Threats to healthcare organisations up by nearly two-thirds
Attacks against healthcare organisations have risen by nearly two-thirds (60 percent) in the first three quarters of 2019 compared with all of 2018, according to a new report.
The results of Malwarebytes’ latest report, "CTNT Q3 2019: The State of Healthcare Cyber-security", showed that the healthcare industry has been overwhelmingly targeted by trojan malware during the last year, which increased by 82 percent in Q3 2019 over the previous quarter. The two most dangerous Trojans of 2018–2019 for all industries, Emotet and TrickBot, were the two primary culprits.
It also found that Emotet detections surged at the beginning of 2019, followed by a wave of TrickBot detections in the second half of the year, becoming the number one threat to healthcare today.
The report also found that endpoint detections have grown 45 per cent from 14,000 healthcare-facing endpoint detections in Q2 2019 to more than 20,000 in Q3. Trojans, hijackers and riskware each surged by over 80 per cent from Q2 2019 to Q3.
Ageing infrastructure, low IT budgets and a wealth of personally identifiable information (PII) data make healthcare institutions prime targets for cyber-criminals, said the report.
Adam Kujawa, director of Malwarebytes Labs, said that the picture in the UK is broadly similar to the US, except with very few Emotet infections.
"Trickbot appears to have had a small campaign in March of 2019 but, by September 1, it’s totally gone from any detections," he told SC Media.
"There has been a surge of exploit activity throughout the year. It did seem to dip during the summer and then rose again in the fall, which is similar to what we’ve seen globally from Emotet. However, we’ve seen very little of that baddie for this particular country and industry since April 2019. Our medical industry customers in the UK often get hit with exploit attempts, although I can’t really pinpoint what malware family is causing that," he added.
SentinelOne’s senior director, SE, EMEA & APAC, Patrice Puichaud, told SC Media UK that vulnerabilities in software are key vectors for hackers looking to steal medical data, so patching software on a regular basis is vital.
"Unpatched and misconfigured systems represent a massive weak spot in security, representing 80 per cent of the corporate attack surface. Automating the process of patching OS and 3rd-party software vulnerabilities is, therefore, essential. Alongside this, organisations should have an action plan (disaster recovery), even if specific circumstances prevent organisations from following it exactly. The plan can help guide and structure responses when time is critical," he said.
Rick McElroy, a cyber-security strategist at VMware Carbon Black, told SC Media UK that healthcare organisations are increasingly being targeted by cyber-attacks due to the gold mine of personal data they possess. Without a doubt, the NHS generates swathes of data that has the potential, if in the wrong hands, to have devastating consequences, putting individuals and NHS Trusts at risk.
"With the growing sophistication of attacks, our primary recommendation for CISOs in the healthcare industry is to increase endpoint visibility. CISOs need to look at any connected asset as a potential target, which includes electronic medical-record systems, medical devices, payment processing systems, and more," he said.
"Organisations must also establish protection from emerging attacks. With the potential attack surface growing and evolving quickly, you need to stop as much as possible. This means leveraging a variety of technologies from whitelisting to streaming analytics to behavioural prevention."
Industry: Cyber Security
- SPLUNK SOC Analyst level 3, London.
SPLUNK SOC Analyst level 3, Must be able to commute to the City of London. Onsite role. Security clearance needed. The SPLUNK SOC Analyst level 3 must have current experience working within a SOC environment with specific experience using a range of tools and techniques to investigate security incidents. Current experience with Splunk is essential. any additional experience Individuals with Elastic Security SIEM are highly desirable. Any of the following certifications are desirable Splunk Phantom certified admin, Splunk Core Certified Power User / Advanced, Splunk Certified Enterprise Security Admin, etc The role will include, but not be limited to working with sophisticated information security tools, investigating security incidents, incident management, technical escalation, process improvement, research into the latest threats, reporting etc The individual MUST currently be living in the UK and be able to achieve UK security clearance. (SC) This is a permanent role To arrange a call with Chris Holt https://calendly.com/chris-holt/arranged-call-with-chris-holt-elastic-siem-engineer-soc Chris.Holt@dclsearch.com
- ISO 27001 & Business Continuity Security Specialist, End User
- United Kingdom
CH7828 ISO 27001 & Business Continuity Security Specialist, End User, £70,000 United Kingdom ISO 27001 & Business Continuity Security Specialist needed to join a Cyber team within an end user. The ISO 27001 & Business Continuity Security Specialist will have end to end responsibility for the information security and Business Continuity management system. ISMS/BCMS. Both from an information security and technical security perspective working alongside the CISO. Experience must include, but not be limited to; a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling to achieve compliance. ISO 22301, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. Experience taking a company through accreditation is highly desirable Experience managing internal stakeholders, technical teams and external third parties essential Flexible working, very occasional travel to London office This is an exclusive role to DCL Search & Selection. Looking to interview immediately. https://calendly.com/chris-holt/iso-27001-business-continuity-security-specialis
- PCI- DSS Security Consultant, End User
PCI- DSS Security Consultant needed to join a Cyber team within an end user. The PCI- DSS Security Consultant will have end to end responsibility for PCI - DSS and its continuing certification. Both from an information security and technical security perspective working alongside the CISO. Experience must include, but not be limited to; a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling to achieve compliance. PCI objectives / 12 key requirements, OWASP top 10, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. PCI Cloud compliance, specifically someone with experience taking PCI-DSS from on premise into the cloud is HIGHLY desired. However, someone with Solid PCI experience with a strong technical background which include Cyber / Secure by design etc would be considered. Experience managing internal stakeholders and external third parties essential. Flexible working, but with the ability to get into London. This is an exclusive role to DCL Search & Selection. 1st stage interviews to happen the week of the 14th September Arrange a call with Chris on https://calendly.com/chris-holt/arrange-a-call-chris-dcl-pci-compliance
- IAM Contractor CyberArk
Identity & Access Management Architect Contractor Flexible • Extensive PAM / IAM experience required, • MUST have CyberArk and or Beyondtrust. Privileged access management • Technical review, recommendation, design and hands on technical delivery. • 6 month contract Arrange a call with Chris Holt https://calendly.com/chris-holt/arranged-call-with-chris-holt?month=2020-09