<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4945852896025945156</id><updated>2026-04-16T21:41:31.761+00:00</updated><category term="Medical Device Security"/><category term="CyberSecurity"/><category term="Healthcare"/><category term="AI"/><category term="Compliance"/><category term="Ransomware"/><category term="Risk Analysis"/><category term="FDA"/><category term="HIoT"/><category term="Health Tourism"/><category term="Healthcare Innovation"/><category term="Healthcare Security"/><category term="ML"/><category term="NHS"/><category term="Privacy"/><category term="Russia"/><category term="Webinar"/><category term="cyberattack"/><category term="Australian Healthcare"/><category term="BioMed"/><category term="CISO"/><category term="China"/><category term="Cisco Security"/><category term="Covid-19"/><category term="Cyberwar"/><category term="DU"/><category term="FBI"/><category term="HIPAA"/><category term="Heartbleed"/><category term="IRM &amp; SaaS"/><category term="Iran"/><category term="LockBit"/><category term="New Zealand Healthcare"/><category term="North Korea"/><category term="OCR"/><category term="OpenSSL"/><category term="Podcast"/><category term="Risk"/><category term="Russian cyber attacks"/><category term="Singapore"/><category term="Third Party Vendor Risk Management"/><category term="University College Denver University"/><category term="WannaCry"/><category term="cyber risk"/><category term="2017 Annual Cybersecurity Report"/><category term="2024"/><category term="A Career in Cybersecurity"/><category term="ACCE"/><category term="APAC HIMSS"/><category term="APT1"/><category term="Aging Populations"/><category term="Al Jazera"/><category term="AlArabyia"/><category term="Albuquerque"/><category term="Annual Cybersecurity Report"/><category term="Anthem Breach"/><category term="Audit Automation"/><category term="Automation"/><category term="BC AWARE"/><category term="Backups"/><category term="Beverly Hills Health IT Summit and Security Forum"/><category term="Biomedical Elephant in the Room"/><category term="Breakfast Show"/><category term="British Columbia"/><category term="Bumrungrad"/><category term="CBS"/><category term="CHIME"/><category term="CHIME Strategy Webinar"/><category term="CIA"/><category term="CII"/><category term="CIO Middle East"/><category term="CNI"/><category term="CNN"/><category term="CTGI"/><category term="California Healthcare Security Forum"/><category term="Canada Healthcare"/><category term="Canada Privacy &amp; Security"/><category term="Canadian Conference on Physician Leadership"/><category term="Change Healthcare"/><category term="China Cyber Espionage"/><category term="Chinese Cyber Espionage and IP theft"/><category term="Cisco"/><category term="Cisco 2016 Annual Security Report"/><category term="Cisco 2016 Midyear Cybersecurity Report"/><category term="Cisco ACR"/><category term="Cisco MCR"/><category term="Clinical Engineering"/><category term="Communicating Security and Risk to the Board"/><category term="Cotswold Radio"/><category term="Critical Infrastructure"/><category term="Cyber &amp; Kinetic war"/><category term="Cyber Terrorism"/><category term="Cyber Wagner"/><category term="Cyber attack &amp; security incident response"/><category term="Cyber-Breach Insurance"/><category term="Cyberattacks"/><category term="Cybercrime White Paper"/><category term="Cybersecurity Investment"/><category term="Cybersecurity Professionals"/><category term="Cybersecurity Risk"/><category term="Cybersecurity as a Strategic Advantage"/><category term="Cybersecurity in a crisis"/><category term="Cybersecurity skills shortage"/><category term="Cyberwarfare"/><category term="DPRK Lazarus Group Crypto Heist"/><category term="DefCon"/><category term="Denver"/><category term="Digital Canary in the Digital Coal Mine"/><category term="Digital Health Rewired 2022"/><category term="Disruptive Technologies"/><category term="Dr. Leanne Field"/><category term="Dubai"/><category term="Dubai &amp; Abu Dhabi Healthcare"/><category term="ER"/><category term="Eurasia HIMSS 19"/><category term="FBS"/><category term="Facebook"/><category term="GA HIMSS Annual Conference 2016"/><category term="GB News"/><category term="GCF"/><category term="GCF Panel"/><category term="GCF25"/><category term="GDPR"/><category term="GRU"/><category term="Gaming"/><category term="Globalization"/><category term="Guest Lecture"/><category term="HHS"/><category term="HHS Cyber Attack"/><category term="HIMSS"/><category term="HIMSS AsiaPac19 Conference"/><category term="HIMSS AsiaPac19 Livestream"/><category term="HIMSS Australia Digital Health  Summit 2019"/><category term="HIMSS Cybersecurity Community"/><category term="HIMSS Healthcare Cybersecurity Community"/><category term="HIMSS Interview"/><category term="HIMSS Security Interview"/><category term="HIMSS Singapore Interview with Bruce Steinberg"/><category term="HIMSS TV Interview"/><category term="HIMSS24 Interview"/><category term="HIMSS26"/><category term="HIPAA Security Rule"/><category term="HIT Summit"/><category term="HITRUST"/><category term="HITSecurity Forum Boston 2017"/><category term="HLTH"/><category term="Hacking"/><category term="Hamas"/><category term="Health IT Value"/><category term="Healthcare Policy"/><category term="Healthcare Security Leader."/><category term="Healthcare providers"/><category term="Hong Kong Healthcare"/><category term="Hong Kong Hospital Authority"/><category term="Hospitals."/><category term="Houston Southwest Security Roadtable"/><category term="IRM"/><category term="ISACA"/><category term="ISE"/><category term="ISO 27001"/><category term="Identity Services Engine"/><category term="Innovation"/><category term="Internet Access in China"/><category term="Its time that businesses remove their dependency on Internet Explorer for good"/><category term="Kiwicon X"/><category term="Legacy hardware and software"/><category term="London"/><category term="Louisville Innovation Summit"/><category term="MAD."/><category term="MGM"/><category term="MHG Live! Denver"/><category term="MSS Denver 2022"/><category term="MSSP"/><category term="Medical Device Failure"/><category term="Medical Device Secuity"/><category term="Medical Devices"/><category term="Medical Tourism"/><category term="Meta"/><category term="NCA"/><category term="NE HIMSS"/><category term="NH-ISAC"/><category term="NHS 111"/><category term="NIST"/><category term="National Cybersecurity Awareness Month"/><category term="Network Enclaving"/><category term="Network Segmentation"/><category term="New Facebook privacy snatch"/><category term="New Zealand"/><category term="New Zealand Ministry of Health"/><category term="Northeast Cybersecurity Forum"/><category term="Not Petya"/><category term="Ohio Information Security Conference"/><category term="Optum"/><category term="Orlando"/><category term="PLA Cyber Troops"/><category term="Panaceas"/><category term="Paris"/><category term="Parkview Medical Center"/><category term="Parlez-Vous Finance?"/><category term="Phillips"/><category term="Policing the Internet"/><category term="Public Health"/><category term="Pueblo Community College"/><category term="Qilin"/><category term="RSA 2018"/><category term="RaaS"/><category term="Ransomware Attack"/><category term="Resiliency"/><category term="Rising Healthcare Demand and Prices."/><category term="Risk Management"/><category term="Rural Health"/><category term="Rural Healthcare"/><category term="Russian"/><category term="Ryuk"/><category term="SOC 2"/><category term="SVR"/><category term="Safety Tips"/><category term="Saudi Arabiya"/><category term="Securing the Healthcare Sector amidst Technological Disruptions"/><category term="Security"/><category term="Security Awareness"/><category term="Security Leadership"/><category term="Security Segmentation"/><category term="Security Vendors"/><category term="Security World 2015"/><category term="Security-as-a-Service"/><category term="Segmentation"/><category term="Smart Health"/><category term="Social Engineering"/><category term="Speaking the same language"/><category term="State sponsored cyberattacks"/><category term="Stephen and Ellie"/><category term="Supply Chains"/><category term="Synnovis"/><category term="TPVRM"/><category term="TV Interview"/><category term="Takedown"/><category term="Tasmania"/><category term="Technology First"/><category term="The New Reality of Securing Healthcare"/><category term="The Segment: A Zero Trust Leadership Podcast"/><category term="Third Parties"/><category term="Third-Party Risk Assessment"/><category term="Threats"/><category term="Trickbot"/><category term="TrustSec"/><category term="UAE"/><category term="UAE Cyber Crime"/><category term="UCOL"/><category term="UHG"/><category term="UK Ambulance Service"/><category term="US healthcare"/><category term="US lags Europe on privacy practices"/><category term="UT Austin"/><category term="Ukraine"/><category term="Under-funding"/><category term="Urgent Care"/><category term="VA HIMSS 17"/><category term="VA HIMSS 18"/><category term="VA HIMSS19"/><category term="VIVE"/><category term="VPNs"/><category term="Vendors"/><category term="Vietnam"/><category term="Vishing"/><category term="Waitlists"/><category term="Wearables"/><category term="as-a service"/><category term="changing role of the CISO"/><category term="cloud"/><category term="cyberdefense"/><category term="eHealth"/><category term="insider threats"/><category term="online gambling"/><category term="patching"/><category term="patient safety"/><category term="security best practices"/><category term="third-party"/><title type='text'>Cyber Thoughts</title><subtitle type='html'>Cybersecurity and Privacy for the Healthcare Life Sciences industry</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.cyberthoughts.org/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>162</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-8079985079408219857</id><published>2026-03-17T00:48:00.007+00:00</published><updated>2026-03-27T17:26:22.761+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Audit Automation"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber-Breach Insurance"/><category scheme="http://www.blogger.com/atom/ns#" term="HIMSS26"/><category scheme="http://www.blogger.com/atom/ns#" term="HITRUST"/><category scheme="http://www.blogger.com/atom/ns#" term="ISO 27001"/><category scheme="http://www.blogger.com/atom/ns#" term="SOC 2"/><category scheme="http://www.blogger.com/atom/ns#" term="Third-Party Risk Assessment"/><title type='text'>Third-Party Risk Assessment </title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyBKYq1bS_hFBlgW32GQAbrYhMTBxEZEmhvwSFeI063QeBUHYN-nGcmqZQTA1rsAHq0LwGgXobyby3K3QjpUeJOPWCarCxYW_0fPDs4hEKstyAkp5cl_59tj66AhOM2_BMiZsxsqSmd-kUDSnH-tPV5pV_m0-2LqJWfmCxG7bxim7-Nb-mVpy-_RX-684U/s3421/Richard%20Sky%20Theatre.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2304&quot; data-original-width=&quot;3421&quot; height=&quot;432&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyBKYq1bS_hFBlgW32GQAbrYhMTBxEZEmhvwSFeI063QeBUHYN-nGcmqZQTA1rsAHq0LwGgXobyby3K3QjpUeJOPWCarCxYW_0fPDs4hEKstyAkp5cl_59tj66AhOM2_BMiZsxsqSmd-kUDSnH-tPV5pV_m0-2LqJWfmCxG7bxim7-Nb-mVpy-_RX-684U/w640-h432/Richard%20Sky%20Theatre.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Photo Credit: Michael Hiskey &lt;/span&gt;&lt;/div&gt; 

&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;i&gt;&#39;Healthcare needs a better third-party risk assessment approach&#39;&lt;/i&gt;&lt;/h3&gt;
This was the message I delivered to the HIMSS Global Conference in Las Vegas March 8th through 12th.

&lt;br /&gt;&lt;br /&gt;

Modern Healthcare has become a &quot;whole village” effort. This includes a growing number of third-party vendors, suppliers and partners, each of which provides specific but highly critical functions across healthcare delivery. When one of these third parties is cyber-attacked the repercussions can be alarmingly broad across multiple providers, and at the same time devastating for both patients and providers.

&lt;br /&gt;&lt;br /&gt;

Just look at the impacts that the Synnovis and Change Healthcare attacks have had on patient morbidity and mortality, let alone the financial impact and disruption to providers of healthcare services. The 2024 ransomware attack by a Russian group Qilin, against UK pathology provider Synnovis, a partnership with two of London&#39;s largest National Health Service (NHS)&amp;nbsp;Trusts,&amp;nbsp;resulted in the death of at least one patient, a measurable impact on many others, and over 120 cases of low-to-moderate harm, according to NHS data. The financial impact of the UHG Change Healthcare attack by Russian group ALPHV / BlackCat&amp;nbsp;forced the cancellation of procedures following pre-authorization failures and many people to go without their pharmaceutical prescription medications for many weeks - some of which were critical to their survival. The outage which affected a third of US health systems, forced many smaller providers to the edge financially, resulted in the closure of care providers and pharmacies, and had an immeasurable (largely unreported) effect on patient morbidity and mortality.

&lt;br /&gt;&lt;br /&gt;

With such broad and devastating impact, critical third party vendors have become an easy high impact target whether the intention is to create leverage for an ransom extortion payment, or to cause disruption to a critical national industry of an another nation. And attacks against healthcare third parties are doubling every year according to the data!&lt;br /&gt;&lt;br /&gt;

This serious and now widely exploited vulnerability raises the question of how healthcare delivery organizations should more effectively assess, manage and plan for risks across their vendors, suppliers and partners? Plainly, expecting healthcare providers to risk-assess thousands of individual partners each year is a pipe dream given limited budgets and security resources. And the number of third parties is often in the thousands for each provider.

&lt;br /&gt;&lt;br /&gt;We therefore need to embrace a different strategy in the light of changing threats and risks - a more scalable approach to managing third-party cybersecurity risk in healthcare through standardized assessment frameworks and shared accountability. One that places more onus upon the third parties themselves to be secure and compliant and to provide evidence of the effectiveness of their security controls. This is&amp;nbsp;especially important where many of those same third parties provide services to hundreds or thousands of different healthcare providers, and where compliance and security control objectives are often shared or very similar.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;We need to agree as an industry upon a common framework, a common set of audit questions that can be embodied into an agreed set of audit and assessment control objectives, to avoid the mass duplication of effort we are currently dealing with on both sides.&lt;br /&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Lack of Visibility&lt;/h3&gt;
Understanding the scope of the risk surface is the first problem. With distributed purchasing authority, especially in academic medical centers, and legacy auto-renewing contracts, discovering just how many devices, applications, or other systems have access to a hospital&#39;s medical network is half of the battle.

&lt;br /&gt;&lt;br /&gt;

One recent audit of a provider after a lengthy review of contracts and legal vendor agreements, discovered that the hospital&#39;s initial number was off by an order of magnitude. The provider was not only paying each year for services it hadn&#39;t used in decades, but the person who agreed to an auto-renewing contract had long since retired and in some cases had passed away. Random vendors it seemed, had legacy remote access to hospital networks to maintain and manage leased systems, and rather than shut down unknown remote access permissions, security had been told to leave these accounts up and running despite the risks, because of uncertainly of cutting off something or someone important.

&lt;br /&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;A Common Risk Assessment&lt;/h3&gt;
In his presentation, Richard examined the need to better assess healthcare third parties, whether HIPAA Business Associates or simple business partners and suppliers.&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&quot;Right now&quot; he claimed, &quot;we have things backwards with payers and providers expected to assess each of their vendors. This is not only impractical given the numbers, but also prohibitively expensive in time and resources. We need to squarely place the onus on vendors to prove that they meet or exceed payer and provider security policies and standards. Not the other way around.&quot;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&quot;We do this by having our vendors bring us proof that they meet OUR security requirements in the form of a SOC 2 Type II attestation from a reputable auditor, or an ISO27001 or HITRUST certification, where the control objectives can be easily mapped to OUR risk and compliance requirements.&quot;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&quot;This requires third parties to get onboard with a set of standardized common security controls under a recognized audit framework to validate that common security compliance and risk control objectives have been met and have proven to be repeatable, rather than a one-off point-in-time validation. And repeatability is critical here&quot;, he added. &quot;Just look at some of the third party breaches and how they followed shortly after a recent point-in-time assessment.&quot;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Some vendors will be ISO 27001 certified, others may have shelled out for HITRUST, but neither are cheap. Some of these compliance requirements however, may need to be cross-mapped to a payer or provider&#39;s specific risk assessment objectives. For others, an SSAE 18 SOC 2 Type II attestation may be easier and more feasible, while larger third parties like Microsoft or Cisco will readily have both ISO and SOC 2s available for their customers.&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Perhaps the biggest argument for a SOC 2 attestation over a certification is who pays. Cybersecurity certification costs usually need to come out of the security budget. A SOC 2 is often completed by the same company that performs the organization&#39;s annual financial audit and so is usually billed to accounting rather than security. That makes it especially attractive if you are a CISO and have a tight budget.&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Separate Annual Assessments can be Expensive for Vendors&lt;/h3&gt;
Most healthcare providers share the pool of third party vendors that provide healthcare systems or services for pathology, PACS, EMR, Cardiology, billing, etc. They also share the same pool of business software vendors - Microsoft, CloudStrike, Cisco, Oracle, AWS, GCP, etc. Each year the healthcare sector loads up many of these vendors with the exact same audit questions to assess and validate security risk and compliance. That can be a massive hit upon those that don&#39;t have a current SOC 2 ready to send that includes mapping to demonstrate each of the audit control objectives requested.

&lt;br /&gt;&lt;br /&gt;

While some third parties have made the move to SOC 2s, other have yet to do so. Plainly they need to review their options if maintaining staff sanity is a priority as audits and assessments ramp up.

