justice (DOJ). The plaintiff suspected Allergy Associates of Hartford – A Connecticut healthcare supplier that specializes in treating patients with allergies – had impermissibly divulged her protected health information to a TV correspondent. The plaintiff had earlier got in touch with a local TV station after she had been turned away from the allergy practice due to her service animal. The TV correspondent subsequently contacted the practice requesting Read More

October 2018 Healthcare Data Breach Statement

December 11, 2018

Nov 23, 2018   Our October 2018 healthcare data breach report demonstrates there has been a month-over-month rise in healthcare data breaches with October seeing more than one healthcare data breach reported daily. 31 healthcare data breaches were informed by HIPAA-covered units and their business partners in October – 6 occurrences more than the preceding month. It must be noted that one breach at a business associate was informed to OCR as three separate breaches. The number of breached records in September (134,006) was the lowest total for 6 months, however, the descending tendency didn’t continue in October. There was a huge rise in disclosed protected health information (PHI) in October. 2,109,730 records were disclosed, stolen or impermissibly disclosed – Read More

2.65 Million Atrium Health Patients Affected by Business Associate Data Breach

December 10, 2018

Dec 1, 2018   AccuDoc Solutions Inc., a supplier of healthcare billing facilities, has suffered a main data breach in which the protected health information of 2,650,000 patients of Atrium Health was disclosed. Morrisville, NC-based AccuDoc Solutions makes bills for patients and manages the online payment system used by Atrium Health, a network of 44 hospitals all over North Carolina, South Carolina, and Georgia. On October 1, 2018, AccuDoc Solutions informed Atrium Health that a few of its databases had been undermined. The breach inquiry disclosed hackers had gained access to AccuDoc Solutions databases between September 22 and September 29, 2018. A wide-ranging forensic inquiry into the attack verified that patient information had been undermined, but the information saved in its Read More

UPMC Data Breach Trial Reinstated by Pennsylvania Supreme Court

December 10, 2018

Nov 30, 2018   Litigation filed by workers affected by a data breach at the University of Pennsylvania Medical Center (UPMC) has been revitalized by the Pennsylvania Supreme Court. The litigation was filed after hackers stole the information of roughly 62,000 current and former UPMC workers in a data breach noticed by UPMC in February 2014. The stolen information included names, tax information, Social Security numbers, addresses, and bank account numbers. The information was used to file fake tax returns in workers’ names to get tax refunds. According to the charge, “As a consequence of UPMC’s negligence, workers incurred damages relating to falsely filed tax returns and are at an increased and impending risk of becoming sufferers of identity theft Read More

HealthCare.gov Data Breach Disclosed Confidential Information of 94,000 People

December 10, 2018

Nov 17, 2018   Last month, the Centers for Medicare & Medicaid Services (CMS) declared that the HealthCare.gov website had been hacked and the confidential data of roughly 75,000 people had possibly been compromised. This week, the CMS released an update on the breach verifying more people had been affected than was originally thought. The revised estimation has seen the number of breach sufferers increased to 93,689. The original breach declaration was light on details concerning the precise nature of the breach and the kinds of information that had possibly been compromised. In the original announcement, the CMS clarified that doubtful activity was noticed on the site on October 13 and on October 16 a breach was verified. Steps were Read More

Altus Hospital Baytown Experiences Dharma Ransomware Attack

December 10, 2018

November 12, 2018   Altus Hospital in Baytown, TX, has suffered a ransomware attack that led to the encryption of several hospital files. The electronic medical record system was unaffected, even though some of the encrypted files had patients’ protected health information (PHI) including names, credit card information, Social Security numbers, birth dates, contact telephone numbers, home addresses, driver’s license numbers, and medical information. The attack was found on September 3, 2018. Altus Hospital received a ransom demand; nevertheless, helped by a third-party safety advisor, Altus Hospital was able to restore all affected files from backups. The investigator decided that the attacker gained access to the hospital’s servers prior to deploying a Dharma ransomware variation. Altus Hospital thinks the purpose Read More

