Threats to healthcare organisations up by nearly two-thirds
Attacks against healthcare organisations have risen by nearly two-thirds (60 percent) in the first three quarters of 2019 compared with all of 2018, according to a new report.
The results of Malwarebytes’ latest report, "CTNT Q3 2019: The State of Healthcare Cyber-security", showed that the healthcare industry has been overwhelmingly targeted by trojan malware during the last year, which increased by 82 percent in Q3 2019 over the previous quarter. The two most dangerous Trojans of 2018–2019 for all industries, Emotet and TrickBot, were the two primary culprits.
It also found that Emotet detections surged at the beginning of 2019, followed by a wave of TrickBot detections in the second half of the year, becoming the number one threat to healthcare today.
The report also found that endpoint detections have grown 45 per cent from 14,000 healthcare-facing endpoint detections in Q2 2019 to more than 20,000 in Q3. Trojans, hijackers and riskware each surged by over 80 per cent from Q2 2019 to Q3.
Ageing infrastructure, low IT budgets and a wealth of personally identifiable information (PII) data make healthcare institutions prime targets for cyber-criminals, said the report.
Adam Kujawa, director of Malwarebytes Labs, said that the picture in the UK is broadly similar to the US, except with very few Emotet infections.
"Trickbot appears to have had a small campaign in March of 2019 but, by September 1, it’s totally gone from any detections," he told SC Media.
"There has been a surge of exploit activity throughout the year. It did seem to dip during the summer and then rose again in the fall, which is similar to what we’ve seen globally from Emotet. However, we’ve seen very little of that baddie for this particular country and industry since April 2019. Our medical industry customers in the UK often get hit with exploit attempts, although I can’t really pinpoint what malware family is causing that," he added.
SentinelOne’s senior director, SE, EMEA & APAC, Patrice Puichaud, told SC Media UK that vulnerabilities in software are key vectors for hackers looking to steal medical data, so patching software on a regular basis is vital.
"Unpatched and misconfigured systems represent a massive weak spot in security, representing 80 per cent of the corporate attack surface. Automating the process of patching OS and 3rd-party software vulnerabilities is, therefore, essential. Alongside this, organisations should have an action plan (disaster recovery), even if specific circumstances prevent organisations from following it exactly. The plan can help guide and structure responses when time is critical," he said.
Rick McElroy, a cyber-security strategist at VMware Carbon Black, told SC Media UK that healthcare organisations are increasingly being targeted by cyber-attacks due to the gold mine of personal data they possess. Without a doubt, the NHS generates swathes of data that has the potential, if in the wrong hands, to have devastating consequences, putting individuals and NHS Trusts at risk.
"With the growing sophistication of attacks, our primary recommendation for CISOs in the healthcare industry is to increase endpoint visibility. CISOs need to look at any connected asset as a potential target, which includes electronic medical-record systems, medical devices, payment processing systems, and more," he said.
"Organisations must also establish protection from emerging attacks. With the potential attack surface growing and evolving quickly, you need to stop as much as possible. This means leveraging a variety of technologies from whitelisting to streaming analytics to behavioural prevention."
Industry: Cyber Security
- Security Analyst. End User. UK. Flexible location
CH7863 Security Analyst. End User £60,000 Security Analyst needed to monitor and manage a security suite of tools within an End User environment. The Security Analyst will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-
- Head of Penetration Testing
- United Kingdom
Head of Penetration Testing needed to join a security consultancy that are delivering client facing penetration testing services around Web app and Infrastructure. Looking for someone hands on that is able to manage a highly skilled technical team of testers. 50-60% of the time is expected to be hands on, other duties will include, but not be limited to; leading and managing the day to day running of the team, mentoring, team upskill, recruitment, reporting, escalation, process improvement etc. Flexible location although south east is preferred. Anyone with Check / CREST experience is highly desirable. MUST be able to achieve SC clearance. UK based role. All details kept in confidence.
- CONTRACT SOC Manager. London / Birmingham. URGENT Immediate role.
REF7847 Contract SOC Manager. SC cleared, London / Birmingham. Initial 3 month Contract. SOC Manager needed to for an URGENT 3-4 month CONTRACT. SC clearance is essential. The project is to aid in the setup, implementation and management of resources to help with the initial stand up stages of a new SOC within a greenfield site. This is a short term contract role whilst a permanent hire is brought on over the coming 3 to 4 months. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- SPLUNK Level 3 SOC Consultant, SIEM Splunk, London / Birmingham
REF CH7825 Level 3 SOC Consultant, SIEM Splunk, London / Birmingham £55,000 + Level 3 SOC Consultant, SIEM SPLUNK needed. Security Clearance. Permanent role Level 3 SOC Consultant, SIEM SPLUNK needed to join a public sector client. The ability to achieve SC clearance is essential. MUST have experience working with SPLUNK ideally to an Advanced Power User level. Splunk Enterprise Security (ES) knowledge and hands on experience highly desirable. The role will include, but not be limited to; managing and handling incidents end to end, supporting and mentoring level 1 / level 2 staff, supporting the SOC manager in the delivery of the SOC roadmap, engaging with the client stakeholders (other technical teams) as and where needed, use case development, advanced search and reporting etc. The individual MUST currently be living in the UK and be able to achieve UK security clearance. (SC) This is a permanent role To arrange a call with Chris Holt use this calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-remote-soc-role Chris.Holt@dclsearch.com