&lt;br /&gt;&lt;br /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfP4T41DKtObqF7QvHgwe_jOLaY1zVnqCWP_1DfF0OCak4W7khDsnmZGc6VCjREz3AyXIgz2L1V4GgE78vFPWve8OFP7I6QGIeBgiu5JwurXQW8l0aqWBEAynf_wh5JbA-fXOtXyml5oRjSgvRflIR9rJ9jpXhJyeNCFs9TB-iNsrEUN3gORrKx8cJTK9v/s2322/financial-audit-digital-interface.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1290&quot; data-original-width=&quot;2322&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfP4T41DKtObqF7QvHgwe_jOLaY1zVnqCWP_1DfF0OCak4W7khDsnmZGc6VCjREz3AyXIgz2L1V4GgE78vFPWve8OFP7I6QGIeBgiu5JwurXQW8l0aqWBEAynf_wh5JbA-fXOtXyml5oRjSgvRflIR9rJ9jpXhJyeNCFs9TB-iNsrEUN3gORrKx8cJTK9v/w400-h223/financial-audit-digital-interface.webp&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt; 
  
&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Assessment Automation&lt;/h3&gt;

Audits and assessments can be expensive and very time consuming. Thousands of artifacts to assemble and to match with control objectives, they require a complete project management infrastructure to manage properly to meet compliance dates, or for renewal of cyber risk insurance policies. Most of this is still conducted manually today despite better judgement by audit managers who see their workloads steadily increase year over year.

&lt;br /&gt;&lt;br /&gt;

With a growing number and complexity of third, fourth, and fifth party vendors and suppliers to assess each year, auditors face an up hill challenge. Whether assessments are conducted by a dedicated hospital security and compliance team, or a recognized AICPA / BIG4 auditor like PwC, KPMG, Accenture, or Deloitte, incremental changes to manual labor intensive audit processes can never truly move the needle on costs and efficiency. That&#39;s why we need better automated audit tools that leverage AI to help drive efficiency, but ones that don&#39;t leverage complicated or proprietary frameworks. Its also important that many of the problems of AI based applications such as potential hallucinations are avoided by requiring use of HITL - especially in audit systems used to calculate and evaluate risk.&lt;div&gt;&lt;div&gt;&lt;br /&gt;


&lt;h3 style=&quot;text-align: left;&quot;&gt;New Assessment Tools&lt;/h3&gt;

Fortunately, new tools are beginning to emerge that support:
&lt;br /&gt;&lt;br /&gt;

&lt;normal style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;•&amp;nbsp; Automated evidence collection which maps to cross-framework controls&lt;/span&gt;&lt;/normal&gt;&lt;/div&gt;&lt;div&gt;&lt;normal style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/normal&gt;&lt;/div&gt;&lt;div&gt;&lt;normal style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;•&amp;nbsp; True contextual data evaluation that understands what submitted data means&lt;br /&gt;&lt;/span&gt;&lt;/normal&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;normal style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;•&amp;nbsp; AI validation that uploaded evidence meets each specific control &lt;br /&gt;&lt;/span&gt;&lt;/normal&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;normal style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;•&amp;nbsp; The full audit sign-off on the same platform that was used for readiness &lt;br /&gt;&lt;/span&gt;&lt;/normal&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;normal style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;•&amp;nbsp; AI enabled report generation – because who has time to write reports?&lt;br /&gt;&lt;/span&gt;&lt;/normal&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;normal style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;•&amp;nbsp; Full project management with task&amp;nbsp;dependencies&lt;br /&gt;&lt;/span&gt;&lt;/normal&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;normal style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;•&amp;nbsp; SOC 2 AICPA standards for both readiness assessments and final audit&lt;/span&gt;&lt;/normal&gt;&lt;div&gt;


&lt;br /&gt;This new generation of tools simplifies and streamlines pre-assessment and audit activities. They reduce the amount of time needed for audits and assessments and streamline workflows while reducing cost and complexity. They are undoubtedly the future, but these improvements need to be paired with better visibility into what connects to medical networks and a focus upon third party vendors to provide a SOC 2 attestation or HITRUST certification of security controls. Only then will the growing morass of third party risks become more manageable for healthcare regulated entities. Only then will some semblance of normality, availability, and safety be restored to the patient community reliant upon their health services.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/8079985079408219857'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/8079985079408219857'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2026/03/third-party-risk-assessment.html' title='Third-Party Risk Assessment '/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyBKYq1bS_hFBlgW32GQAbrYhMTBxEZEmhvwSFeI063QeBUHYN-nGcmqZQTA1rsAHq0LwGgXobyby3K3QjpUeJOPWCarCxYW_0fPDs4hEKstyAkp5cl_59tj66AhOM2_BMiZsxsqSmd-kUDSnH-tPV5pV_m0-2LqJWfmCxG7bxim7-Nb-mVpy-_RX-684U/s72-w640-h432-c/Richard%20Sky%20Theatre.jpg" height="72" width="72"/><georss:featurename>Las Vegas, NV, USA</georss:featurename><georss:point>36.171563 -115.1391009</georss:point><georss:box>7.8613291638211535 -150.29535090000002 64.481796836178845 -79.9828509</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-1372964247154162709</id><published>2026-02-12T10:04:00.032+00:00</published><updated>2026-02-19T19:48:53.802+00:00</updated><title type='text'>WHX Dubai</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifOQY0F2YTV0EsEpUbgpeUa-E7m-Kh_iS7HMu6ZAwc3iJO_ODXj920OvLswwDgqdZE6IwlBZgvT52cDWBWcjlm9aIVFEXHVoL1Wj4vJ78g0kL6WDZ25y1OUtRyvqNkREN88XTrIsSTGpQU6tbdwjXfMawUNUnEBvl7cq5kM7a1cjesyFKI_NldGKB9O0ki/s4000/Photos%20-266%20enhanced.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2667&quot; data-original-width=&quot;4000&quot; height=&quot;399&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifOQY0F2YTV0EsEpUbgpeUa-E7m-Kh_iS7HMu6ZAwc3iJO_ODXj920OvLswwDgqdZE6IwlBZgvT52cDWBWcjlm9aIVFEXHVoL1Wj4vJ78g0kL6WDZ25y1OUtRyvqNkREN88XTrIsSTGpQU6tbdwjXfMawUNUnEBvl7cq5kM7a1cjesyFKI_NldGKB9O0ki/w640-h426/Photos%20-266%20enhanced.jpg&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;

The digital healthcare evolution is leading to more and more highly innovative medical technology that helps to drive efficiency and patient outcomes. Machine Learning has hugely changed clinical decision support, while digital transcription applications are saving physicians hours of pajama time each week in record keeping (and at private hospitals helping them to get paid). AI has revolutionized medical imaging, allowing for lower patient radiation dosages to be used and AI recognition of cellular mass changes vastly improving early identification of cancer and other medical conditions.&lt;div&gt;

&lt;br /&gt;

&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNco77Uw5SC8Sedo_oCby-RilLBQEyHSArrA-KsEQn-9eu_PlbHRMQrw2HtIqGo-jDkAkkbqrhVYqUx0GQhtYj7-eWpAHLbHrnqITn9KMtwstGKBSIkU-7RVkQ-9IL2gVrsj_9lO9xRvxxn8QWZfHFBccf212dby_cueDWYWpmxkc5j9TwNoriA7oPe4Pr/s6000/Photos%20-230.jpeg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;6000&quot; data-original-width=&quot;4000&quot; height=&quot;440&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNco77Uw5SC8Sedo_oCby-RilLBQEyHSArrA-KsEQn-9eu_PlbHRMQrw2HtIqGo-jDkAkkbqrhVYqUx0GQhtYj7-eWpAHLbHrnqITn9KMtwstGKBSIkU-7RVkQ-9IL2gVrsj_9lO9xRvxxn8QWZfHFBccf212dby_cueDWYWpmxkc5j9TwNoriA7oPe4Pr/w294-h440/Photos%20-230.jpeg&quot; width=&quot;294&quot; /&gt;&lt;/a&gt;
  
BUT this technology also adds to and expands the cyber attack surface. A proliferation of AI based medical applications and a tsunami of medical and other IoT devices is making security almost unmanageable across our hospitals. And that is before you even consider the exponential growth of personal health sensors, interactive devices, and mHealth initiatives or the portalization of physician-patient secure messaging, appointment bookings and the secure posting of lab results.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In 2026 you no longer need to make an appointment to see your primary care physician (PCP) to have him or her, share your latest test results. In many cases the data is posted long before the physicians office will ever call you to let you know the results, or to book an appointment with your PCP to walk you through them. Simply feed your lab results into Google or a growing host of AI medical assistants, and patients can receive instant medical advice - even if that advice deviates towards the mean, as all AI systems tend to do.&lt;br /&gt;&lt;br /&gt;
  
While this is a global healthcare concern, the Gulf is seeing perhaps one of the world&#39;s most accelerated and dramatic expansions and modernization of healthcare services with hundreds of new systems and applications connected to medical networks every week, and new hospitals and clinics sprouting up in almost every community. There is a revolution occurring here but neither governments or providers are prepared.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The pace of technology adoption has outpaced the implementation of security tools and controls needed to protect that new technology from growing cyberattacks and data breaches. Some of this is plainly the result of the frenetic pace of adoption of new innovative tech and inadequate time or resources for security teams to keep up. But an increasing aspect of this &lt;b&gt;&quot;maturity gap&quot; &lt;/b&gt;comes down to the out-of-date way in which technology and cybersecurity are perceived by executive healthcare leaders and government ministers. Rather than being seen as an integral part of the solution, an enabler of fantastic new medical services that will revolutionize patient care, they are seen as &quot;a cost of doing business&quot; or an &quot;overhead&quot; - a necessary evil to host these new AI systems and applications, and this is perhaps why the maturity gap exists between our adoption of new technologies and the security needed to safely deploy and use those technologies.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;BUT the stakes are getting higher. What used to be the hospital security team defending against cyber attacks by simple criminal perpetrators out to steal and monetize PHI, has transformed into international terrorism and cyber extortion when hospitals are held to ransom - even though ransom payments are explicitly outlawed across an increasing number of countries for any critical national infrastructure (CNI) industry, many of which are owned and operated by national governments themselves.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The intent of at least some of these attacks however is not to monetize a foothold, but to inflict damage and disruption on a population, or to exact retribution against that country&#39;s government for its support for Ukraine and its defense of its land and people. Ransom and other extortionary attacks are increasingly being used as part of Putin&#39;s grey or hybrid warfare against other countries. Many of these attacks unfortunately target hospital systems which are a soft target with high population impact. Just last week the conference heard, Polish hospitals and municipal water treatment systems were targeted in new cyber attacks, ostensibly conducted by Russian criminal groups, frequently used as proxies by the Kremlin to inflict maximum damage and disruption. Indeed, Russia&#39;s vast array of organized crime groups is allowed to operate with near impunity from prosecution in return for &#39;favors&#39; to the government and a share of the spoils. The Kremlin is then able to claim &#39;plausible deniability&#39; for criminal acts that it has ordered against other countries as part of its hybrid warfare campaigns.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;While the odds were already stacked against hospital security defenders, the imbalance today is truly disproportionate. Whether highly organized and well funded mafia crime syndicates, or state funded, sponsored, and trained offensive cyber military units within the Russian GRU (Glavnoye Razvedyvatelnoye Upravlenie) - its military intelligence directorate; this is now a David versus Goliath problem. A well equipped army of thousands of professional attackers against a minuscule group of hospital security defenders.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Hospitals typically have small generalist teams of cybersecurity personnel and often out-of-date technology tools with which to defend patients and health IT systems from attack. In fact medical providers are often forced to use out-of-date and end-of-life IT equipment because of inadequate IT investment and the difficulty of upgrading or replacing health IT systems that are in constant use. This is not just a security problem for providers, but chiefly a technology problem of out-of-date systems and applications many of which are rarely ever patched or updated.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This includes a huge and growing number of medical IoT devices that already make up 75% of connected IP assets across hospital networks. Many of these have a 15 or 20 year amortization schedule and many have underlying embedded operating systems based upon long out of support Microsoft operating systems, with a massive number of known and published exploits. While microsegmentation of these devices helps, many providers currently have little to no idea of what actually connects to hospital networks because of fragmented ownership, inadequate tools and poor visibility. Nor do they have an easy way to microsegment &#39;at-risk devices&#39;. At the same time, providers are adding medical and other IoT systems to their networks each and every month, compounding existing problems.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Providers of medical services therefore face a multi-dimensional threat scenario. A sprawling attack surface, out-of-date and end-of-life internal IT &amp;amp; IoT systems, inadequate visibility of their own networks, and highly capable and motivated adversaries that have them out-gunned and out-matched and every corner.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Plainly there is an increased need for national governments to become more actively involved in the cyber defense of CNIs, and especially healthcare providers, where attacks result in increased patient morbidity and mortality. Only governments have the resources and legal mandates to take on today&#39;s cyber perpetrators, and to do what it takes to defend their citizens from increasingly crippling hybrid warfare attacks from failing states. As of yet however, governments have by and large, chosen to play a low-key role in the direct defense of their CNIs for fear of escalation. As the number of citizens killed in hybrid cyber attacks slowly increases, so that approach will be likely be questioned.&lt;div&gt;&lt;br /&gt;
  
  &lt;div&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE1JpTFfHGG3lo3BFlw85O0hOpAavvgr_X8uK8RpNQIVj60AlorpkHFmN1tFsZ04oqJPNOhRgH_0UjWffUFs0jtOHO6fVOneItw0oWUQOP5XBfRFOZ6sOwf4dl5p3w869mJqHBtldI_isS3dd1ulV8zz4_m1Tu7cM-lcmF3CVWeoAgvcHKm8LBiOFKecl8/s4000/Photos%20-244.jpeg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2667&quot; data-original-width=&quot;4000&quot; height=&quot;306&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE1JpTFfHGG3lo3BFlw85O0hOpAavvgr_X8uK8RpNQIVj60AlorpkHFmN1tFsZ04oqJPNOhRgH_0UjWffUFs0jtOHO6fVOneItw0oWUQOP5XBfRFOZ6sOwf4dl5p3w869mJqHBtldI_isS3dd1ulV8zz4_m1Tu7cM-lcmF3CVWeoAgvcHKm8LBiOFKecl8/w460-h306/Photos%20-244.jpeg&quot; width=&quot;460&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
    
These were just some of the topics of discussion at this years &lt;a href=&quot;https://www.linkedin.com/feed/#&quot;&gt;WHX Dubai&lt;/a&gt; conference where healthcare leaders from across the world gathered to put forward suggestions and recommendations for improving patient care, safety and outcomes through smart security.&lt;/div&gt;
  
  &lt;br /&gt;

&lt;div&gt;Joining me on stage at this prestigious event were Professor&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/feed/#&quot;&gt;Attila Hertelendy, Ph.D.&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/feed/#&quot;&gt;Mike Fell&lt;/a&gt;,&amp;nbsp; &lt;a href=&quot;https://www.linkedin.com/feed/#&quot;&gt;Charles Aunger&lt;/a&gt; and &lt;a href=&quot;https://www.linkedin.com/feed/#&quot;&gt;Zekeriya Eskiocak&lt;/a&gt; to share their vast knowledge and experience.&lt;/div&gt;
  
&lt;br /&gt;&lt;br /&gt;




&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/1372964247154162709'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/1372964247154162709'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2026/02/whx-dubai.html' title='WHX Dubai'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifOQY0F2YTV0EsEpUbgpeUa-E7m-Kh_iS7HMu6ZAwc3iJO_ODXj920OvLswwDgqdZE6IwlBZgvT52cDWBWcjlm9aIVFEXHVoL1Wj4vJ78g0kL6WDZ25y1OUtRyvqNkREN88XTrIsSTGpQU6tbdwjXfMawUNUnEBvl7cq5kM7a1cjesyFKI_NldGKB9O0ki/s72-w640-h426-c/Photos%20-266%20enhanced.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-7716754969599100486</id><published>2025-12-09T19:27:00.052+00:00</published><updated>2025-12-16T20:03:39.027+00:00</updated><title type='text'>Beware of Holiday Scams: How to spot Fake Links and avoid Phishing Attacks</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;

&lt;div class=&quot;separator&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBeBWdV9fnFD3vrVlzWnydQ4Nr-ej5ubu-_G1He9EhpnMrXHpN2Ew8kNLWtifjQGy_B8YDKwlMqidqLiIPTAfK6GcEXTL0Fw7g8N8unu5IGRwQrIOrU3YTWPLEs9NOyoPRybMWPp12CZy72ybF0SuvmZe3B-BfDEVaWg30rhUpJXAJV3zDwY0AEfGmwQoo/s1920/shoper-slLo94wES2M-unsplash.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBeBWdV9fnFD3vrVlzWnydQ4Nr-ej5ubu-_G1He9EhpnMrXHpN2Ew8kNLWtifjQGy_B8YDKwlMqidqLiIPTAfK6GcEXTL0Fw7g8N8unu5IGRwQrIOrU3YTWPLEs9NOyoPRybMWPp12CZy72ybF0SuvmZe3B-BfDEVaWg30rhUpJXAJV3zDwY0AEfGmwQoo/w640-h426/shoper-slLo94wES2M-unsplash.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt; 

&lt;br /&gt;

‘Tiz the season to be jolly’ and between pre-holiday shopping and all the amazing deals that will be posted online for Boxing Day – (that’s December 26th for American shoppers), many of us will be avoiding the snow and shopping from the comfort of our homes, or between meetings from the company laptop as things wind down for the holidays.

&lt;br /&gt;&lt;br /&gt;

But it’s important to remember that the season is not just about putting lights on the tree and stocking up on all kinds of drinks for expected, (and unexpected), guests, nor is it about wearing ugly Christmas sweaters and drinking mulled wine, cider, and hot toddies, it’s also ‘&lt;b&gt;the season to be wary&lt;/b&gt;’. Wary about online shopping scams and last-minute deals that look too good to be true – because they very well maybe – untrue that is! 