Billing Files of 12,331 Patients of Inova Health System Have Been Compromised

December 10, 2018

November 11, 2018   Falls Church, VA-based Inova Health System has begun informing 12,331 patients that some of their protected health information (PHI) has been retrieved by an illegal person. Inova Health System was communicated by law enforcement on September 5, 2018 over a supposed breach of patients’ billing information. A prominent computer forensics company was hired to carry out an inquiry into the breach to decide the type of the attack and the level of the breach. The inquiry disclosed its billing system was first retrieved by an illegal person in January 2017, and once again between July and October 2017. Access was gained using the login identifications of an Inova worker. Peculiarly, Inova also informed that the same Read More

Q3 Healthcare Data Breach Report: 4.39 Million Records Disclosed in 117 Breaches

December 10, 2018

November 10, 2018   The latest part of the Breach Barometer Report from Protenus demonstrates there was a three-monthly reduction in the number of healthcare data breaches compared to Q2, 2018; nevertheless, the number of healthcare files exposed, thieved or impermissibly disclosed rose in Q3. In each quarter of 2018, the number of healthcare files exposed in data breaches has increased. Between January and March 1,129,744 healthcare files were disclosed in 110 breaches. Between April and June, 3,143,642 files were disclosed in 142 breaches, and 4,390,512 healthcare files were disclosed, thieved, or impermissibly exposed between July and September in 117 breaches. The biggest healthcare data breach in Q3 was informed by the Iowa Health System UnityPoint Health. The breach was Read More

566,217 Clients of Chicago-Based Health Underwriter Impacted by Data Breach

December 10, 2018

November 9, 2018   The Chicago-based health underwriter Bankers Life, a branch of CNO Financial Group Inc., has found hackers gained access to its systems and possibly thieved the private information of over half a million people. Bankers Life offers a variety of insurance facilities to clients, including life insurance, long-term care insurance, health insurance, and Medicare additional insurance and is the biggest branch of CNO Financial Group. Hackers initially gained access to its systems between May 30 and September 13, 2018. Bankers Life said it found the breach on August 7, 2018. The hackers gained access to a variety of sensitive personal information of a ‘limited number’ of its workers. A ‘limited group’ of clients had names, diagnoses, medication Read More

Stolen Raley’s Pharmacy Laptop Might Have Contained PHI of 10,000 Patients

December 10, 2018

November 1, 2018   Roughly 10,000 patients of Raley’s Pharmacy are being informed that some of their protected health information (PHI) has possibly been compromised. On September 24, 2018, a laptop computer was stolen from a Raley’s drugstore that might have contained some patients’ PHI. Raley’s pharmacy instantly started an inquiry to decide what information was saved on the appliance. Interviews were carried out with staff members who had used the appliance in an attempt to know the kinds of content that might have been disclosed. The electronic mail accounts of workers were also checked for attachments and links to documents that had ePHI, to decide which records had been downloaded or were saved in cache files in a provisional Read More

Adobe Patches Actively Abused 0-Day Vulnerability in Flash Player

December 9, 2018

Dec 8, 2018   On Wednesday, December 5, 2018, Adobe released an update to rectify a vulnerability in Adobe Flash Player that is being leveraged by a threat group in targeted attacks in Russia. The threat group has previously attacked a healthcare service in Russia that is used by senior civil servants. The vulnerability was identified by researchers at Gigamon who passed on details of the vulnerability to Adobe in late November. Qihoo 360 scientists lately identified an advanced constant threat campaign that was actively abusing the vulnerability. The vulnerability is being abused using a particularly created Word document which is being dispersed using a spear phishing campaign. The campaign is extremely targeted; however, it is possible that other threat Read More

Phishing Accounts for 50% of All Fraud Attacks

December 9, 2018

November 17, 2018   A study of existing cyber fraud dangers by network safety company RSA demonstrates that phishing attacks have risen by 70% since Q2 and now account for 50% of all fraud attacks experienced by companies. Phishing attacks are trendy since they are easy to carry out and have a high success rate. An attacker can set up a webpage that imitates a famous brand such as Microsoft or Google that demands login particulars. Electronic mails are then transmitted containing hyperlinks to the site together with a valid reason for clicking. As per a research carried out by Verizon, 12% of users click hyperlinks in phishing electronic mails. RSA notes that the bulk of phishing attacks are carried Read More

