What Can The Healthcare Sector Learn From 2021’s Threat Landscape?

According to a recent study, approximately 30% of the world’s data is currently being generated by the healthcare sector. By 2025, it’s expected that the compound annual growth rate of collected data for healthcare will reach an all-time high of 36%. That means the sector is generating data faster than manufacturing, entertainment, and even financial services. 

As the link between technology and healthcare continues to grow, supercharged by the fallout from the pandemic and the move to digitize everything from appointments and prescriptions to scans and blood tests, it’s little wonder the sector has become a prime target for cybercriminals.

Healthcare institutions have been heavily and repeatedly attacked by organized cybercriminals since the beginning of the pandemic, with hospitals, research facilities and pharmaceutical companies all being targeted due to the high-value, time-sensitive nature of their work. Over the past year we’ve seen a variety of attacks on this sector including:  ransomware, botnets, remote code execution and even DDoS attacks. These threats have been known for some time, with the FBI issuing a notice in 2020, warning organizations in healthcare about increasingly serious DDoS attempts. 

In our 2022 Security Report, we revealed that healthcare experienced an average of 830 cyberattacks every week throughout 2021, a staggering 71% increase on the previous year. This makes it one of the most heavily targeted industries in the world, ahead of utilities, banking and manufacturing. As the sector continues to experiment with IoT solutions - from wearable biometric scanners and automated prescriptions, to MRI machines that act as a welcome mat for hackers - its attack surface area is expanding faster than its security can keep up with.  

A Pandemic Of Cybercrime

As COVID-19 cases spiked around the world, so did attacks on our hardworking healthcare industry. In October 2021, the healthcare system that serves Newfoundland and Labrador in Canada was hit by a devastating ransomware attack that one local expert said was the “worst cyberattack in Canadian history.” Employee and patient data was stolen and thousands of vital appointments, including chemotherapy sessions, were canceled or delayed. In the same month, a crushing ransomware attack was directed at a hospital in the Middle East for the first time, as the Chinese group “DeepBlueMagic” targeted the Hillel Yaffe Medical Center in Israel. The medical center's computers were incapacitated, making the admission and discharge of patients virtually impossible. At the end of the year, the Behavioral Health Group (BHG), which runs more than 80 opioid clinics in the US, fell victim to a cyberattack that disrupted its entire network for more than a week. Prescriptions couldn’t be retrieved, so patients had to go without potentially life-saving medication. While BHG didn't reveal the cause of the incident, most experts agree it was likely a ransomware attack. 

More recently, in January 2022, a serious data breach at The Red Cross led to the exposure of half a million vulnerable people’s data. The organization, headquartered in Switzerland, had to shut down computer systems running its Restoring Family Links program, which seeks to reunite families during disasters or periods of conflict. 

What’s InIt For Hackers And Why Now?

The main motivation for threat actors targeting the healthcare sector, from hospitals and clinics to research facilities and charity organizations, appears to be financial. The sheer pressure that hospitals have been under over the past two years to help us deal with - and recover from - the pandemic, has been enormous. The more important the sector’s work, the more tempting the target becomes for threat actors. In June 2020, just months into the pandemic, the University of California’s School of Medicine was targeted and sensitive data was held to ransom, forcing the university to pay more than $1 million USD to carry on its important research. 

The health sector has always been vulnerable to extortion, but the pandemic increased this vulnerability tenfold. In 2020, Check Point Research revealed that the notorious Ryuk ransomware, which had been around since 2018, had changed its focus to specifically target hospitals in order to take advantage of the crisis. 

What Can The Health Sector Learn And How Should It Adapt?

In the vast majority of ransomware cases, the threat isn’t the ransomware itself, but its point of entry onto an organization’s network. Most are deployed through trojan infections, often occurring weeks or even months before an attack even takes place, so it's important that hospitals, clinics and research facilities have anti-ransomware solutions in place. 

The health sector also faces a unique challenge in that it has one of the fastest-growing attack surfaces of any industry. From infusion pumps and patient monitors in hospitals, to take-home biometric devices and even connected wheelchairs, the potential points of entry for threat actors are multiplying year on year. Hospitals and other healthcare environments should therefore be thinking about how to minimize this potential attack surface and reduce risk. The first step toward achieving this is gaining full visibility over every connected device or endpoint, then assigning a risk weighting to each device or category of devices before setting granular security policies that reflect the level of risk. 

At a time when the health sector is at its most vulnerable, it should also be at its most secure. By investing in proactive threat monitoring and detection solutions, clinics, hospitals and research facilities will be able to guard against the rising tide of targeted attacks, giving themselves a clean bill of health for 2022 and beyond. 

Ian Porteous is Regional Director, Security Engineering, UK&I at Check Point Software  

You Might Also Read: 

Inventive Ransomware Group Focused On Healthcare Data:

 

« EU & US Agree New Data Rules To Replace Privacy Shield
Types Of Security Testing Explained With Examples »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.