&lt;br /&gt;&lt;br /&gt;

Our guards are down as we relax a little and look forward to meeting friends, attending a few parties, and enjoying some well-deserved downtime. The trouble is, that scammers know this too and each year they make a bonanza out of unaware, perhaps slightly tipsy, online shoppers looking for presents. Last year during the 2024 holiday season, the FBI’s Internet Crime Complaint Center received thousands of complaints about phishing and spoofing scams which drained more than $70 million from victims. And each year the number of victims increases.&lt;br /&gt;&lt;br /&gt;

It&#39;s not just the charges on your credit card or the packages that never show up, its identity theft and a heap of other dangers including malware and even ransomware, getting on your computer - and by extension the company network if you shop from the office.&lt;br /&gt;&lt;br /&gt;

&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;

&lt;div class=&quot;separator&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8CDR4wK3AU3C_FD6_3D9XIe-iCdUyuhlxy-1aICkIiKhY2KTG5fd-IpsMDk3f2zbE15WJET_40NNm6_ZZJSVpXWM2Z7eZX0C3HWVxh5NDkykLJYzXwbjNuzovUnRNCGjsWhVWhsrC_GvPBwmjmNUEV8yntw51kCu_n5eDUXCC2b7yYX5a83rQ5sNc27w3/s1430/Picture1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;550&quot; data-original-width=&quot;1430&quot; height=&quot;230&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8CDR4wK3AU3C_FD6_3D9XIe-iCdUyuhlxy-1aICkIiKhY2KTG5fd-IpsMDk3f2zbE15WJET_40NNm6_ZZJSVpXWM2Z7eZX0C3HWVxh5NDkykLJYzXwbjNuzovUnRNCGjsWhVWhsrC_GvPBwmjmNUEV8yntw51kCu_n5eDUXCC2b7yYX5a83rQ5sNc27w3/w640-h246/Picture1.png&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
  
  &lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Type Squatting and Homograph Attacks&lt;/h3&gt;

While shopping online, scams are getting harder and harder to detect. Even a careful examination of the URL can be misleading as numbers and even Cyrillic characters are substituted for letters. While goog1e.com upon careful examination will reveal a number ‘1’ substituted for the letter ‘l’, most people in a hurry might not notice. This is known as typo squatting and is surprisingly common where fake URLs closely mimic real ones, such as using “PayPa1” instead of “PayPal.” 

&lt;br /&gt;&lt;br /&gt;

Sadly, most people don’t even check the full URL of their online shopping cart which may have been hijacked before entering their credit card number and completing a transaction. Using a phone or tablet, and chances are that the full URL might not even be displayed. While Google has the money and foresight to purchase all domains that could appear close to its domain names, other online stores might not have the warewithal or the resources to do so, especially when different Unicode character sets are used. Criminal perpetrators know this and are increasingly exploiting this. 

&lt;br /&gt;&lt;br /&gt;

These attacks are known as known as IDN Homograph Attacks, and trick users by substituting Latin letters with visually identical Cyrillic ones (like &#39;a&#39; for &#39;ɑ&#39;, &#39;o&#39; for &#39;о&#39;) to create fake sites (e.g., www.google.com vs. www.googlе.com where the &#39;e&#39; is Cyrillic &#39;е&#39;) that steal credentials; examples include using Cyrillic &#39;a&#39; (а), &#39;o&#39; (о), &#39;T&#39; (Т), &#39;P&#39; (Р) to mimic real domains for phishing shoppers. Apple: www.apple.com can be spoofed as www.аpple.com (Cyrillic &#39;а&#39;).&amp;nbsp;Microsoft: www.microsoft.com can become www.microsоft.com (Cyrillic &#39;о&#39;) and the list goes on and on. 

&lt;br /&gt;&lt;br /&gt;

To avoid these attacks its best to type the URL directly into a browser, or use a well-established and trusted bookmark rather than a link from another web site. It’s also good to avoid URL shorteners when shopping or banking, and to hover over embedded URL links before clicking as the link might not be what it appears to be. 

&lt;br /&gt;&lt;br /&gt;

Social media and many web sites today are powered by syndicated ads where the main site may have very little control over the legitimacy of those rotating ads. Look for red flags such as an “@” symbol within the URL or two web addresses combined using a question mark, especially if the first part looks like a trusted site such as Google.com or Apple.com.

&lt;br /&gt;&lt;br /&gt;

Avoid unknown but familiar sounding domains. While &lt;a href=&quot;https://www.ebay.com/mye/myebay/watchlist&quot;&gt;https://www.ebay.com/mye/myebay/watchlist&lt;/a&gt; is legitimate &lt;a href=&quot;https://www.ebay.mywatchlist.xy&quot;&gt;https://www.ebay.mywatchlist.xy&lt;/a&gt; is probably not legitimate. And watch out for social media messages that ‘appear’ to be from friends who you have not chatted with before. Never trust always validate. Send a message to the sender asking a question that only your real friend will know the answer to or call them and ask did you send me a message via facebook, whatsapp, or whatever. Scammers often hijack or impersonate social media accounts belonging to people you know so this is a common attack vector. If a message from a relative or friend suddenly sounds aggressive, sales-driven or out of character, especially if it includes a link, verify by contacting them directly before clicking.

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;

&lt;div class=&quot;separator&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitB3yJbliBZ3DEtu2RETlSXeljT_MGGdw87qk7tJ1Mg9qPC5QPDwzqW116aqW4ku_G2U5Xz0NJ77oRiy7jXV-OwV9Iy4O7SFc6VwvKyVqG01em4xdrkqunOVQnGZC0aAY3e7nXNUxb2dBU6SCz3jbeWPqmJD2sHBMzMXpA6jOgEn9gZL4u6G9GbCVSKGkU/s447/maliciouswebsite.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;280&quot; data-original-width=&quot;447&quot; height=&quot;363&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitB3yJbliBZ3DEtu2RETlSXeljT_MGGdw87qk7tJ1Mg9qPC5QPDwzqW116aqW4ku_G2U5Xz0NJ77oRiy7jXV-OwV9Iy4O7SFc6VwvKyVqG01em4xdrkqunOVQnGZC0aAY3e7nXNUxb2dBU6SCz3jbeWPqmJD2sHBMzMXpA6jOgEn9gZL4u6G9GbCVSKGkU/w640-h400/maliciouswebsite.png&quot; width=&quot;580&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;What to do if you already clicked a scam link?&lt;/h3&gt;

If you’ve clicked on a suspicious link, the outcome depends on your device’s security protections. Firewalls or antivirus software may block the threat automatically. Without protection, however, action may be needed.&lt;br /&gt;&lt;br /&gt;Make sure that your endpoint protection is up to date and watch for signs of malware like unusually slow performance. Reboot and test if you are concerned. Phones are not immune. If infected, avoid using financial apps, clear your browser cache, delete unfamiliar apps or perform a factory reset. Contact your device’s tech support if needed.&lt;br /&gt;&lt;br /&gt;Once you have validated that your device is running fine, check your bank and credit card accounts. This is super important this time of year especially. If you see a transaction you don’t recognize, immediately ask family members who may have access to your cards. Check the transaction date, as purchases may take a day or two to post and merchants may not have a credit card ‘merchant name’ that reflects their ‘doing business as’ name. It’s not uncommon for a major brand like a hotel chain to post your room charges under a merchant name you don’t recognize as many hotel properties are franchises as an example. Dates and amounts usually help to sort this out so check against your calendar. If you are still at a loss, then contact the institution if the charge remains unidentified and ask for clarification or to report a fraudulent charge. The card company will invalidate your card and send you a new one in 5 business days usually or less if you ask. 

&lt;br /&gt;&lt;br /&gt;

Report the scam: If you lost money, report the incident to the Federal Trade Commission and your local police department. Reporting helps authorities warn others and reduce future victims. The FTC can also help you if your credit card or bank can’t, or won’t, process a credit to your account for a fraudulent transaction. You usually have a maximum of 60 days to report a fraudulent transaction after which you will need the FTC’s help to reverse a charge so don’t leave unknown charges to languish.  Staying alert and informed is your best defense against holiday scams and the best way to keep the season joyful and secure. So be vigilant and check your transactions regularly. 

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/7716754969599100486'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/7716754969599100486'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/12/beware-of-holiday-scams.html' title='Beware of Holiday Scams: How to spot Fake Links and avoid Phishing Attacks'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBeBWdV9fnFD3vrVlzWnydQ4Nr-ej5ubu-_G1He9EhpnMrXHpN2Ew8kNLWtifjQGy_B8YDKwlMqidqLiIPTAfK6GcEXTL0Fw7g8N8unu5IGRwQrIOrU3YTWPLEs9NOyoPRybMWPp12CZy72ybF0SuvmZe3B-BfDEVaWg30rhUpJXAJV3zDwY0AEfGmwQoo/s72-w640-h426-c/shoper-slLo94wES2M-unsplash.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-4572472739771594232</id><published>2025-10-19T00:41:00.017+00:00</published><updated>2025-12-04T23:22:34.932+00:00</updated><title type='text'>Cyber Resilience for Global Health Systems</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnm23Nn6qFVfpupO6_1Sck3wFk4pcd4M6Ge50NNZDam2eU8S3i0IGIVFNq6LVqsPa7i-on5sv8Ls2HwrypbmBNMPivKwnas1lh5uvcvIf5qDkQ_Uf5aaWB9YhQ0nulzp5BGdOzNPGbdZxQoEs8qtFP1hoD8UMXV0Rf80-V3CAxSnUIB-WsM-ImOP2V0pFt/s2500/54669629793_308790ee07_o.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1667&quot; data-original-width=&quot;2500&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnm23Nn6qFVfpupO6_1Sck3wFk4pcd4M6Ge50NNZDam2eU8S3i0IGIVFNq6LVqsPa7i-on5sv8Ls2HwrypbmBNMPivKwnas1lh5uvcvIf5qDkQ_Uf5aaWB9YhQ0nulzp5BGdOzNPGbdZxQoEs8qtFP1hoD8UMXV0Rf80-V3CAxSnUIB-WsM-ImOP2V0pFt/w640-h426/54669629793_308790ee07_o.jpg&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;p&gt;

&lt;br /&gt;

I recently returned from the Global Cybersecurity Forum Annual Meeting 2025, perhaps the most prestigious of cybersecurity conferences. This is an event populated by former and current Presidents, Prime Ministers, Sheiks, Sultans, Emirs, Princes, and delegates from the European Commission, United Nations, World Economic Forum, and countless other global bodies. And of course, it has all the pomp and grandeur one expects from a high-level event in the Kingdom of Saudi Arabia.

&lt;br /&gt;&lt;br /&gt;

This year’s focus was upon “Scaling Cohesive Advancement in Cyberspace” across the world. It was built upon the pillars of fostering better alignment, redefining cyber economics and economic cohesion, strengthening cyber inclusion, adopting a behavioral lens on cyberspace, and harnessing technological advancements to tackle fast-evolving challenges in Cyberspace.
  
&lt;br /&gt;&lt;br /&gt;

The invite-only two day event drew delegates from all over the world to hear more than one hundred experts and thought leaders present to attendees and engage in meaningful discussions. This was my second year attending the event as a presenter, and this year led a discussion panel with fellow healthcare security and AI evangelist, Professor Attila Hertelendy from FIU on “Cyber Immunity: Strengthening Cyber Resilience for Global Health Systems.”

&lt;br /&gt;&lt;br /&gt;

Much of the conference was focused upon the protection of critical national infrastructure industries like healthcare, an industry undergoing a dramatic digital transformation throughout the world and across much of the Gulf region, but especially so in the developing world. These healthcare technology-adopting nations need to embrace the lessons learned and avoid the mistakes made by Europe and America. An uptick in attacks against critical infrastructure is on the rise globally with a hugely disproportionate impact on populations when hospitals and other healthcare delivery facilities are targeted.

&lt;br /&gt;&lt;br /&gt;

When the power or water grid are attacked we can revert to flashlights, candles, and bottled drinking water until services are restored. When healthcare is attacked and hospital systems go dark, patients immediately begin to suffer, with modern diagnosis, treatment, patient monitoring and management systems unable to be used. The longer these systems remain dark, the greater the probability that patients will die or be harmed by delayed or inadequate treatment. Ransomware attacks are especially heinous and lead directly to patient morbidity and mortality as we have seen in an increasing number of recent cyber attacks.

&lt;br /&gt;&lt;br /&gt;
  
More in my early morning interview with the Saudi Press Agency below:

&lt;br /&gt;

&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;

&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;336&quot; src=&quot;https://video.cyberthoughts.org/2025.10.02-GCF_SPA_Video.mp4&quot; title=&quot;GCF 2025&quot; width=&quot;600&quot;&gt;&lt;/iframe&gt;

&lt;br /&gt;&lt;br /&gt;

&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4572472739771594232'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4572472739771594232'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/10/cyber-resilience-for-global-health.html' title='Cyber Resilience for Global Health Systems'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnm23Nn6qFVfpupO6_1Sck3wFk4pcd4M6Ge50NNZDam2eU8S3i0IGIVFNq6LVqsPa7i-on5sv8Ls2HwrypbmBNMPivKwnas1lh5uvcvIf5qDkQ_Uf5aaWB9YhQ0nulzp5BGdOzNPGbdZxQoEs8qtFP1hoD8UMXV0Rf80-V3CAxSnUIB-WsM-ImOP2V0pFt/s72-w640-h426-c/54669629793_308790ee07_o.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-2532263976536206536</id><published>2025-10-03T06:00:00.152+00:00</published><updated>2026-03-26T03:29:11.727+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Gaming"/><category scheme="http://www.blogger.com/atom/ns#" term="GCF25"/><category scheme="http://www.blogger.com/atom/ns#" term="online gambling"/><title type='text'>Online Gambling</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo3pA2PwVJii7IAfUZIjCOOj0CdabyRLoaDPdG7yEM4FOnUoiOuTOALRyC8vIqfzibNo-CI_jHAJRDBVOkhDI5pFCqIGWcP2prfEL3UPs-ug5soWFFjXFhMyq7buclUpVoC4YXBehf-cbJVLot2BvEVAJZwA-o4lE5aCdbymA-nJ9-GFgoPI_HvyJ0E7rt/s720/newsCover_2025_10_3_1759500447234-0xel4g.jpeg&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo3pA2PwVJii7IAfUZIjCOOj0CdabyRLoaDPdG7yEM4FOnUoiOuTOALRyC8vIqfzibNo-CI_jHAJRDBVOkhDI5pFCqIGWcP2prfEL3UPs-ug5soWFFjXFhMyq7buclUpVoC4YXBehf-cbJVLot2BvEVAJZwA-o4lE5aCdbymA-nJ9-GFgoPI_HvyJ0E7rt/w640-h320/newsCover_2025_10_3_1759500447234-0xel4g.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;br /&gt;

&lt;span style=&quot;font-size: medium;&quot;&gt;Amidst the rapid digital transformation sweeping Indonesia, a new threat is emerging: online gambling. This phenomenon is not just an online game, but part of a global criminal network with billions of rupiah in daily turnover.&lt;/span&gt;

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;

&lt;div style=&quot;text-align: left;&quot;&gt;&lt;i&gt;English Translation of Live Broadcast Transcription &lt;a href=&quot;http://Merdeka.com&quot;&gt;Merdeka.com&lt;/a&gt; 03 Oct 2025. Ilustrasi penerima Bansos (Istimewa) (©© 2025 Liputan6.com). &lt;/i&gt;&lt;/div&gt;
  
  &lt;h2 style=&quot;text-align: left;&quot;&gt;Online Gambling: A Global Criminal Business Amidst Indonesia&#39;s Digital Transformation&lt;/h2&gt;
  
  &lt;span style=&quot;font-size: medium;&quot;&gt; Many online gambling cases in Indonesia target vulnerable low- and middle-income groups. &lt;/span&gt;
  
  &lt;br /&gt;&lt;br /&gt;
  
  &lt;a href=&quot;http://Merdeka.com&quot; style=&quot;font-size: small;&quot;&gt;Merdeka.com&lt;/a&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;03 Oct 2025&lt;/span&gt;
  
  &lt;br /&gt;&lt;br /&gt;
  
At the Global Cybersecurity Forum 2025, held on October 1-2 in Riyadh, Saudi Arabia, Richard Staynings, Professor of Cybersecurity – ITC &amp;amp; Healthcare Informatics at the University of Denver, explained that online gambling has long been a favorite tool for cybercriminal groups.

 
&lt;br /&gt;  &lt;br /&gt;

&quot;The internet completely disregards national boundaries, and that&#39;s allowed online gambling to flourish. It&#39;s used not only for gaming but also for money laundering from various criminal activities,&quot; he told merdeka.com.
    
&lt;br /&gt;&lt;br /&gt;
    
In Indonesia, online gambling platforms often target low- to middle-income individuals. Offers of initial bonuses, illusory wins, and the lure of &quot;getting rich quick&quot; are enticing entry points. However, behind the scenes, the mechanisms are designed to ensure players&#39; money is never returned.

&lt;br /&gt;&lt;br /&gt;

&quot;They deliberately target the gullibility of people with limited knowledge of cyber risks. Players are lured in with free gambling credits and given the impression they&#39;ve won, then directed to deposit their own money to increase their winnings. Ultimately, the funds are withheld and never paid out,&quot; Staynings explained.
    
&lt;br /&gt;&lt;br /&gt;
    
This pattern isn&#39;t unique to Indonesia. He believes global syndicates deliberately target the most vulnerable groups. This phenomenon reveals a new facet of cybercrime: it&#39;s not just about technology, but also about manipulating social psychology.

&lt;br /&gt;&lt;br /&gt;
  
&lt;div&gt;  &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgczDuc720aMaSfCFvDVP4tl7DJsancypPUZeX1rPs_1wb1funCJXqYkbrrI0zLfCg10-zNdrYlCAtE2u-iWQ6Gz0GLwMaQ7uOjj6CZFF1UmO-EM_f_3MNNhgL8i6LARSXDOUENCK8HsjLkpMS458f3Sf1nq0NEVPCKKBuaeEH4GgcOVV3ZY20kUfr6IKyv/s720/feedImage_2025_10_3_1759500087530-g4ruy.jpeg&quot; style=&quot;clear: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;417&quot; data-original-width=&quot;720&quot; height=&quot;370&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgczDuc720aMaSfCFvDVP4tl7DJsancypPUZeX1rPs_1wb1funCJXqYkbrrI0zLfCg10-zNdrYlCAtE2u-iWQ6Gz0GLwMaQ7uOjj6CZFF1UmO-EM_f_3MNNhgL8i6LARSXDOUENCK8HsjLkpMS458f3Sf1nq0NEVPCKKBuaeEH4GgcOVV3ZY20kUfr6IKyv/w640-h370/feedImage_2025_10_3_1759500087530-g4ruy.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;
  
  &lt;br /&gt;
  &lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Richard Staynings merdeka.com&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;
  
&lt;h3 style=&quot;text-align: left;&quot;&gt;Regulatory and Educational Challenges&lt;/h3&gt;
  
Indonesia is currently at a crossroads. On the one hand, digitalization is driving the economy. However, on the other hand, expanding internet access is opening up opportunities for transnational criminals.
  