Marriott Announces 500 Million-Record Breach of Starwood Hotel Guests’ Data

December 9, 2018

Dec 2, 2018   The Marriott hotel chain has announced it has experienced a huge data breach that has led to the theft of the private information of up to 500 million visitors of the Starwood Hotels and Resorts group. Marriott found the data breach on September 8, 2018, after an alert was generated by its internal safety system after an attempt by an illegal person to access the Starwood visitor reservation database. Third-party computer forensics specialists were called in to help with the probe, which verified that the Starwood network was first gained in 2014. It is presently unclear how the hacker breached safety fortifications and gained access to the network. The hacker had encrypted data on the network Read More

49% of All Phishing Sites Have SSL Credentials and Show Green Padlock

December 9, 2018

Dec 1, 2018   Nearly half of the phishing sites now have SSL credentials, begin with HTTPS, and show the green lock to display the sites are safe, as per new research by PhishLabs. The number of phishing websites that have SSL credentials has been rising gradually since Q3, 2016 when about 5% of phishing websites were showing the green lock to show a safe connection. The proportion increased to roughly 25% of all phishing sites by this time last year, and by the end of Q1, 2018, 35% of phishing websites had SSL credentials. At the end of Q3, 2018, the proportion had risen to 49%. It is no shock that so many phishers have chosen to change to Read More

Main Malvertising Campaign Identified: 300 Million Browser Sessions Hijacked in 48 Hours

December 9, 2018

Nov 30, 2018   A major malvertising campaign is being carried out that is redirecting web users to phishing and cheat websites. Although malvertising campaigns are nothing new, this one stands out because of the size of the campaign. In 48 hours, over 300 million users have had their browsers redirected to malevolent web pages. The campaign was found by scientists at a cybersecurity company Confiant on November 12. The scientists noted that the actor behind this campaign had been trailed and was found to have been carrying out campaigns continuously since August; nevertheless, the latest campaign is on a completely different level. Earlier, the scammer had carried out much smaller campaigns not involving level 1 publishers. The campaign is Read More

Spotify Phishing Cheat Noticed: User Accounts Breached

December 9, 2018

Dec 3, 2018   Scientists at AppRiver have noticed a Spotify phishing cheat that tries to get users to disclose their Spotify identifications. The electronic mails use brand imaging that makes the electronic mails seem to have been transmitted by the music streaming facility. The emails are genuine, even though there are indications that the messages are not genuine. The electronic mail template used in the Spotify phishing cheat asserts the user requires to verify their account details to get rid of limitations and make sure they can carry on to use their account. The messages contain the Spotify symbol and contact information in the footer. The electronic mails have a link that account holders are requested to click to Read More

Marriott Annonces 500 Million-Record Breach of Starwood Hotel Guests’ Data

December 9, 2018

Dec 2, 2018   The Marriott hotel chain has announced it has experienced a huge data breach that has led to the theft of the private information of up to 500 million visitors of the Starwood Hotels and Resorts group. Marriott found the data breach on September 8, 2018, after a warning was generated by its internal safety system after an attempt by an illegal person to access the Starwood visitor reservation database. Third-party computer forensics specialists were called in to help with the probe, which verified that the access to Starwood network was first gained in 2014. It is presently unclear how the hacker breached safety fortifications and gained access to the network. The hacker had encrypted data on Read More

49% of All Phishing Sites Have SSL Credentials and Show Green Padlock

December 9, 2018

Dec 1, 2018   Nearly half of the phishing sites now have SSL credentials, beginning with HTTPS, and show the green lock to display the sites are safe, as per new research by PhishLabs. The number of phishing websites that have SSL credentials has been rising gradually since Q3, 2016 when about 5% of phishing websites were showing the green lock to show a safe connection. The proportion increased to roughly 25% of all phishing sites by this time last year, and by the end of Q1, 2018, 35% of phishing websites had SSL credentials. At the end of Q3, 2018, the proportion had risen to 49%. It is no shock that so many phishers have chosen to change to Read More

