How Cybercrime Affects The Healthcare Industry

The Healthcare industry has featured in the top 5 industries attacked by cyber criminals for a number of years now.  

The recent WannaCry ransomware attack across the globe that affected many health trusts across England and Scotland has brought the health impact of the cyber threat to the forefront of media and political debate in the run up to the 2017 General Election. So why would anyone want to attack healthcare and what are the threats?  

2016 was a very difficult year for healthcare when it came to cyber-attacks and developing cyber threats.  According to the TrapX Security 2016 Healthcare Cyber Breach Research report, “the nature of the threat continues to diversify into a greater variety of complex attacks promoted by sophisticated and persistent human attackers. 

These attacks against hospitals and medical organisations are still driven by the lucrative economic rewards for organised crime. Medical records are among the most complete set of records available and, hence, are in demand for a variety of reasons.

In October 2016, Ben Gummer, now the ex-Minister for the Cabinet Office and Paymaster General warned that the NHS was at risk of cyber-attacks, saying that “hacking is "no longer the stuff of spy thrillers and action movies" but a clear and present threat and large quantities of sensitive data held by the NHS and the Government is being targeted by hackers.”

In January 2017 Barts Health Trust warn its staff that the trust’s four hospitals in East London: The Royal London, St Bartholomew’s, Whipps Cross and Newham were experiencing a “ransomware virus attack.”  This came after similar attacks on Northern Lincolnshire and Goole Foundation trust in the previous October.

A recent report on the Deep Web black market for electronic health records (EHRs) by researchers affiliated with the Institute for Critical Infrastructure Technology pointed out that “healthcare systems are relentlessly and incessantly attacked by different types of attackers.”

One of the reasons that medical networks remain vulnerable is that many legacy systems and devices lack the ability to be updated and patched, yet are connected to networks.  Or the updating of systems, often via patches provided free from operating system vendors, is not seen as a priority by senior managers and something “IT are responsible for”. It therefore doesn’t matter if the newer devices are completely up to date as the organisation’s “Internet of Medical Things (IoMT)” becomes vulnerable to its weakest link.

Medical records, especially but not exclusively in the USA, by dint of their comprehensive nature, sell for hundreds of dollars on the Dark Web and there is no shortage of them.  

According to the IB Times last year, a hacker claimed to have broken into multiple healthcare databases across America and listed a fresh trove of 9.2m records on a Dark Web based marketplace for 750 Bitcoin (£368,000). The vendor, using the pseudonym 'The Dark Overlord', claims the plaintext 2GB database includes names, addresses, emails, phone numbers, date of births and Social Security Numbers (SSNs) belonging to 9,278,352 Americans.

However, for those compromised, many don’t realise that their records can be sold repeatedly by the criminal networks operating in the Dark Web and that this could cause long term problems.

Information that is contained in medical records can be used for many different types of identity fraud and phishing attacks and because of its comprehensive nature, the threat from these can persist for many years.

In the UK, the attack vector seems to be different to the USA and attacks are mainly via ransomware. Trying to extort money from vulnerable hospital trusts rather than individuals.   NHS hospital trusts in England reported 55 cyber-attacks in 2016, according to data obtained by the BBC from NHS Digital, who oversees cyber security.

The WannaCry attack has blown this statistic away and will put a spotlight on cyber security across healthcare in the UK. As the attack unfolded, Eugene Kaspersky from Kaspersky Labs said that it, “looks like a cyberattack of a criminal nature but with a global impact that's very close to terrorism.”  Kaspersky continue to help Europol to try and track the perpetrators.

Until now, NHS Digital reported a steady increase in reporting but were quick to point out that this increase didn’t necessarily mean an increased number of attacks, just better awareness and they didn’t believe any patient records had been compromised.  Oliver Farnan, from the Oxford Cyber Security Centre, said ransomware attacks had become more common and 'The risk is going to increase'; how right he has been.

Advising on the threat to the NHS in the UK falls to CareCERT who have been analysing threat intelligence and broadcasting relevant, focused advisories to health and care organisations since October 2015, with partners in industry and using links across the public sector, including the NCSC, CERT-UK, CESG and CPNI.

With this emerging threat potentially affecting all our health, what better place to gain a clearer understanding of how to counter it, than at the UK Security Expo at the end of November 2017

UKSecurityExpo:

You Migt Also Read:

What Healthcare CISOs Should Know:

Healthcare Starts Spending Big On Cybersecurity:

Stolen Health Records Flooding Dark Web Markets:

British NHS Hospital Trust Under Cyber Attack:

 

« Cambodia’s Cyber War Room
Stephen Fry: Facebook Classed as Publishers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard prevents confidential database data theft by Hackers, Rogue Insiders, 3rd Party Cyber Risks, Phishing Email Attacks, Dev Ops Exploits and SQL Injection Attacks.

Devel

Devel

Devel is a LATAM cybersecurity company specialized in providing red, blue and purple team services for the financial sector.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

KrCERT/CC

KrCERT/CC

KrCERT/CC is the National Computer Emergency Response Team in Korea.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Ampere Industrial Security

Ampere Industrial Security

Ampere is an industrial security firm. We specialize in industrial control systems (ICS) and operational technology (OT) security.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.