&lt;br /&gt;&lt;br /&gt;
  
“The rapid growth of Indonesia&#39;s digital population must be balanced with higher cyber awareness. The government&#39;s job is to ensure the public understands the risks and how to protect themselves,” said Staynings.
  
&lt;br /&gt;&lt;br /&gt;
  
He cited the example of several countries in Asia that have successfully suppressed online gambling through massive education campaigns. Digital literacy has proven more effective than simply blocking sites as new ones spring up the next day and it quickly becomes a game of whack-a-mole.&lt;br /&gt;&lt;br /&gt;“We need to educate the public about the dangers of online crime. Gambling is just one facet of a broader cyber threat,” he added.
  
&lt;br /&gt;&lt;br /&gt;
  
&lt;h3 style=&quot;text-align: left;&quot;&gt;Ransomware and Mobile Apps: The Next Threat&lt;/h3&gt;
  
Besides online gambling, another increasingly prominent threat is ransomware targeting mobile apps. With Indonesia&#39;s population increasingly reliant on smartphones, these attacks pose a significant challenge.
  
&lt;br /&gt;&lt;br /&gt;
  
&quot;Small phone screens make users more easily distracted. They respond to instant messages without thinking, and that&#39;s what cybercriminals exploit,&quot; Staynings explained.
  
&lt;br /&gt;&lt;br /&gt;
  
Even more worrying, around 98% of Android apps on the Play Store were recently detected as having security vulnerabilities. He believes the responsibility lies with both platform providers and app developers to ensure user security and privacy.

&lt;blockquote&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The Coordinating Ministry for Political, Legal, and Security Affairs is seriously strengthening digital literacy to prevent online gambling in the Riau Islands, given that thousands of residents are suspected of being involved. Learn about the government&#39;s efforts to address this serious threat! Merdeka.com&lt;/span&gt;&lt;/blockquote&gt;

&lt;br /&gt;&lt;br /&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCh7wQ0cxZhaNAYqCR-2AdfEWgw9hgYo0uYoEaU5VGew_aZKOJopBGcH1GCqDmUjILzx14CepPbkE6GqzgRMeuJuulIKzsVacHguRhsXoTCVZo4e4SGGWxcExLZf2NvBf0YOfxkVGe2R4ToW9tnaafO7z0o5EeooVm0AtVu68lSXw36rGHBOpsF5xFlq0p/s720/feedImage_2025_10_3_1759500157014-b1exc.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;510&quot; data-original-width=&quot;720&quot; height=&quot;454&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCh7wQ0cxZhaNAYqCR-2AdfEWgw9hgYo0uYoEaU5VGew_aZKOJopBGcH1GCqDmUjILzx14CepPbkE6GqzgRMeuJuulIKzsVacHguRhsXoTCVZo4e4SGGWxcExLZf2NvBf0YOfxkVGe2R4ToW9tnaafO7z0o5EeooVm0AtVu68lSXw36rGHBOpsF5xFlq0p/w640-h454/feedImage_2025_10_3_1759500157014-b1exc.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;

&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;The Long Road Ahead&lt;/h3&gt;

Fighting online gambling and other cyber crimes is not an overnight task. It requires synergy between regulation, technology, and society.

&lt;br /&gt;&lt;br /&gt;

For Indonesia, which is pursuing digital transformation, this challenge demands a holistic approach: public education, strong regulations, and collaboration between the government and the private sector. As Staynings emphasized, &quot;Cybersecurity is not just about technology, but also about public awareness and preparedness.&quot;&lt;br /&gt;&lt;br /&gt;

Indonesia, with more than 220 million internet users, is one of the largest markets and a fertile breeding ground for global criminal syndicates.

&lt;br /&gt;&lt;br /&gt;

&quot;This is not just a national legal issue, but a global issue. Indonesia has a huge opportunity to strengthen its cyber resilience, provided it can learn from other countries that have already faced this problem,&quot; Staynings concluded.

&lt;br /&gt;&lt;br /&gt;

Digital transformation opens many doors of opportunity, but also pitfalls. Without adequate awareness and protection, the public will become victims in a larger game orchestrated by cross-border cybercriminals.

&lt;br /&gt;&lt;br /&gt;

[Ends]

&lt;br /&gt;&lt;br /&gt;

&lt;span style=&quot;font-size: x-small;&quot;&gt;Original Story published in Bahasa at&amp;nbsp;&lt;a href=&quot;https://www.merdeka.com/dunia/judi-online-bisnis-kriminal-global-di-tengah-transformasi-digital-indonesia-476391-mvk.html&quot; target=&quot;_blank&quot;&gt;https://www.merdeka.com/dunia/judi-online-bisnis-kriminal-global-di-tengah-transformasi-digital-indonesia-476391-mvk.html&amp;nbsp;&lt;/a&gt;&lt;/span&gt;

&lt;br /&gt;&lt;br /&gt;

&lt;span style=&quot;font-size: x-small;&quot;&gt;Copyright © 2025 merdeka.com KLY KapanLagi Youniverse All Rights Reserved.&lt;/span&gt;

&lt;br /&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/2532263976536206536'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/2532263976536206536'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/10/online-gaming.html' title='Online Gambling'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo3pA2PwVJii7IAfUZIjCOOj0CdabyRLoaDPdG7yEM4FOnUoiOuTOALRyC8vIqfzibNo-CI_jHAJRDBVOkhDI5pFCqIGWcP2prfEL3UPs-ug5soWFFjXFhMyq7buclUpVoC4YXBehf-cbJVLot2BvEVAJZwA-o4lE5aCdbymA-nJ9-GFgoPI_HvyJ0E7rt/s72-w640-h320-c/newsCover_2025_10_3_1759500447234-0xel4g.jpeg" height="72" width="72"/><georss:featurename>Jakarta, Indonesia</georss:featurename><georss:point>-6.1944491 106.8229198</georss:point><georss:box>-34.504682936178845 71.6666698 22.115784736178846 141.9791698</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-4452374383224681742</id><published>2025-09-12T19:05:00.005+00:00</published><updated>2025-12-04T23:36:02.758+00:00</updated><title type='text'>Can American Cybersecurity Technology Still Be Trusted?</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLiqiAnvXDhveAxumm98WGq2VXSrIX96zkVMKOtZ2ZwrZqiaSAPyadNoLEzaCsP-J1jDS_47BgrkvfBDVr2ndbT9qinSyFJI_jFCAxEN2qmog57WrjtBQRseBT2qaxK3FGS_tZC6hxkOLozqOXyaTleP5mH3mnPd5BSm49PICLV-xhPcOG6b7GL_9yytb0/s1200/A-Sobering-Snapshot-of-Distrust-in-America.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLiqiAnvXDhveAxumm98WGq2VXSrIX96zkVMKOtZ2ZwrZqiaSAPyadNoLEzaCsP-J1jDS_47BgrkvfBDVr2ndbT9qinSyFJI_jFCAxEN2qmog57WrjtBQRseBT2qaxK3FGS_tZC6hxkOLozqOXyaTleP5mH3mnPd5BSm49PICLV-xhPcOG6b7GL_9yytb0/w640-h328/A-Sobering-Snapshot-of-Distrust-in-America.jpg&quot; /&gt;&lt;/a&gt; 

&lt;br /&gt;&lt;br /&gt;

&lt;div&gt;The radical political transformation of the United States over the past few months has not gone unnoticed by the tech and cybersecurity sector – internally within the country or externally by that sector’s customers. While many see some of these changes as innocuous and hope that any storms will blow over, others see these changes as a fundamental shift with far more nefarious implications. 
  
&lt;br /&gt;&lt;br /&gt;
  
The decimation of scientific research agencies, the Cybersecurity Infrastructure Security Agency (CISA), the attempted firing of thousands of federal government employees across nearly every agency and department are one thing. The removal of impartial senior military and intelligence commanders who cannot be relied upon to be unquestionably loyal to the new commander-in-chief, is another thing entirely. Loyalty is everything to Donald Trump, and like any mafia boss, when absolute loyalty is not demonstrated it is to be punished publicly. “Kill the chicken to scare the monkey” as the Chinese idiom states.
  
&lt;br /&gt;&lt;br /&gt;
  
Just look at Chris Krebbs, Director of the Cybersecurity and Infrastructure Security Agency in the Department of Homeland Security, who led CISA through the 2020 election and refused to support the MAGA lie that the election had been stolen when their cult leader lost. He was not only fired in the last days of Trump’s first presidency, but he and his next employer SentinelOne were very recently, openly and &lt;a href=&quot;https://www.csoonline.com/article/3973542/cybersecurity-leaders-decry-political-persecution-of-chris-krebs-in-a-letter-to-the-president.html&quot;&gt;publicly persecuted&lt;/a&gt;&amp;nbsp;- a full 4 years later&amp;nbsp;by Trump in his second term. For Trump this was personal payback and in his narcissistic mind, totally justified for the lack of kowtowing to the wannbe king.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
  
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9z6YaWjiPTmpbBtoUyoD9p7Y2HUBdp6Re5es1POJWCZDkjXpj2QcvHRxIyJaLMCJ2pRAMapW8P7oEBQIQ0sr1uGRhDDs5QjKjPiXyETzYpUcecEynK74sPbnRnGYL6u8m8h9FY5goSXAABQR68bG-tI0edfOoVf2syM3vdp3-MntCdRGyGEIi3PUFb0lr/s2048/Krebs.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9z6YaWjiPTmpbBtoUyoD9p7Y2HUBdp6Re5es1POJWCZDkjXpj2QcvHRxIyJaLMCJ2pRAMapW8P7oEBQIQ0sr1uGRhDDs5QjKjPiXyETzYpUcecEynK74sPbnRnGYL6u8m8h9FY5goSXAABQR68bG-tI0edfOoVf2syM3vdp3-MntCdRGyGEIi3PUFb0lr/w233-h155/Krebs.jpg&quot; /&gt;&lt;/a&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi0-TIz8rmyKSJm5zy4b8pzCqPLfeTYW3fgW7MRxSTrwug4tsYzXwyk59UGrj8_XwM6fY7x0EgW4C-Nka0TmzAnlmguw8CXaBO8ftZjOcIbnM7fDl4ELIgHtwx8ZkjMoJmhLZnq2y9th3P2Ry6YjL3LwvIQDhzrIXh_1f4Z09AI8z_k4l4mlE0oaGXgiDy/s410/bolton.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi0-TIz8rmyKSJm5zy4b8pzCqPLfeTYW3fgW7MRxSTrwug4tsYzXwyk59UGrj8_XwM6fY7x0EgW4C-Nka0TmzAnlmguw8CXaBO8ftZjOcIbnM7fDl4ELIgHtwx8ZkjMoJmhLZnq2y9th3P2Ry6YjL3LwvIQDhzrIXh_1f4Z09AI8z_k4l4mlE0oaGXgiDy/w275-h155/bolton.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
  
&lt;br /&gt;
  
Look at John Bolton, former US Ambassador to the United Nations under George W Bush, and US National Security Advisor in Trump&#39;s first term. Bolton has since become an outspoken critic of Trump’s mental decline and his errant foreign policy and has been a frequent guest on both right and left wing TV shows. His family house raided in the middle of the night by the FBI, an agency now controlled by Trump sycophant Kash Petal. The raid was plainly designed to &lt;a href=&quot;https://www.thebulwark.com/p/john-bolton-raid-search-fbi-trump-national-security-classified-information-intimidation-kash-patel&quot;&gt;send a message&lt;/a&gt; to anyone else who may dare to question the ‘Dear Leader’ in the White House. This is not just domestic politics and a retribution presidency, it’s a seismic shift in the America that everyone trusts, and the world is watching.
  
&lt;br /&gt;&lt;br /&gt;
  
The fact is that the unshakable confidence in America that has persisted since World War II has been broken, and that break in confidence extends to American industry and its thriving technology sector. But for how much longer? This to anyone who works in the technology and cybersecurity sector should be very concerning.
  
&lt;br /&gt;&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;So let me explain my concerns.&lt;/h3&gt;
  
I have just spent the last ten days visiting security and technology leaders in Asia. I have worked internationally for nearly two decades with big American technology brands including Cisco, CSC, and now for Cylera. I visit Asia several times a year to present at various cybersecurity conferences, to visit customers, or just for a beach vacation in the depths of winter back home. This time however was different. Those that travel internationally will recognize that the reception of Americans outside of the country can be very different to the way other nationalities are welcomed. Fly to Europe or further afield and the comments about American politics and leaders can be quite surprising and sometimes openly hostile. Often this hostility is accompanied by derisory comments about the intelligence of the American electorate and the arrogance of its elected representatives. Foreigners will also quite vociferously question American foreign policy including the Gulf Wars, Afghanistan, Kosovo, and Bosnia, which all stir up a hot discussion even amongst American allies. But that’s not all I discovered during this visit.&lt;br /&gt;&lt;br /&gt;I was out for drinks one evening with a number of CIOs and CISOs and the question arose can American technology be trusted? A CIO was considering whether to simply replace and upgrade his American wireless and cellular repeater technology or to consider a replacement strategy based upon cheaper Chinese technology. Putting aside historical issues of &lt;a href=&quot;https://www.wsj.com/articles/SB10485560675556000?gaa_at=eafs&amp;amp;gaa_n=ASWzDAj9Dfa1geawDNv6rmiudiV7yAIUJhByYy_KGp4bZJLiVbPtqvbFkv1I&amp;amp;gaa_ts=68c06f90&amp;amp;gaa_sig=rCLUEylzFDZUjLl22P1zcraF2zG8pbrGUYfWWP0DsWIIpoShxSPAsFiQy8uSEuKZoY3gePRClhUHQ_pSXqI6dw%3D%3D&quot;&gt;stolen American router source code&lt;/a&gt; and other “illegally acquired” technology IP, the Chinese tech today is highly innovative, feature rich, and often half the price he argued. And he was right. It’s cheaper and often better but at &lt;a href=&quot;https://aragonresearch.com/cyber-war-flashback-the-huawei-hacks-of-cisco-and-nortel/&quot;&gt;what price when it comes to security&lt;/a&gt;?
  
&lt;br /&gt;&lt;br /&gt;
  
The table erupted as other security and technology leaders expressed their concerns about well-publicized and prolific &lt;a href=&quot;https://www.politico.com/news/2025/07/22/microsoft-sharepoint-hack-china-federal-agencies-00467254&quot;&gt;state-sponsored hacking&lt;/a&gt; and especially about the various Chinese &lt;a href=&quot;https://www.politico.com/news/2024/12/03/chinese-hack-global-telecom-ongoing-00192410&quot;&gt;Typhoon&lt;/a&gt; attacks against telco systems. This includes concerns about backdoors and other vulnerabilities in &lt;a href=&quot;https://www.darkreading.com/threat-intelligence/millions-of-lenovo-laptops-contain-firmware-level-vulnerabilities&quot;&gt;Chinese manufactured technology systems&lt;/a&gt; and the fact that China cannot be trusted especially with anything that touches critical infrastructure of any kind. This coming from a mixed group of Asian and European leaders all living and working in Asia today, and all responsible for protecting their employers from an increasing tsunami of cyberattacks.
  