Main Malvertising Campaign Identified: 300 Million Browser Sessions Hijacked in 48 Hours

December 8, 2018

Nov 30, 2018   A major malvertising campaign is being carried out that is redirecting web users to phishing and cheat websites. Although malvertising campaigns are nothing new, this one stands out because of the size of the campaign. In 48 hours, over 300 million users have had their browsers redirected to malevolent web pages. The campaign was found by scientists at a cybersecurity company Confiant on November 12. The scientists noted that the actor behind this campaign had been trailed and was found to have been carrying out campaigns continuously since August; nevertheless, the latest campaign is on a completely different level. Earlier, the scammer had carried out much smaller campaigns not involving level 1 publishers. The campaign is Read More

California Wildfire-Themed BEC Attack Identified

December 8, 2018

Nov 29, 2018   It’s usual for phishers to use natural catastrophes as a lure to get ‘donations’ to line their pouches instead of helping the sufferers and the California wildfires are no exception. A lot of people have lost their lives in the fires and the death toll is likely to increase further as hundreds of people are still unaccounted for. Entire towns such as Paradise have been completely devastated by the wildfires and hundreds of people have lost their homes. Numerous are suffering, have nowhere to reside, and have lost everything. As expected many people desire to donate money to assist the sufferers to rebuild their lives. The attackers are using the sympathy of others to deceive companies. Read More

2,393 Patients of Southwest Washington Regional Surgery Center Affected by Phishing Attack

December 8, 2018

Nov 18, 2018   Southwest Washington Regional Surgery Center in Vancouver, WA, has experienced a phishing attack that has led to the disclosure of 2,393 patients’ protected health information. The breach was restricted to a single electronic mail account and no proof was found to indicate any electronic mails have been accessed or downloaded by the attacker. An extensive inquiry was carried out with help provided by a third-party cybersecurity company. The inquiry finished on September 25. The inquiry included a manual analysis of all electronic mails in the undermined account to recognize patients affected and the kinds of information that might have been undermined. Southwest Washington Regional Surgery Center clarified in its breach notification that the beach was restricted Read More

2,393 Patients of Southwest Washington Regional Surgery Center Affected by Phishing Attack

December 8, 2018

Nov 18, 2018   Southwest Washington Regional Surgery Center in Vancouver, WA, has experienced a phishing attack that has led to the disclosure of 2,393 patients’ protected health information. The breach was restricted to a single electronic mail account and no proof was found to indicate any electronic mails have been accessed or downloaded by the attacker. An extensive inquiry was carried out with help provided by a third-party cybersecurity company. The inquiry finished on September 25. The inquiry included a manual analysis of all electronic mails in the undermined account to recognize patients affected and the kinds of information that might have been undermined. Southwest Washington Regional Surgery Center clarified in its breach notification that the beach was restricted Read More

1,800 Patients’ PHI Undermined in Metrocare Services Phishing Attack

December 8, 2018

Nov 16, 2018   Metrocare Services, the biggest supplier of mental health facilities in North Texas, has experienced a phishing attack that has led to the disclosure of 1,804 patients’ protected health information. Numerous worker electronic mail accounts were undermined in the attack, with the first account breach happening on August 2, 2018. Metrocare didn’t notice the phishing attacks until September 4. As soon as the breach was noticed, measures were taken to safeguard the accounts. Metrocare has also provided its workers with additional training on information safety, additional methods are being launched to improve the safety of its information technology infrastructure, and electronic mail safety has been reinforced. The inquiry into the breach could not decide whether any electronic Read More