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggBYMHtsNb1I9ZQ__T5OJK0ZIOHCq3G7A8mmr-CAR7QlureRHiKW8f1Ax97VTyUVqjM2UW6CJyM9vJcZpDStpsX2KFKEvjHfYB6NEIRSJDTkqfAVe3PXXRnTiEBROJxc5nu_kFImE0RhfcwSJd6Ll2POp0MwdKAii9Jihlj2NW9RC33oIeM39rojNUisX0/s275/CCTV.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggBYMHtsNb1I9ZQ__T5OJK0ZIOHCq3G7A8mmr-CAR7QlureRHiKW8f1Ax97VTyUVqjM2UW6CJyM9vJcZpDStpsX2KFKEvjHfYB6NEIRSJDTkqfAVe3PXXRnTiEBROJxc5nu_kFImE0RhfcwSJd6Ll2POp0MwdKAii9Jihlj2NW9RC33oIeM39rojNUisX0/w244-h162/CCTV.jpg&quot; /&gt;&lt;/a&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzjMI3K-olhv_COX1Z2Gpqu17tLt2gtsB28Qea7Ud_A2WssHmbi-r7pE5TrBLPAkdcgqgVqFnKIxHAOYNe-WK6W6-NI6eVzdwXHsrpp9DYm74k7TGY_kb5ucFgMuRjjF-ia8ahp9hTap0CIW2o5Pc7JOEFlBiMz-mpGtmxANGZ86x-HPCNdFch5W4Uoxt8/s650/facial%20recognition.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzjMI3K-olhv_COX1Z2Gpqu17tLt2gtsB28Qea7Ud_A2WssHmbi-r7pE5TrBLPAkdcgqgVqFnKIxHAOYNe-WK6W6-NI6eVzdwXHsrpp9DYm74k7TGY_kb5ucFgMuRjjF-ia8ahp9hTap0CIW2o5Pc7JOEFlBiMz-mpGtmxANGZ86x-HPCNdFch5W4Uoxt8/w263-h162/facial%20recognition.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Not to be trusted&lt;/h3&gt;
  
China certainly has a long history of spying on its own people and &lt;a href=&quot;https://asia.nikkei.com/static/vdata/infographics/china-spends-more-on-controlling-its-1-dot-4bn-people-than-on-defense/&quot;&gt;spends nearly twice as much on internal security as it does on external security&lt;/a&gt;. It has the world’s most intensive &lt;a href=&quot;https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/chinese-surveillance-ecosystem-and-the-global-spread-of-its-tools/&quot;&gt;surveillance network&lt;/a&gt; of CCTV cameras in every city, town, and village street. It has pioneered the use of AI facial recognition software to identify and track each of its nearly 1.4 billion residents. The Ministry of State Security (MSS) has listening posts across cities and in public spaces, intercepts conversations, phone calls, and decrypts secure IP-based communications while restricting access to the Internet via the legendary &lt;a href=&quot;https://cs.stanford.edu/people/eroberts/cs181/projects/2010-11/FreeExpressionVsSocialCohesion/china_policy.html&quot;&gt;Great Chinese Firewall&lt;/a&gt; that blocks news coming into China and prevents Chinese citizens from communicating outside. The PRC has become the Big Brother state envisioned in George Orwell&#39;s novel &quot;1984&quot;, which of course is banned in China. Only North Korea could aspire to greater levels of surveillance. I say &#39;aspire&#39;, because in the DPRK, the supply of electricity is intermittent at best outside of Pyongyang and surveillance technology requires power.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;
  
The ruling &lt;a href=&quot;https://www.scmp.com/news/china/politics/article/3268723/chinas-communist-party-track-100-million-members-years-end&quot;&gt;100.27 million&lt;/a&gt; strong Chinese Communist Party, (CCP), has for many years been accused of suffering from a well founded paranoia that China’s 1.4 billion citizens will rise up in a counter-revolution against the corruption of the country’s communist ruling elite. Perhaps that’s a real risk as rising living standards can no longer be assured to buy-off the population, but this concern builds upon fears from the comparatively minor 1989 Tiananmen Square student protests requesting more freedoms from the party, a protest that saw party hardliners send in the tanks against their own citizens for daring to challenge the party. A popular uprising against the party elite is undoubtedly one of Xi’s greatest concerns today. Rising disparities of income, declining job opportunities especially among China&#39;s millions of annual graduates, and a growing recognition that the &#39;social contract&#39; that has allowed the CCP to remain in power has expired.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;
  
While some of the security failings of Chinese tech can simply be attributed to sloppy coding and poor quality-assurance, a problem that China has faced for decades across every industry, the fact is that few trust the technology or the ability of those running those companies to manufacture quality product free from interference by Chinese state or military agencies. Xi Jin Ping has made it law across China for every company and citizen to work for the communist state’s interests. And few would risk all, to refuse a “request” by the Ministry of State Security to work on their behalf at any given time. That’s likely how China was able to insert hidden substrates into top-end Taiwanese &lt;a href=&quot;https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies&quot;&gt;SuperMicro motherboards&lt;/a&gt; being fabricated in Chinese factories. Motherboards that were later found to be calling home to China from the US Congress, from Google and Apple data centers, and other sensitive locations.
  
&lt;br /&gt;&lt;br /&gt;
  
But America spies on other countries too and has infiltrated sensitive networks all over the world. WekiLeaks published documents appearing to reveal &lt;a href=&quot;https://www.france24.com/en/20150623-us-spied-last-three-french-presidents-wikileaks-sarkozy-hollande-chirac&quot;&gt;NSA phone intercepts&lt;/a&gt; on French Presidents Jacques Chirac, Nicolas Sarkozy, and François Hollande from 2006 to 2012. The NSA also reportedly hacked the Iraqi military command and control network long before the second Gulf War and had been listening in on Iraqi communications for years. When the action started, it was able to effectively shut down Iraqi military and other communications making the alliance military’s job that much easier.  Iran’s uranium enrichment plant at Natanz was partially destroyed by the Stuxnet virus in a cyber-physical attack thought to have been developed by the NSA and delivered by Mossad. A virus that enabled the US and Israel to slow down Iraq’s quest to develop nuclear weapons, weapons that would likely be used against Iran’s enemies including Israel and perhaps even the USA.
  
&lt;br /&gt;&lt;br /&gt;
  
&lt;h3 style=&quot;text-align: left;&quot;&gt;Can the US be trusted by its allies and non-aligned countries?&lt;/h3&gt;
  
The Trump Administration has threatened the future of NATO, Five Eyes, and the overall western alliance. It has imposed debilitating tariffs against its principle trading partners which is isolating the United States and threatening globalization. US attempts to annex Greenland and Panama and absorb Canada against its will as the fifty-first state, have all shattered whatever trust that the US held with the rest of the world. The recent discovery of US agents trying to stir up a Greenland insurgency against rule from Copenhagen have hugely angered European allies. As has America’s apparent switching of sides against NATO and the EU to align with Putinist Russia over a Ukrainian land annexation in return for a succession of hostilities. A ploy most likely rooted in lucrative mineral contracts for the Trump family crime syndicate. It has also sent a very strong and alarming message to the rest of the world that America can no longer be relied upon even for the alliances it leads.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The recent raid of a multi-million dollar Hyundai battery plant under construction in the US state of Georgia by masked and armed ICE agents and the arrest, chaining in shackles, and temporary disappearance of 475 mostly Korean advisors has sent a very powerful message worldwide that the US is no longer to be trusted, nor is it safe to visit or work in.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The arrest and deportation of European tourists arriving in the USA for minor ESTA infractions have caused Canada, the UK, and several European nations, to issue travel advisories for their citizens due to concerns about new immigration policies, and potential arbitrary detentions. The result is a significant decline in visitors, an empty DisneyWorld this summer, and lots of availability on US international flights and many hotels.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Does that political distrust extend to American technology? &lt;/h3&gt;
  
The short answer is yes. American technology companies – Google, Apple, Microsoft, Oracle, Amazon, and others are all &#39;tarred by the same brush&#39; along with thousands of other US-based highly innovative tech companies. Nor have they done a good job of distancing themselves from the chaos of the White House. Quite the contrary in fact, as the leaders of many of these companies have openly become Trump sycophants. The recent Oligarch’s Dinner at the White House where each tech billionaire leader took turns to sickeningly pay homage on camera to the ‘Dear Leader’ is proof enough. This removed any plausible distancing between American Big Tech and Trumpism. But paying homage to Trump can have a huge cost, as Elon Musk discovered when Tesla sales plummeted world wide, damage that appears to be permanent.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
  
When trust in America vanishes, so does trust in its technology companies and its technology products and services. For cybersecurity companies, that eradication of trust could be devastating just as Kaspersky found itself in near ruin thanks to its Russian ties.
  
&lt;br /&gt;&lt;br /&gt;
  
The big question is what can the American technology sector do to distance itself from the chaos going on in Washington DC and can its reputation be saved before it’s too late, or does the whole sector go the way that Tesla went?
  
&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4452374383224681742'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4452374383224681742'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/09/can-american-cybersecurity-technology.html' title='Can American Cybersecurity Technology Still Be Trusted?'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLiqiAnvXDhveAxumm98WGq2VXSrIX96zkVMKOtZ2ZwrZqiaSAPyadNoLEzaCsP-J1jDS_47BgrkvfBDVr2ndbT9qinSyFJI_jFCAxEN2qmog57WrjtBQRseBT2qaxK3FGS_tZC6hxkOLozqOXyaTleP5mH3mnPd5BSm49PICLV-xhPcOG6b7GL_9yytb0/s72-w640-h328-c/A-Sobering-Snapshot-of-Distrust-in-America.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-5219321574482655976</id><published>2025-06-07T18:02:00.000+00:00</published><updated>2025-07-13T18:02:09.927+00:00</updated><title type='text'>Stalled spending on healthcare cybersecurity has impact</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhooELRJC-vjaMeqJWQ3gNQ5yPTAbRQooW7GO9NoNAflhB8oR54V8eeDA04XHlHYdLotqZsf33JjuIwAw8XciEBkwWQFZxUjkwPG5NuYT57RChVFJq2AkwYQv8Lmn2_dj9HFVJS8AQ5wJLyQAAixSr4LPrvtMhTxEPa9LSkSGWvDp8qXOZxy-oMj8gHSnDQ/s500/healthcare.png&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhooELRJC-vjaMeqJWQ3gNQ5yPTAbRQooW7GO9NoNAflhB8oR54V8eeDA04XHlHYdLotqZsf33JjuIwAw8XciEBkwWQFZxUjkwPG5NuYT57RChVFJq2AkwYQv8Lmn2_dj9HFVJS8AQ5wJLyQAAixSr4LPrvtMhTxEPa9LSkSGWvDp8qXOZxy-oMj8gHSnDQ/w640-h426/healthcare.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
  
&lt;br /&gt;
  
A recent report by research application security company&amp;nbsp;&lt;a href=&quot;https://www.indusface.com/&quot;&gt;Indusface&lt;/a&gt;, gave the US healthcare industry its worst privacy and security report yet. Over the past 24 months the report detailed a staggering 1,200 security and privacy breaches of which 83% of incidents exposed patient health information (PHI). This marks a new milestone for the industry and once again raises alarm bells about the lack of investment in healthcare IT or the prioritization of cybersecurity to offset rising attacks and escalating concerns related to patient safety. 
  
&lt;br /&gt;&lt;br /&gt;
  
Texas topped the charts with 66 data breaches exposing the data of over 14 million Texans with 4 millions of these attributed to a single breach at &lt;a href=&quot;https://www.concentra.com/about-us/notice-of-data-security-event/&quot;&gt;Concentra Health Services&lt;/a&gt; in January 2024. California came in second with over 9 million patient records exposed with approximately half attributed to &lt;a href=&quot;https://www.healthcaredive.com/news/blue-shield-california-data-breach-4-7-million-google/746280/&quot;&gt;Blue Shield of California&lt;/a&gt;’s sharing of patient data with Google Pixel used for advertising. 
  
&lt;br /&gt;&lt;br /&gt;
  
“The healthcare sector is vulnerable to these breaches due to both the vast amount of sensitive patient data, which is often sold to third parties for a high price, and weak or outdated software and systems,” said Venky Sundar, founder and president of Indusface.&amp;nbsp;
  
&lt;br /&gt;&lt;br /&gt;
  
Many of these alarming trends were backed by data in the recently published &lt;a href=&quot;https://www.verizon.com/business/resources/reports/dbir/&quot;&gt;2025 Verizon DBIR&lt;/a&gt;. The report confirmed that exploits have now overtaken phishing as a leading cause of data breaches. Not only is the healthcare industry running on old, often out-of-date and end-of-life, highly vulnerable software, but the application of patches, even when these are available, is slower than just about any other industry. The report listed an average lag time of over 200 days between the announcement of vulnerabilities, and the patching of vulnerable systems. Unlike other industries however, many of these critical systems are responsible for keeping patients alive or maintaining the confidentiality, integrity, and availability (CIA) of their personal health and identity data. 
  
&lt;br /&gt;&lt;br /&gt;
  
“If we compare healthcare to other industries, we can see a big difference in the investment in and prioritization of cybersecurity,” claimed Richard Staynings, Chief Security Strategist with New York based healthcare cyber security company &lt;a href=&quot;https://cylera.com/&quot;&gt;Cylera&lt;/a&gt;. “The financial services industry reinvests a good chunk of its operating profits in modern IT and well-equipped cybersecurity teams and tools. Healthcare, because much of the industry is setup to be ‘not for profit’, tends to downplay both its operating margins, and the percentage of operating profits allocated to cyber security. Putting aside the massive difference in the size of profits between industries, or the way operating margins are calculated, healthcare providers currently spend less than one tenth of what financial services spends - even though lives are at stake in hospitals, clinics, and other care facilities. Healthcare payers on the other hand have much bigger revenues with profits in the &lt;a href=&quot;https://www.forbes.com/sites/brucejapsen/2025/01/16/unitedhealth-group-2024-profits-hit-14-billion-despite-cyberattack-rising-costs/&quot;&gt;tens of billions&lt;/a&gt; of dollars annually, yet have still suffered some &lt;a href=&quot;https://www.beckershospitalreview.com/healthcare-information-technology/cybersecurity/change-healthcare-cyberattack-costs-to-reach-2-87b/&quot;&gt;massive cyber attacks&lt;/a&gt;. 
  
&lt;br /&gt;&lt;br /&gt;
  
The difference may be attributable to how boards and senior executives perceive and quantify both enterprise risk and cybersecurity return on investment (ROI) in one industry compared to the other. Risk is calculated by multiplying probability of loss by potential impact of loss. When this risk involves money, any high risk identified by a bank of potentially losing a million dollars in assets, or not being able to conduct business with customers for several hours (resulting in billions of dollars of lost revenue), will create a very compelling ROI for cybersecurity spend to quickly remediate that risk. In this case, the costs of &#39;action&#39; are often tiny compared to the possible or probable costs of &#39;inaction&#39;.” 
  
&lt;br /&gt;&lt;br /&gt;
  
Healthcare doesn’t qualify risk in the same way. Risks are usually perceived in different terms as clinical or operational risk. What is the risk of a 90-year-old patient undergoing anesthesia for a procedure? What is the probability of a negative outcome of a particular patient undergoing surgery compared to not being given that surgery? Business risks like operating profit typically come second, while cybersecurity risks often don’t even make it to the board room agenda for discussion. 
  
&lt;br /&gt;&lt;br /&gt;
  
Of course, some operational risks are becoming increasingly important as evidenced by many health systems declaring bankruptcy or going out of business entirely following a cyber attack. The recent &lt;a href=&quot;https://www.aha.org/change-healthcare-cyberattack-underscores-urgent-need-strengthen-cyber-preparedness-individual-health-care-organizations-and&quot;&gt;UHG Change Healthcare&lt;/a&gt; attack exposed the PHI of over 190 Americans. It more alarmingly, also caused a national outage which resulted in thousands of providers unable to bill for millions of services for weeks on end, or to receive pre-authorization for scheduled procedures or pharmaceutical medications. This caused major cash-flow problems resulting in expensive emergency bank loans to cover staff and other overheads while delaying hundreds of money-earning procedures as surgical staff sat idle for weeks or had to be furloughed. &lt;br /&gt;&lt;br /&gt;Operational risks are not just limited to outages of critical third parties but often to core hospital systems when a denial-of-service (DOS) attack or a ransomware attack is launched against a payer or provider. Both attacks are considered ‘&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/availability-attack&quot;&gt;availability attacks&lt;/a&gt;’ as they essentially render critical systems unavailable for use, stopping most business activity in its tracks. DOS attacks don’t generally last long, usually a few hours or a day or so before the attacker’s systems are blocked, and traffic is restored. However, a &lt;a href=&quot;https://ncua.gov/newsroom/ncua-report/2016/ransomware-serious-and-growing-threat&quot;&gt;ransomware attack&lt;/a&gt; will encrypt vital systems and data, shutting these down until a ransom payment is made, or the victim is able to rebuild and restore critical data and systems. The result is often a partial or full hospital outage for many weeks or sometimes several months. 
  
&lt;br /&gt;&lt;br /&gt;
  
Any outage will have an impact on financial operations, but this may also result in &lt;a href=&quot;https://www.ibm.com/think/insights/when-ransomware-kills-attacks-on-healthcare-facilities&quot;&gt;clinical or safety risk&lt;/a&gt; to patients by negatively impacting patient morbidity and mortality, and therefore legal liability of providers. But so too, will any cyberattack against patient data unless forensic investigation can irrefutably prove that regulated data was not touched or accessed by hackers. The HIPAA regulation terms this as a ‘data breach’, while security professionals would define this as an attack against the ‘confidentiality’ of protected data. Thus, regulatory risk, clinical risk, and liability risk are far more significant across healthcare when attacked. Despite this, investment in healthcare cybersecurity significantly lags behind other industries like financial services, even though lives maybe at stake. 
  
&lt;br /&gt;&lt;br /&gt;
  
Until such times that the industry gives greater priority to protecting the information systems that power modern digital healthcare, the sector will continue to be recognized as an easy target to attack by criminals. While growing regulatory fines, restitution, and punitive damages awarded by class action lawsuits are slowly changing the equation between ‘the costs of action versus inaction’, much of the US healthcare delivery industry stands on the edge of bankruptcy, despite the huge sums spent on health insurance each year. With basic concerns of survivability, healthcare cybersecurity will more than likely continue to be underfunded until meaningful structural healthcare reform is enacted.&amp;nbsp;&lt;/p&gt;&lt;p&gt;These risks exist before the Trump Administration&#39;s plans to decimate public healthcare funding under Medicaid and Medicare by removing 18 million patients from eligibility. These changes will disproportionately impact rural healthcare providers, whose patient populations heavily rely upon publicly funded healthcare programs. Even though 20% of rural patient populations typically have employer based private health insurance, this will not be enough to keep rural hospitals open, especially on top of UHG Change Healthcare losses. This could result in some rural populations being isolated from critical health services and potentially becoming 4 or 5 hours drive from the nearest trauma or stroke center. A journey many patients will be unlikely to survive.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The impacts of policy changes and unmitigated cybersecurity risks will therefore lead to significant changes in patient morbidity and mortality.
  
&lt;br /&gt;&lt;br /&gt;
  
In the absence of countries legislating to outright ban the payment of ransoms and other forms of extortion payments to cyber terrorists, it’s likely that ransomware will continue to plague the health sector given the criticality of this critical national industry. It’s therefore probable, that healthcare cyber attacks will continue to grow in both size and scope for the foreseeable future and as a result, that access to critical healthcare services can no longer be guaranteed.
  
&lt;br /&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5219321574482655976'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5219321574482655976'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/07/stalled-spending-on-healthcare.html' title='Stalled spending on healthcare cybersecurity has impact'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhooELRJC-vjaMeqJWQ3gNQ5yPTAbRQooW7GO9NoNAflhB8oR54V8eeDA04XHlHYdLotqZsf33JjuIwAw8XciEBkwWQFZxUjkwPG5NuYT57RChVFJq2AkwYQv8Lmn2_dj9HFVJS8AQ5wJLyQAAixSr4LPrvtMhTxEPa9LSkSGWvDp8qXOZxy-oMj8gHSnDQ/s72-w640-h426-c/healthcare.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-8789420261808259765</id><published>2025-04-16T22:21:00.013+00:00</published><updated>2025-09-23T20:59:02.035+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Chinese Cyber Espionage and IP theft"/><title type='text'>What is Cyber Espionage and why is it so concerning?</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj11vLQ9SQrqY9FsUjlx2_TTYzynzktfVbGLZ5KeKD8yimtI75ytHVZLi1zP75LDYClRM6rOSaF8RgktZgAk6XWjFbwQTvdyRp5pyIC45vfZ9u1q6X4hbEAiEghwB7I6-6W0pvDwtSqhyOZnKc0t9sO6LeZhj0X1RMbZI5EasP3D_U4K2R_ah8lUgtAA-7H/s1280/China.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;337&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj11vLQ9SQrqY9FsUjlx2_TTYzynzktfVbGLZ5KeKD8yimtI75ytHVZLi1zP75LDYClRM6rOSaF8RgktZgAk6XWjFbwQTvdyRp5pyIC45vfZ9u1q6X4hbEAiEghwB7I6-6W0pvDwtSqhyOZnKc0t9sO6LeZhj0X1RMbZI5EasP3D_U4K2R_ah8lUgtAA-7H/w640-h360/China.jpg&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;br /&gt;
  
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt; 

It&#39;s often said that there are two types of healthcare organizations, those that know they have been hacked and those that are still ignorant of the fact. In other words, just about everyone has already been hacked at least once by now. And that includes healthcare payers, providers, bio-pharma and the proliferation of healthcare vendors and suppliers.

&lt;br /&gt;
&lt;br /&gt; 

But while cyberattacks against availability of IT systems and data - principally Denial of Service (DOS) and Ransomware cyber extortion attacks seem to make the headlines almost every week, there are other stealthier attacks taking place in the background - almost constantly in fact. This involves the exfiltration of non-public data. Sometimes this is used for extortion in secondary and tertiary ransomware demands. This is often via a threat to release confidential non-public data unless an additional ransom is payed to the criminal perpetrators. 

&lt;br /&gt;&lt;br /&gt;

Other times, it is for the sale and monetization of data - patient identities, their prescriptions which can be filled and sold on the street, or other PHI or PII data - employee banking information for example. And sometimes perpetrators deliberately search for high value intellectual property data. This last category is usually referred to as &#39;cyber espionage&#39;, and only occasionally makes the front page of the press, usually then only when some government official makes a stink about the sheer levels of cyber espionage and intellectual property theft taking place.

&lt;br /&gt;
&lt;br /&gt; 

&lt;h3&gt;The Art of Espionage&lt;/h3&gt;

&#39;Espionage&#39; according to the Oxford Dictionary is the practice of spying or of using spies, typically by governments to obtain political and military information.

&lt;br /&gt;&lt;br /&gt;

So &#39;cyber espionage&#39; is chiefly about obtaining political and military information, not by the use of spies like 007 James Bond, but by means of cyber attacks and infiltration of non-public information systems. 

&lt;br /&gt;&lt;br /&gt;

The advent of the internet and the connectivity of government and health systems to the internet has made cyber espionage that much easier. You no longer need someone on-site or in-country - an insider threat,&amp;nbsp; spy or double agent to obtain valuable information. KGB spies like Rudolf Abel, Kim Philby, Oleg Gordievsky, Aldrich Ames, and Anna Chapman for example are a thing of the past in this age of hyper connectivity.

&lt;br /&gt;&lt;br /&gt;

Today all governments spy on one another - even between friends and allies. The US NSA was accused of hacking and listening into the &lt;a href=&quot;https://www.bbc.com/news/33248484&quot; target=&quot;_blank&quot;&gt;French President&lt;/a&gt;’s cell phone some years ago according to Wikileaks, and at that time at least, before the tariff war, France and the USA were friends and allies. 

&lt;br /&gt;&lt;br /&gt;

The USA spies on Iran to ascertain the level of uranium enrichment it has achieved since Trump in his first term pulled out of the Iran Nuclear Deal thinking he could negotiate a better deal and failed. The USA also spies on China, North Korea and Russia about each of these nation&#39;s military capabilities and a wide variety of other useful data points.

&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;The Art of Cyber Espionage and IP Theft&lt;/h3&gt;

But countries also occasionally spy on other forms of data. Enter the Peoples Republic of China and the huge revelation exposed by the &lt;a href=&quot;https://services.google.com/fh/files/misc/mandiant-apt1-report.pdf&quot;&gt;Mandiant APT1 Report&lt;/a&gt;&amp;nbsp;in 2013. If you have not yet read this, or a summary of this report, you really should do. It changed the game and our understanding of cyber espionage against commercial businesses. 

&lt;br /&gt;&lt;br /&gt;

APT1 is otherwise known as PLA Unit 61398 (61398部队) a military unit of the Chinese Communist Party, Peoples Liberation Army. These aren’t criminal hackers they are employees of the Chinese Communist State. They are paid to hack, but not just government or military secrets - in this case intellectual property and commercial trade secrets from businesses in other countries.

&lt;br /&gt;&lt;br /&gt;

China is famous for its &lt;a href=&quot;https://en.wikipedia.org/wiki/Great_Leap_Forward&quot;&gt;Great Leap Forward&lt;/a&gt;,&amp;nbsp;Mao’s attempt between 1959 to 1961 to take China from a feudal agrarian society to an industrial powerhouse. It failed and resulted in the death of 45 million people. Most of these starved to death, under Mao’s ill-conceived and badly run collective agriculture and industry policy. That’s more than double the total number of soldiers that died during WWII across all theaters to provide some perspective just how big a human calamity this was.

&lt;br /&gt;&lt;br /&gt;

After decades of isolation from the rest of the world, China has since the 1990s, once again been attempting another Great Leap Forward through rapid modernization and industrialization becoming the factory of the world for consumer goods. This time around however, China largely succeeded and has taken millions of its people out of abject poverty, through industrialization, urbanization and education.

&lt;br /&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Ownership of the Means of Production&lt;/h3&gt;

But in China the &#39;means of production&#39; is owned almost entirely by the state. CCP state owned industries dominate and even hold a majority share in joint ventures with global firms which are only allowed to own a 49% stake.
  
  &lt;br /&gt;&lt;br /&gt;

The ruling CCP also puts together 5 year plans. These ambitious documents usually discuss how China will be the global leader in EVs, or the largest manufacturer of pharmaceutical drugs, or the global leader in aeronautical engineering, etc. 

&lt;br /&gt;&lt;br /&gt;

But to reach these lofty goals, to make up for the lost years of communist isolationism and stagnation under Mao, and a lack of history, knowledge, and experience, China has had to obtain technologies, manufacturing capabilities, and a heap of other proprietary commercial trade secrets from industry leaders outside of the PRC - usually by what ever means at its disposal. Mostly this means through &#39;cyber espionage&#39; and is supplemented by process and procedure skills brought back from Chinese diaspora working overseas.

&lt;br /&gt;
&lt;br /&gt;

According to a 2022 report by &lt;a href=&quot;https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation&quot; target=&quot;_blank&quot;&gt;Cybereason&lt;/a&gt;&amp;nbsp;one China state actor alone, APT41, has siphoned off trillions of US dollars in intellectual property theft from approximately 30 multinational companies within the manufacturing, energy and pharmaceutical sectors. The Cybereason investigation entitled &#39;Operation CuckooBees&#39; was shared with the FBI, and discovered APT41 actively engaged in &#39;stealing the IP of drugs around diabetes, obesity, depression.&#39; Cyber-criminals were focused on obtaining blueprints for cutting-edge technologies, the majority of which were not yet patented, the report stated.

&lt;br /&gt;&lt;br /&gt;

Chinese IP theft&amp;nbsp;has included the theft of pharmaceutical drug formations, clinical trail methodologies and practices, manufacturing IP and much, much else. It has short-cut 50 plus years of IP development by global pharmaceutical companies, sometime including experimental drugs developed at over a decade or more at the costs of hundreds of millions of dollars, pounds and euros in R&amp;amp;D. China has even patented some these stolen experimental drugs and attempted to sell them back to the global markets that invented them and financed their research.

&lt;br /&gt;
&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Levels of Cyber Espionage and IP Theft&lt;/h3&gt;&lt;div&gt;Between 2018 and 2019, Bayer and Roche were both targeted by nation-state APT cyber attacks, aimed at &lt;a href=&quot;https://assureallc.com/the-silver-lining-cybersecurity-breaches-in-pharma-and-biotech-drive-innovation-and-resilience/&quot; target=&quot;_blank&quot;&gt;industrial espionage&lt;/a&gt;, and attempting to steal valuable intellectual property. Both companies claimed to have contained the breaches without significant data or intellectual property loss, but other biotech and pharmaceutical organizations have fared less well.
  
  &lt;br /&gt;&lt;br /&gt;
  
During COVID-19, both China, and to a lesser extent Russia, Iran, and the DPRK, were discovered to be attacking US, UK, German and other hospitals and bio-labs, in an attempt to steal cutting edge research into &lt;a href=&quot;https://www.theguardian.com/world/2020/nov/22/hackers-try-to-steal-covid-vaccine-secrets-in-intellectual-property-war&quot; target=&quot;_blank&quot;&gt;vaccine development and treatment regimens&lt;/a&gt;. This resulted in&amp;nbsp;&lt;a href=&quot;https://www.cnn.com/2020/05/13/politics/us-china-hacking-coronavirus-warning/index.html&quot; target=&quot;_blank&quot;&gt;CISA&lt;/a&gt;, the US Cybersecurity Infrastructure Security Agency, having to issue a warning about cyberattacks by China and others.
  
  &lt;br /&gt;&lt;br /&gt;
  
Intellectual property theft through cyber espionage for the Peoples Republic of China is strategic, state directed and financed, and seen as being critical for national development. Commercial trade secrets are stolen by the Chinese army and passed directly to army-run state-owned industries. These industries then leverage stolen research, or copy IP for incorporation in new pharmaceutical drugs and other products, which can then be sold on domestic or even overseas markets.

&lt;br /&gt;&lt;br /&gt;
  
According to the&amp;nbsp;&lt;a href=&quot;https://selectcommitteeontheccp.house.gov/media/press-releases/gallagher-williams-seek-answers-doj-chinese-ip-theft&quot;&gt;US Select Committee on the Chinese Communist Party&lt;/a&gt;, Chinese intellectual property theft was in 2023, estimated to cost the US taxpayer $600 billion per year. This is why &#39;cyber espionage&#39; is considered so important today for both China which is acquiring it, and the rest of the world which is losing it through cyber theft. 
  
  &lt;br /&gt;&lt;br /&gt;
  
China though is not just engaged in IP theft. Many of its cyber espionage attacks have been focused upon leverage in state negotiations. The cyberattack against Singapore Health (&lt;a href=&quot;https://graphics.straitstimes.com/STI/STIMEDIA/Interactives/2018/07/sg-cyber-breach/index.html&quot;&gt;SingHealth&lt;/a&gt;&amp;nbsp;in 2018) resulted in the theft of not only medical records but also prescription records for the Prime Minister and his entire cabinet. Again, this was a CCP China advanced persistent threat (APT) attack not to sell the exfiltrated data but to use it as leverage in Sino-Singapore trade negotiations.
  
&lt;br /&gt;&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;The Global Impact of Cyber Espionage&lt;/h3&gt;
  
Cyber espionage is one of the most significant and underreported threats to global security, economic stability, and technological innovation. As the digital frontier expands, so does the ease with which nation-states, particularly China, can infiltrate systems, steal intellectual property, and exploit sensitive data for strategic gain. Unlike conventional cyberattacks aimed at disruption or ransom, cyber espionage is systematic, state-sponsored, and deeply embedded in long-term national development strategies. With hundreds of billions lost annually to IP theft and growing evidence of espionage-driven leverage in geopolitical negotiations, the global community must recognize cyber espionage not just as a cybersecurity issue, but as a critical challenge to sovereignty, economic fairness, and the future of innovation.
  
&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/8789420261808259765'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/8789420261808259765'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/04/what-is-cyber-espionage-and-why-is-it.html' title='What is Cyber Espionage and why is it so concerning?'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj11vLQ9SQrqY9FsUjlx2_TTYzynzktfVbGLZ5KeKD8yimtI75ytHVZLi1zP75LDYClRM6rOSaF8RgktZgAk6XWjFbwQTvdyRp5pyIC45vfZ9u1q6X4hbEAiEghwB7I6-6W0pvDwtSqhyOZnKc0t9sO6LeZhj0X1RMbZI5EasP3D_U4K2R_ah8lUgtAA-7H/s72-w640-h360-c/China.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-1600227797218316935</id><published>2025-03-18T01:28:00.213+00:00</published><updated>2025-03-28T03:36:25.270+00:00</updated><title type='text'>The Change Healthcare Breach &amp; the Need to Secure Third Party Vendors</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMuAMl7TatLZmOMo7EPDCaLf4uYBaUpimhws3ju1DuieT27k73B2PkifQijt-xzSonkG-uVUq6A8wdPdLQyv8RH2Usui6Rvot1pEmSvKBpr9iFSAVTETz0_bhEMK8DQuFI_V7LeaUTQpiGohluT8QiVIpgU-eKGIKT5Ff7cv3d7yw3kQdo5KzJ1EYh_2c3/s960/UHG.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;540&quot; data-original-width=&quot;960&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMuAMl7TatLZmOMo7EPDCaLf4uYBaUpimhws3ju1DuieT27k73B2PkifQijt-xzSonkG-uVUq6A8wdPdLQyv8RH2Usui6Rvot1pEmSvKBpr9iFSAVTETz0_bhEMK8DQuFI_V7LeaUTQpiGohluT8QiVIpgU-eKGIKT5Ff7cv3d7yw3kQdo5KzJ1EYh_2c3/w400-h225/UHG.jpg&quot; width=&quot;550&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;br /&gt;

The &lt;a href=&quot;https://www.changehealthcare.com/&quot;&gt;Change Healthcare&lt;/a&gt; cyberattack, which exposed data of an estimated 190 million people, cost &lt;a href=&quot;https://www.unitedhealthgroup.com/&quot;&gt;UnitedHealth Group&lt;/a&gt; (UHG) around $2.87 billion in 2024, including $1.7 billion in direct response costs. Final costs after all the regulatory and punitive fines, damages, and restitution could be much higher, as with any healthcare breach.

&lt;br /&gt;&lt;br /&gt;

This was obviously a landslide attack - bigger and more impactful than all other healthcare cyberattacks anywhere in the world. This attack by Russian&amp;nbsp;group ALPHV completely overshadowed the Chinese theft of 78.8 million medical records during a 2015 cyberattack against &lt;a href=&quot;https://www.anthem.com/&quot;&gt;Anthem,&lt;/a&gt; now &lt;a href=&quot;https://www.elevancehealth.com/&quot;&gt;Elevance Health&lt;/a&gt; – at the time the largest healthcare data breach in history. 

&lt;br /&gt;&lt;br /&gt;

While any cyber-attack against a critical national infrastructure industry like healthcare is huge, the impact of the Change breach impacted the &lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Availability&lt;/span&gt;&lt;/b&gt; of healthcare services for a significant percentage of Americans who were unable to receive approval for medical procedures or even to pick up their pharmaceutical prescriptions. Yet our healthcare regulations which date from 1996 are myopically focused on the protection of &lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Confidentiality&lt;/span&gt;&lt;/b&gt; – something that is already lost to the vast majority of Americans thanks to countless overlapping cyber attacks.

&lt;br /&gt;&lt;br /&gt;

When all is said and done and dust finally clears after the Change attack, a number of smaller hospitals, clinics and other healthcare providers will have gone out of business depriving entire communities of tertiary healthcare, while patient morbidity and mortality figures will have spiked as a result of denial of needed medical procedures, or life extending prescription medications. This may have appeared to be a simple ransomware attack, but the national security implications are significant.

&lt;br /&gt;&lt;br /&gt;

&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;You can bet that the Russians and Chinese watched what happened with the Change failure and took extensive notes. &lt;/span&gt;&lt;/b&gt;
  
&lt;br /&gt;&lt;br /&gt;
  
Above all there is a very concerning danger that a similar or even bigger more impactful cyber attack could be executed against US healthcare through UHG or another dominant third party vendor that controls much of the US healthcare industry. As consolidation and vertical integration of US healthcare continues unabated, the emergence of single points of critical failure is inevitable and nothing is &#39;too big to fail&#39;. Especially in times of &#39;hybrid&#39; or &#39;grey warfare&#39; between nation states.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMAkFkiOcnIL8oSG6xHZcuo2MU8EczES_NISXys53wU0KIArgq6QIn13rLE0OjYAQ2c6ZT7QXos4g2FckH4K_M0j_jTl6oyPAcx94V7hOYn87lNnDokeMMro8NOpPvy35VVKJwDKM6LMFpSNamrLvf6SfdvDMQ0WQ2UJP3QR4olGCh9plSMUgeCGYCxL0-/s3493/IMG_2490_cropped.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1317&quot; data-original-width=&quot;3493&quot; height=&quot;151&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMAkFkiOcnIL8oSG6xHZcuo2MU8EczES_NISXys53wU0KIArgq6QIn13rLE0OjYAQ2c6ZT7QXos4g2FckH4K_M0j_jTl6oyPAcx94V7hOYn87lNnDokeMMro8NOpPvy35VVKJwDKM6LMFpSNamrLvf6SfdvDMQ0WQ2UJP3QR4olGCh9plSMUgeCGYCxL0-/w400-h151/IMG_2490_cropped.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;CHIMSS&lt;/h3&gt;
  

This was the subject of a cybersecurity panel discussion this week at the &lt;a href=&quot;https://colorado.himss.org/events/advocacy-day-and-cxo-breakfast&quot;&gt;Colorado HIMSS CxO Advocacy Breakfast Summit&lt;/a&gt;, where over 200 local Colorado healthcare leaders gathered with &lt;a href=&quot;https://gkc.himss.org/speaker-hal-wolf&quot;&gt;Hal Wolf&lt;/a&gt;, President and CEO of &lt;a href=&quot;https://www.himss.org/&quot;&gt;HIMSS&lt;/a&gt; to discuss the state of the healthcare industry in Colorado.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;With ransom attacks soaring in both the number of hospitals being hit and the extortion amount demanded, ransomware has become and existential threat to the survival of many healthcare delivery providers. According to the FBI, the healthcare industry is the top recipient of ransomware attacks because of its fragility, the need to restore patient services quickly, and its intolerance for downtime.&lt;br /&gt;&lt;br /&gt;

The Change cyberattack raised many concerns about the security of third-party vendors and single points of critical failure in a highly complex and intertwined healthcare ecosystem.