Health First Phishing Attack Affects 42,000 Clients

December 8, 2018

Nov 15, 2018   Health First Inc., a four-hospital Florida-based health system, suffered a hacking/IT occurrence earlier this year that was informed to the Division of Health and Human Services’ Office for Civil Rights on October 5. As per the OCR breach summary, 42,000 clients were affected by the breach. Additional information has now been issued on the type of the breach. As per Health First, the electronic mail accounts of several workers were undermined in the phishing attack. The disclosed protected health information was contained in the undermined electronic mail accounts. The electronic medical record system was unchanged by the attack. An inquiry into the breach disclosed the attackers first gained access to worker electronic mail accounts in February Read More

Ransomware Attacks Informed by Healthcare Suppliers in Illinois and Rhode Island

December 8, 2018

Dec 7, 2018   A roundup of latest healthcare ransomware attacks, secrecy breaches, and security incidents that have been publicized in the past few days. Center for Vitreo-Retinal Diseases Ransomware Attack Affects 20,371 Patients The Center for Vitreo-Retinal Diseases in Libertyville, IL, suffered a ransomware attack that led to the encryption of data on its servers. The attack was noticed on September 18, 2018. The inquiry into the breach indicates the attacker might have gained access to the protected health information of 20,371 patients that was saved on the affected servers. The attack seemed to have been carried out with the purpose of extracting money from the practice. Although it is possible that patient information was accessed by the attacker, Read More

Spotify Phishing Scam Exposed: User Accounts Breached

December 8, 2018

Dec 2, 2018   Researchers at AppRiver have noticed a Spotify phishing cheat that tries to get users to disclose their Spotify identifications. The electronic mails use brand imaging that makes the electronic mails seem to have been sent by the music streaming facility. The messages are realistic, even though there are indications that the messages are not genuine. The electronic mail template used in the Spotify phishing scam asserts the user needs to verify their account details to get rid of restrictions and make sure they can carry on to use their account. The messages contain the Spotify logo and contact information in the footer. The electronic mails have a connection that account holders are requested to click to Read More

DOJ Charges Two Iranian Hackers for Part in SamSam Ransomware Attacks

December 8, 2018

Dec 1, 2018   The U.S. Department of Justice has proclaimed substantial progress has been made in the scrutiny of the threat actors behind the SamSam ransomware attacks that have plagued the healthcare industry over a previous couple of years. The DOJ, helped the Royal Canadian Mounted Police, Calgary Police Service, and the UK’s National Crime Agency and West Yorkshire Police, have recognized two Iranians who are supposed to be behind the SamSam ransomware attacks. Both persons – Faramarz Shahi Savandi and Mohammad Mehdi Shah Mansouri – have been working out of Iran since 2016 and have been charged on four allegations: Plan to commit a scam and related computer activity Plan to commit wire fraud Deliberate damage to a Read More

Ransomware Attack Results in Limited Closing of Emergency Rooms at Two Hospitals

December 8, 2018

Nov 30, 2018   Computer systems used by East Ohio Regional Hospital (EORH) in Martins Ferry, OH, and Ohio Valley Medical Center (OVMC) in Wheeling, WV, were taken down over the weekend of 24/25 November as a consequence of a ransomware attack. The ransomware began encrypting files on the evening of Friday, November 23. Though the attackers succeeded in gaining access to some systems by infiltrating the first layer of safety, the following layer was not breached, and the protected health information of its patients was not undermined. Even so, the attack led to interruption to certain medical facilities at both hospitals. Patients walking into the emergency room might still be processed and cured, but the hospitals were unable to Read More

30,000 Patients Affected by May Eye Care Center Ransomware Attack

December 8, 2018

Nov 16, 2018   A July 2018 ransomware attack on May Eye Care Center in Hanover, PA saw a variety of confidential patient information encrypted, including data in its electronic medical record system. The ransomware attack was found by May Eye Care on July 29, 2018. The ransomware was downloaded on a server that had patients’ names, treatment information, clinical information, diagnoses, insurance information, dates of birth, addresses, and a limited number of Social Security numbers. May Eye Care Center called in a prominent computer forensics firm to probe the breach and an IT firm that concentrates in data safety was hired to carry out a complete examination of safety systems and procedures. Safety has now been improved to avoid Read More