&lt;br /&gt;&lt;br /&gt;

Huge single points of failure like Optum Health which owns Change Healthcare under UnitedHealth Group, dramatically increases risk impact when that organization is attacked. This is especially concerning where “providers cannot quickly pivot to other healthcare clearing houses and service providers”, claimed &lt;a href=&quot;https://www.linkedin.com/in/howardhailedenver/&quot; target=&quot;_blank&quot;&gt;Howard Haile&lt;/a&gt;, CTO at &lt;a href=&quot;https://intermountainhealthcare.org/&quot; target=&quot;_blank&quot;&gt;Intermountain Health&lt;/a&gt;. “Very few were able to do this, and very few are setup to make such a switch quickly” he exclaimed.&lt;/div&gt;&lt;br /&gt;“It taught us that third-party assessments for risk aren’t very effective,” Haile added. “This wasn’t just a vendor going down. You suddenly can’t bill or receive payment; your entire revenue cycle grinds to a halt. It’s not the same as losing access to a few patient records, it’s an existential threat to your operations.”&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Another concern raised by &lt;a href=&quot;https://www.linkedin.com/in/rick-b-51735a3/&quot; target=&quot;_blank&quot;&gt;Rick Bohm&lt;/a&gt;, CISO at &lt;a href=&quot;https://pointsolutionsus.com/&quot; target=&quot;_blank&quot;&gt;Point Solutions Group&lt;/a&gt; is that the industry doesn’t properly assess risks of third-party vendors. “We are not testing third party systems to find vulnerabilities until it’s too late. I can guarantee that I can find similar vulnerabilities in the vast majority of vendor systems that healthcare relies upon every day” he claimed.

&lt;br /&gt;&lt;br /&gt;

With literally thousands of third party vendors, suppliers and outsourced services providers its impossible for a Regulated Entity (RE) to audit each of its third parties or to collect and validate SOC2 attestations of security compliance.

&lt;br /&gt;&lt;br /&gt;
  
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC9Q1MBTa7PpN_FSrr5bB3Wle2F_v3HpgLeUHRHqsHTFxrpg0L0g2Gta2IJ9Z-RdCVxsNSnvmsp5eiG8JmeR8gCqZK5Dkr_Iy1fKzX-z0w87FMwOyJu-5qXQDOn90JILBhZ19FqLltSh93rVRZrozIgyud9_V8V0Jcwpy7uVZLIi4EYJA4DDS-oOkZJkwI/s4032/IMG_2492.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;4032&quot; data-original-width=&quot;3024&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC9Q1MBTa7PpN_FSrr5bB3Wle2F_v3HpgLeUHRHqsHTFxrpg0L0g2Gta2IJ9Z-RdCVxsNSnvmsp5eiG8JmeR8gCqZK5Dkr_Iy1fKzX-z0w87FMwOyJu-5qXQDOn90JILBhZ19FqLltSh93rVRZrozIgyud9_V8V0Jcwpy7uVZLIi4EYJA4DDS-oOkZJkwI/s320/IMG_2492.jpg&quot; width=&quot;240&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

“Furthermore, we don’t know what connects to our medical networks” added &lt;a href=&quot;https://www.linkedin.com/in/richardstaynings/&quot; target=&quot;_blank&quot;&gt;Richard Staynings&lt;/a&gt;, Chief Security Strategist with &lt;a href=&quot;https://cylera.com/&quot; target=&quot;_blank&quot;&gt;Cylera&lt;/a&gt;. “75% of connected assets – network endpoints – are &lt;a href=&quot;https://www.hpnonline.com/sourcing-logistics/article/53095125/cyber-expert-shares-wisdom-on-medical-devices&quot; target=&quot;_blank&quot;&gt;not managed by IT&lt;/a&gt; and at most providers, security teams currently have very limited visibility into these IoT systems. Many don&#39;t even have an accurate count of what connects to their networks.&lt;br /&gt;&lt;br /&gt;

“Many of the medical devices on our networks are 20+ years old, written in EPROM, a programming language from the 1980s – and they are the secure ones! The newer devices run on Windows Embedded, in many cases using the same generation of code as Windows 95 or Windows XP and we all know how secure each of those are today. No one in this room would conduct their Internet banking on a Windows 95 or XP machine, yet we keep patients alive using similar era technology,” Staynings concluded.

&lt;br /&gt;&lt;br /&gt;

Yet, identifying assets, and assessing risks of IoT can be very time consuming and resource intensive. This is where AI comes into its element by automating the entire process because hospital CISOs can’t hire and retain enough staff to do this by any other means.

&lt;br /&gt;&lt;br /&gt;

“Used correctly, AI can be very powerful and very time saving. At Cylera we use Machine Learning (ML) to run passive protocol analysis engines that tell us what systems are communicating over the medical network and from that, can easily identify and risk assess devices unmanaged by IT,” Staynings stated. “That helps healthcare providers build ‘Zero Trust’ across their networks through segmentation and isolation of at-risk devices and other medical systems.&quot;

&lt;br /&gt;&lt;br /&gt;

There are certainly many good uses of AI across healthcare to help drive improvements in accuracy and efficiency, as other panels at the CHIMSS event discussed. The concern is when AI algorithmic / training data is poisoned by mis-labeled or deliberately inaccurate data. “We need to be on the lookout for adversarial machine learning and data poisoning,” agreed both Staynings and Bohm. 

&lt;br /&gt;&lt;br /&gt;

The recent supply chain attack against GitHub Action and other third parties is a growing concern and in healthcare we use hundreds, if not thousands of third-party vendors, suppliers, and outsourcers. Knowing that your vendors and their systems are secure and meet or exceed your security standards is now absolutely critical for an industry like healthcare.

&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/1600227797218316935'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/1600227797218316935'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/03/the-change-healthcare-breach-need-to.html' title='The Change Healthcare Breach &amp; the Need to Secure Third Party Vendors'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMuAMl7TatLZmOMo7EPDCaLf4uYBaUpimhws3ju1DuieT27k73B2PkifQijt-xzSonkG-uVUq6A8wdPdLQyv8RH2Usui6Rvot1pEmSvKBpr9iFSAVTETz0_bhEMK8DQuFI_V7LeaUTQpiGohluT8QiVIpgU-eKGIKT5Ff7cv3d7yw3kQdo5KzJ1EYh_2c3/s72-w400-h225-c/UHG.jpg" height="72" width="72"/><georss:featurename>Denver, CO, USA</georss:featurename><georss:point>39.7392358 -104.990251</georss:point><georss:box>11.429001963821158 -140.146501 68.049469636178856 -69.834001</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-4107482736478478538</id><published>2025-02-25T13:54:00.080+00:00</published><updated>2025-02-26T14:16:20.128+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DPRK Lazarus Group Crypto Heist"/><title type='text'>North Korea pulls off largest-ever theft in digital asset history</title><content type='html'>&lt;div align=&quot;center&quot; class=&quot;separator&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjWg7WT1kPv0pmRNADbIwmyDMTW-Im4p6wYt4yu2uu1oGUAmIyCU_1Ff8wO0aNtI-QRXxA6G1l8puBOaSvAXpv2h9Fwm1rT3vwMgsKi5IfE_tHk6bCDL6S8nguc4ZcLcVc387YNBi6K-_Xo4XIfqvKKzCWAIhmj5uqaXgewyL6hSXUzReZl8Piw9iYCkRf/s2880/Ethereum.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;427&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjWg7WT1kPv0pmRNADbIwmyDMTW-Im4p6wYt4yu2uu1oGUAmIyCU_1Ff8wO0aNtI-QRXxA6G1l8puBOaSvAXpv2h9Fwm1rT3vwMgsKi5IfE_tHk6bCDL6S8nguc4ZcLcVc387YNBi6K-_Xo4XIfqvKKzCWAIhmj5uqaXgewyL6hSXUzReZl8Piw9iYCkRf/w640-h427/Ethereum.webp&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;br /&gt;

The 21 February heist of Bybit, a Dubai-based cryptocurrency exchange removed a staggering $1.46 billion in cryptoassets according to initial reports. In fact, this incident is likely the biggest known financial theft of all time. Bybit is the world’s second-largest cryptocurrency exchange by trading volume, with over 50 million registered users worldwide as per a &lt;a href=&quot;https://www.prnewswire.com/in/news-releases/bybit-surges-to-50-million-users-in-40-days-leading-web3-and-global-compliance-302259397.html?utm_source=chatgpt.com&quot; target=&quot;_blank&quot;&gt; September 2024 report&lt;/a&gt;.

&lt;br /&gt;&lt;br /&gt;

Bybit disclosed that over 400,000 Ethereum and staked Ethereum coins were stolen during the heist. These were initially stored in a &quot;Multisig Cold Wallet,&quot; however the funds were somehow transferred to a hot wallet and then siphoned into wallets controlled by the attackers.

&lt;br /&gt;&lt;br /&gt;

&quot;The incident occurred when our ETH multisig cold wallet executed a transfer to our warm wallet. Unfortunately, this transaction was manipulated through a sophisticated attack that masked the signing interface, displaying the correct address while altering the underlying smart contract logic,&quot; &lt;a href=&quot;https://x.com/Bybit_Official/status/1892965292931702929&quot; target=&quot;_blank&quot;&gt;Bybit explained&lt;/a&gt;.

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Investigation&lt;/b&gt;&lt;/h3&gt;

According to crypto fraud investigator ZachXBT, the exploiter has already &lt;a href=&quot;https://t.me/investigations/217&quot; target=&quot;_blank&quot;&gt;split&lt;/a&gt; 10,000 ETH out of the &lt;a href=&quot;http://etherscan.io/tx/0xb61413c495fdad6114a7aa863a00b2e3c28945979a10885b12b30316ea9f072c&quot; target=&quot;_blank&quot;&gt;roughly 401,346 ETH stolen in the attack&lt;/a&gt; to 48 addresses.

&lt;br /&gt;&lt;br /&gt;

An independent investigation has revealed connections to the infamous &lt;a href=&quot;https://en.wikipedia.org/wiki/Lazarus_Group&quot; target=&quot;_blank&quot;&gt;Lazarus group&lt;/a&gt;. A day after the attack was disclosed by ByBit, Blockchain investigator ZachXBT shared findings connecting the hack to the DPRK-backed hacking group. ZachXBT submitted a detailed analysis of test transactions and connected wallets used just before the exploit, along with multiple graphs and timing analysis, which were added in its &lt;a href=&quot;https://x.com/arkham/status/1893033424224411885&quot; target=&quot;_blank&quot;&gt;X post&lt;/a&gt;.

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;DPRK Crime State&lt;/b&gt;&lt;/h3&gt;

The United States, South Korea, and Japan said in January that North Korean state-backed hacking groups &lt;a href=&quot;https://www.bleepingcomputer.com/news/security/us-govt-says-north-korea-stole-over-659-million-in-crypto-last-year/&quot; target=&quot;_blank&quot;&gt;stole over $659 million worth of cryptocurrency&lt;/a&gt; last year. Indeed, crypto and other financial theft is the primary avenue through which the heavily sanctioned Hermit Kingdom is able to obtain hard currencies for trade in illicit goods for its nuclear weapons and rocket programs.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;

However, one month earlier, blockchain analysis company Chainalysis painted a more dire picture, saying North Korean hackers &lt;a href=&quot;https://www.bleepingcomputer.com/news/security/north-korean-hackers-stole-13-billion-worth-of-crypto-this-year/&quot; target=&quot;_blank&quot;&gt;stole $1.34 billion in cryptocurrency in 47 cyberattacks&lt;/a&gt; throughout 2024, breaking their previous record of $1.1 billion from 2022.
&lt;br /&gt;

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4107482736478478538'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4107482736478478538'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/02/north-korea-pulls-off-largest-ever.html' title='North Korea pulls off largest-ever theft in digital asset history'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjWg7WT1kPv0pmRNADbIwmyDMTW-Im4p6wYt4yu2uu1oGUAmIyCU_1Ff8wO0aNtI-QRXxA6G1l8puBOaSvAXpv2h9Fwm1rT3vwMgsKi5IfE_tHk6bCDL6S8nguc4ZcLcVc387YNBi6K-_Xo4XIfqvKKzCWAIhmj5uqaXgewyL6hSXUzReZl8Piw9iYCkRf/s72-w640-h427-c/Ethereum.webp" height="72" width="72"/><georss:featurename>Pyongyang, North Korea</georss:featurename><georss:point>39.0392193 125.7625241</georss:point><georss:box>10.728985463821154 90.6062741 67.349453136178852 160.9187741</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-3142170128746910746</id><published>2025-01-27T00:37:00.005+00:00</published><updated>2025-01-27T00:38:45.068+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA Security Rule"/><title type='text'>2025 Proposed HIPAA Security Rule Changes</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
  
&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJuuRPYS4Bgu1S5-Wj382RKbsJFBZS4oqcFz98q37eZnx3ZMnzfpPISw67zVALBy-g19RciyWY39-0cNsTVSLfxluINin9tLe-02w4c4xMJOFNB86sRdeGriUSNV-dx1CXk0cNd1hzkhAbJsKXqVKjGmF-BZn2M7u7i7Vnt9EirDpMJZ_93qLp27BrnK8h/s2560/doctor-hands-holding-HIPAA-sign-scaled-2560x1280.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;2560&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJuuRPYS4Bgu1S5-Wj382RKbsJFBZS4oqcFz98q37eZnx3ZMnzfpPISw67zVALBy-g19RciyWY39-0cNsTVSLfxluINin9tLe-02w4c4xMJOFNB86sRdeGriUSNV-dx1CXk0cNd1hzkhAbJsKXqVKjGmF-BZn2M7u7i7Vnt9EirDpMJZ_93qLp27BrnK8h/w640-h320/doctor-hands-holding-HIPAA-sign-scaled-2560x1280.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Much Needed Update to HIPAA coming in 2025.&lt;/h3&gt;

A long overdue update the HIPAA Security Rule, last updated in 2013, is currently being drafted. Many things have changed in digital healthcare since the rules’ last update and today, the healthcare industry is near wholly reliant upon technology for the delivery of services to patients. This includes a rapid expansion of medical devices and other IoT systems, the widespread use of AI and in particular Machine Learning (ML) to mine vast data lakes of medical information now being generated by the industry. The updated rules also take account of widespread use of cloud and virtual technologies and includes provision for even newer technologies including virtual reality, and quantum computing.

&lt;br /&gt;&lt;br /&gt;

The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996, at a time when few hospitals or health insurance groups had made the transition to digital records and most users considered a 28.8kbps internet connection to be fast. WiFi, mobile devices, and 5G cellular were still distant dreams as was the meaningful exchange of information in digital format between all those involved in treating patients. The HIPAA Security Rule in particular, was considered out of date the moment it was published, although the act’s Privacy Rule has faired better. In 2009 the HITECH act updated the security requirements of HIPAA Covered Entities (CEs) and Business Associates (BAs) to take account of changes in technology and some major ambiguities in the language of the original rule. A further Omnibus update took place in 2013 for similar reasons.

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIvld4MyYKDVo5MLTHvunmCpgMLqRG2PYEhML0UIt7ONPypena6pmfX1FzNwiHzRGjbPdP79brQrHuEDySP_yl5iNr-DH9O9xCbwMxQOou3zw_kDo256rM3qR4c61qrdltkWTYqpUVEXDdKh0kRNNFMjig9oE_zNldFt6f86IEOi1vyYN8ZtxCRWmIFsUO/s730/HHS%20OCR%20back%20with%20random%20HIPAA%20audits.webp&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;614&quot; data-original-width=&quot;730&quot; height=&quot;252&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIvld4MyYKDVo5MLTHvunmCpgMLqRG2PYEhML0UIt7ONPypena6pmfX1FzNwiHzRGjbPdP79brQrHuEDySP_yl5iNr-DH9O9xCbwMxQOou3zw_kDo256rM3qR4c61qrdltkWTYqpUVEXDdKh0kRNNFMjig9oE_zNldFt6f86IEOi1vyYN8ZtxCRWmIFsUO/w400-h336/HHS%20OCR%20back%20with%20random%20HIPAA%20audits.webp&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;
  
What is Happening?&lt;/h3&gt;

On December 27th, HHS OCR announced a Notice of Proposed Rulemaking (&lt;a href=&quot;https://www.hhs.gov/hipaa/for-professionals/security/hipaa-security-rule-nprm/factsheet/index.html&quot;&gt;NPRM&lt;/a&gt;) to modify the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule to strengthen cybersecurity protections for electronic protected health information (ePHI).

  
The rule “seeks to strengthen cybersecurity by updating the Security Rule’s standards to better address ever-increasing cybersecurity threats to the health care sector.

&lt;br /&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;What is Changing?&lt;/h3&gt;

The NPRM proposes to strengthen the Security Rule’s standards and implementation specifications with new proposals and clarifications, including:

&lt;br /&gt;&lt;br /&gt;

&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Remove the distinction between “required” and “addressable” implementation specifications and make all implementation specifications required with specific, limited exceptions.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require written documentation of all Security Rule policies, procedures, plans, and analyses. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Update definitions and revise implementation specifications to reflect changes in technology and terminology. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Add specific compliance time periods for many existing requirements. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require the development and revision of a technology asset inventory and a network map that illustrates the movement of ePHI throughout the regulated entity’s electronic information system(s) on an ongoing basis, but at least once every 12 months and in response to a change in the regulated entity’s environment or operations that may affect ePHI.  &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt; Require greater specificity for conducting a risk analysis. New express requirements would include a written assessment that contains, among other things:   A review of the technology asset inventory and network map. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt; Identification of all reasonably anticipated threats to the confidentiality, integrity, and availability of ePHI. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Identification of potential vulnerabilities and predisposing conditions to the regulated entity’s relevant electronic information systems.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;An assessment of the risk level for each identified threat and vulnerability, based on the likelihood that each identified threat will exploit the identified vulnerabilities. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require notification of certain regulated entities within 24 hours when a workforce member’s access to ePHI or certain electronic information systems is changed or terminated. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Strengthen requirements for planning for contingencies and responding to security incidents. Specifically, regulated entities would be required to, for example: Establish written procedures to restore the loss of certain relevant electronic information systems and data within 72 hours. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Perform an analysis of the relative criticality of their relevant electronic information systems and technology assets to determine the priority for restoration. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Establish written security incident response plans and procedures documenting how workforce members are to report suspected or known security incidents and how the regulated entity will respond to suspected or known security incidents. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Implement written procedures for testing and revising written security incident response plans. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require regulated entities to conduct a compliance audit at least once every 12 months to ensure their compliance with the Security Rule requirements. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require that business associates verify at least once every 12 months for covered entities (and that business associate contractors verify at least once every 12 months for business associates) that they have deployed technical safeguards required by the Security Rule to protect ePHI through a written analysis of the business associate’s relevant electronic information systems by a subject matter expert and a written certification that the analysis has been performed and is accurate. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require encryption of ePHI at rest and in transit, with limited exceptions. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require regulated entities to establish and deploy technical controls for configuring relevant electronic information systems, including workstations, in a consistent manner. New express requirements would include: Deploying anti-malware protection. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Removing extraneous software from relevant electronic information systems. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Disabling network ports in accordance with the regulated entity’s risk analysis. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require the use of multi-factor authentication, with limited exceptions. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require vulnerability scanning at least every six months and penetration testing at least once every 12 months. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require network segmentation. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require separate technical controls for backup and recovery of ePHI and relevant electronic information systems. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require regulated entities to review and test the effectiveness of certain security measures at least once every 12 months, in place of the current general requirement to maintain security measures. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require business associates to notify covered entities (and subcontractors to notify business associates) upon activation of their contingency plans without unreasonable delay, but no later than 24 hours after activation. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Require group health plans to include in their plan documents requirements for their group health plan sponsors to: comply with the administrative, physical, and technical safeguards of the Security Rule; ensure that any agent to whom they provide ePHI agrees to implement the administrative, physical, and technical safeguards of the Security Rule; and notify their group health plans upon activation of their contingency plans without unreasonable delay, but no later than 24 hours after activation.&lt;/li&gt;&lt;/ul&gt;HHS OCR has requested feedback on the proposed rule changes be received from REs by March 7, 2025, after which the new rule will be drafted, and a final rule enacted approximately 6 months after that.&lt;br /&gt;&lt;br /&gt; 
  
Most of these proposed requirements are already being followed by larger and better funded HIPAA CEs, though not all BAs it seems. The proposed rules spell out in a more granular format, each of the ‘required’ and ‘addressable’ rules that CEs and BAs should already be following. What was considered ‘addressable’ is now however, a ‘requirement’ under the proposed rule changes.
  
&lt;br /&gt;&lt;br /&gt;
  
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAR2p2Nd53qfPXHcPOtHnp4s5etGpiE31mEoJnX9e7rh5r07Ke735Dy4YBCu0puvCxFyW9zdOxEfJ0bQUkrRBLxtsntrVGwbD-RyrEJq_X77kh4k4RqX1NyDVFroxSL9_oaWa4tDyn6m6bxykdU1x6-CLWeJR-emvBgdZ8y7ZwD_u-kGlaoRePVjI_FKyK/s325/rules.jpg&quot; style=&quot;clear: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;155&quot; data-original-width=&quot;325&quot; height=&quot;191&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAR2p2Nd53qfPXHcPOtHnp4s5etGpiE31mEoJnX9e7rh5r07Ke735Dy4YBCu0puvCxFyW9zdOxEfJ0bQUkrRBLxtsntrVGwbD-RyrEJq_X77kh4k4RqX1NyDVFroxSL9_oaWa4tDyn6m6bxykdU1x6-CLWeJR-emvBgdZ8y7ZwD_u-kGlaoRePVjI_FKyK/w400-h191/rules.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
  
&lt;h3 style=&quot;text-align: left;&quot;&gt;Of Specific Interest:&lt;/h3&gt;
  
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Language of the proposed rule change removes the distinction between ‘Covered Entity’ (CE) and ‘Business Associate’ (BA) and instead employs the term ‘Regulated Entity’ (RE).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Removal of distinction between ‘required’ and ‘addressable’. All are now requirements and must be implemented. Time limits are added to meet requirements and to become compliant.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Changes various terms in the HIPAA Security Rule such as ‘electronic media’ to take account of the wider use of VOIP technologies, telehealth, digital messaging, cloud, and AI.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;A complete asset inventory of all network-connected assets is now required along with a network map that illustrates the movement of ePHI throughout the RE network. This needs to be updated at least every 12 months or when new assets are joined to the network. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Each RE needs to know where all of its PHI resides on its network and in which systems, whether owned and operated by the RE or some other entity.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Makes it a requirement for network segmentation between operational and IT networks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Requires improved regular testing and security risk analysis that includes:&lt;/li&gt;&lt;li&gt;technology asset inventory and network map.&lt;/li&gt;&lt;li&gt;improved identification of threats, vulnerabilities, and risks to the CIA of PHI&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Requires improved audit of access to PHI by users.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Requires improved business continuity, contingency planning, and security incident response capabilities. &lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Requires the use of multi-factor authentication.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Sets minimum 24-hour notification time. This applies for BAs to notify CEs, and for subcontractors to notify BAs.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;What is Impacted?&lt;/h3&gt;If a Regulated Entity (RE) is fully compliant with the HIPAA Security Rule (as updated by HITECH and Omnibus) then very little changes. However, this is unlikely. The updated Security Rule proposal itself states that while conducting an audit of regulated entities against the current Security Rule, OCR found that “94 percent failed to implement appropriate risk management activities sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level.”&lt;br /&gt;&lt;br /&gt;This means that most REs have some work to do in order to catch up with existing Security Rule requirements, let alone the additional effort that will be required to come up to speed with the updated requirements. It also means that more effective risk assessment and analysis is required moving forward. &lt;br /&gt;&lt;br /&gt;The intent of this proposed rule change is to remove inconsistent application of the Security Rule across REs. In so doing, it removes the option for ‘reasonableness and appropriateness’ in connection with the costs of security controls, along with often misinterpreted ‘addressable’ implementation specifications to mean they are ‘optional’. These are now ‘required’ and are mandatory. &lt;br /&gt;&lt;br /&gt;Furthermore, the rule changes introduce the need to evaluate the ‘effectiveness’ of security controls in supporting the resiliency of the regulated entity. ‘Resiliency’ refers to the entity’s ability to withstand and recover from adverse events. In this regard the changes appear to recognize the vulnerability of REs to denial of service (DOS) and ransomware attacks, and the need to protect against these ‘availability’ attacks through increased resiliency. &lt;br /&gt;&lt;br /&gt;This implies the need for much improved business continuity, disaster recovery, and security incident response capabilities so that REs can be back up and running quickly following an incident or attack. It also implies the need for more resiliency in technology architectures using n+2 architectures where a second or third copy of an application can be used in times of need and switched into production quickly. The protracted healthcare downtimes that have impacted the industry recently have been largely caused by single points of failure, an encrypted EMR or other core system with no hot or warm standby, or the ransoming of a critical third party like Change Healthcare as examples.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;In Conclusion.&lt;/h3&gt;This long-awaited update to healthcare industry security requirements will help to address the chronic imbalance between a growing number of attackers and a largely weak and ill prepared cyber defense across payers and providers. It is intended to lead to massive improvements in security risk assessment and analysis, and the speedy remediation of identified security vulnerabilities. As such, the new rules should reduce the number of successful cyber-attacks, and thus will help to ensure that hospitals and other delivery partners are available in times of medical need by patients and the communities that they serve. Furthermore, these changes will help to reduce growing patient safety concerns, including increased morbidity and mortality when hospitals are under attack. &lt;br /&gt;&lt;br /&gt;The need to identify and keep track of connected assets, to know where data resides and moves across medical networks, and to segment operational and IT networks under the proposed rules will be a real deal changer for security. This is well known as the weakest link and is often referred to as the ‘open back door to healthcare security.’ Medical networks and IT / IoT have changed greatly over recent years, as has our reliance upon technologies to diagnose, monitor, treat, and manage patients in our largely digital healthcare system. It&#39;s therefore vital that our security controls keep pace with these and other changes.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/3142170128746910746'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/3142170128746910746'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/01/2025-proposed-hipaa-security-rule.html' title='2025 Proposed HIPAA Security Rule Changes'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJuuRPYS4Bgu1S5-Wj382RKbsJFBZS4oqcFz98q37eZnx3ZMnzfpPISw67zVALBy-g19RciyWY39-0cNsTVSLfxluINin9tLe-02w4c4xMJOFNB86sRdeGriUSNV-dx1CXk0cNd1hzkhAbJsKXqVKjGmF-BZn2M7u7i7Vnt9EirDpMJZ_93qLp27BrnK8h/s72-w640-h320-c/doctor-hands-holding-HIPAA-sign-scaled-2560x1280.jpeg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-3650823503243170236</id><published>2025-01-02T22:59:00.130+00:00</published><updated>2025-01-07T18:16:25.760+00:00</updated><title type='text'>2025 Healthcare Cybersecurity Predictions</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgde7Jik4vsTFfq3TjgVaFkvcVtQLmwTb_EGz29J-4CUYFDB1n7D-GchvWR9WGsZuOxmxKXeWd696Hxo7xgCGgvDugSa027tp4ttfZjSkAIGDJY354YIbb1KfZb-kG5bp6nFapHvjfheR79pq9CoprugnlO4Xzxlp-osY4blAtj_DtAtPbk0PGigf5AJ309/s1280/2025.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;337&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgde7Jik4vsTFfq3TjgVaFkvcVtQLmwTb_EGz29J-4CUYFDB1n7D-GchvWR9WGsZuOxmxKXeWd696Hxo7xgCGgvDugSa027tp4ttfZjSkAIGDJY354YIbb1KfZb-kG5bp6nFapHvjfheR79pq9CoprugnlO4Xzxlp-osY4blAtj_DtAtPbk0PGigf5AJ309/s320/2025.jpg&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
  
&lt;h3 style=&quot;text-align: left;&quot;&gt;Twenty Twenty-Five&lt;/h3&gt;

As someone who has been evangelizing the need for improved healthcare cybersecurity for decades, every year I am hopeful that the new year will be better for healthcare security - that there will be fewer breaches, less supply chain attacks, fewer denial-of-service attempts, and less ransomware attacks. However, statistics don’t lie, nor do trends, so it’s unlikely that I will get my wish in 2025.&lt;/div&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;

&lt;br /&gt;
  
&lt;h3&gt;The Global Cybersecurity Landscape&lt;/h3&gt;


Each year, more and more &lt;a href=&quot;https://www.thelancet.com/journals/lancet/article/PIIS0140-6736(24)01074-2/fulltext&quot; target=&quot;_blank&quot;&gt;healthcare&lt;/a&gt; payers, providers, and life sciences organizations are hit with devastating and costly cyber-attacks. Increasingly these cyber-attacks can impact entire communities. We saw this in West Texas in September and October of 2024 when both &lt;a href=&quot;https://www.infosecurity-magazine.com/news/ransomware-forces-umc-divert/&quot; target=&quot;_blank&quot;&gt;UMC&lt;/a&gt; and &lt;a href=&quot;https://www.infosecurity-magazine.com/news/texas-tech-university-breach/&quot; target=&quot;_blank&quot;&gt;Texas Tech University Health Sciences Center&lt;/a&gt; were hit with separate ransomware attacks. This essentially &lt;a href=&quot;https://eu.lubbockonline.com/story/news/healthcare/2024/10/17/umc-texas-tech-hsc-hits-third-week-impacted-by-cybersecurity-ransomware-attacks-it-outage/75687779007/&quot; target=&quot;_blank&quot;&gt;denied Level 1 trauma care&lt;/a&gt; to multiple communities impacting an area greater than 250 miles in diameter. It’s likely that we could see more of these high impact overlapping attacks in 2025, for various reasons, as I shall explain shortly.

&lt;br /&gt;&lt;br /&gt;

&lt;a href=&quot;https://www.aha.org/news/aha-cyber-intel/2024-10-07-look-2024s-health-care-cybersecurity-challenges&quot; target=&quot;_blank&quot;&gt;Healthcare is in the cross hairs&lt;/a&gt; and is both an easy and soft target for a growing number of opportunistic perpetrators. It has a large and sprawling supply chain, which when attacked can have &lt;a href=&quot;https://jamanetwork.com/journals/jama-health-forum/fullarticle/2823757&quot; target=&quot;_blank&quot;&gt;sweeping implications&lt;/a&gt; for industry players themselves. On top of that, as a critical national infrastructure industry, and in times of geopolitical conflict and cyber warfare, the industry is also a strategic political target. It is being hit from all sides - from organized crime syndicates to state actors, with a rising body of evidence to suggest &lt;a href=&quot;https://www.skopenow.com/news/the-rising-threat-of-state-sponsored-organized-crime&quot; target=&quot;_blank&quot;&gt;collaboration and coordination&lt;/a&gt; between the two groups.

&lt;br /&gt;&lt;br /&gt;

As a &lt;a href=&quot;https://www.weforum.org/stories/2024/04/cybercrime-target-sectors-cybersecurity-news/&quot; target=&quot;_blank&quot;&gt;critical national infrastructure industry&lt;/a&gt;, healthcare will I believe, be the recipient of increasing levels of government direct and indirect cyber assistance in 2025. Expecting small, independent, or even state-run healthcare providers to defend themselves against the might of the highly organized Russian Mafia crime syndicate or the offensive instruments of a pariah state’s  military and intelligence organizations, makes absolutely no sense. Thus, government will need to &lt;a href=&quot;https://www.theguardian.com/society/article/2024/jun/21/uk-national-crime-agency-russian-ransomware-hackers-qilin-nhs-patient-records&quot; target=&quot;_blank&quot;&gt;step in&lt;/a&gt;. We are seeing this already in the UK, EU, and Australia with much higher levels of direct involvement and intelligence sharing by government agencies. The US is expected to follow suit in 2025. However, very few governments are ready and prepared to directly protect their healthcare systems at present. 

&lt;br /&gt;&lt;br /&gt;

2025 will likely see even more ransomware attacks against healthcare providers. This will no doubt continue until such times that ransom payments and other forms of cyber extortion demand are finally and fully &lt;a href=&quot;https://www.bbc.com/news/technology-57173096&quot; target=&quot;_blank&quot;&gt;made illegal&lt;/a&gt;. Ransomware is a very lucrative industry, whose growth is being fueled by larger and larger payments from victims. Lack of resiliency across the healthcare industry combined with the critical need for operational availability, makes healthcare a prime target for such attacks. As such, expect many more.
  
&lt;br /&gt;
&lt;br /&gt;

Supply chain attacks against the thousands of third-party vendors, suppliers, and services providers will continue to be the open back door to a secure healthcare industry. Software supply chain attacks and strikes against critical &lt;a href=&quot;https://www.theatlantic.com/ideas/archive/2024/03/change-healthcare-alphv-blackcat-hackers/677650/&quot; target=&quot;_blank&quot;&gt;single points of failure&lt;/a&gt; across the array of healthcare infrastructure will likely continue for as long as the war with Russia does. This means that payers, providers, and life sciences organizations need to develop much stronger risk management processes around their multitude of third-party vendors. This should include full inventory and risk analysis of all organizations who have direct or indirect access to medical networks including third party applications and devices. Cyber-attacks against Synnovis, Change Healthcare, Microsoft, SolarWinds, and others have &lt;a href=&quot;https://www.securitymagazine.com/articles/100447-third-party-attack-vectors-are-responsible-for-29-of-breaches&quot; target=&quot;_blank&quot;&gt;wreaked havoc&lt;/a&gt; across hundreds of organizations with the attack of a single third-party. The return on investment for perpetrators is therefore huge. Expect many more in 2025.

&lt;br /&gt;&lt;br /&gt;

2025 will also see the rise of nation-state attacks. The recent &lt;a href=&quot;https://foreignpolicy.com/2024/12/19/salt-typhoon-hack-explained-us-china-cyberattack/&quot; target=&quot;_blank&quot;&gt;Salt Typhoon&lt;/a&gt; attack against critical infrastructure telecommunications providers by the Peoples Republic of China, and a dozen other Chinese Typhoon attacks, are an indication of growing geopolitical tensions as China, Russia, Iran, and the DPRK face off against the western world in what is being termed the ‘Axis of Resistance’. With Russia and Iran already engaged in &lt;a href=&quot;https://www.nato.int/docu/review/articles/2024/04/26/russias-hybrid-war-against-the-west/index.html&quot; target=&quot;_blank&quot;&gt;hybrid and proxy wars&lt;/a&gt;, cyber is being viewed increasingly as a convenient weapon of choice that inflicts damage and retribution without crossing a line that will result in a kinetic response from the attacked nation. All critical national infrastructure industries could be the target for increased attention by Axis powers and will need to prepare accordingly. Nation-state cyber-attacks will be 2025’s biggest single threat.

&lt;br /&gt;&lt;br /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxZOKOJcSXSN_vuQ05egvzy50LrI3TMzC945apwM9X2vn6craTd0omv7SC7ZUbuwubPnRuOJ2Z62YhTWSAv5jkFi0fZ22IgGyagmg8cJJ_KKpHfUlFfbhI05PZyznzXZRq6gnZrn80g9OZK_CrZdZWEoZpOleLz4MyrtgdYe6nQGFmfppo_yKArXk5LpSl/s1520/typhoon.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;1520&quot; height=&quot;264&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxZOKOJcSXSN_vuQ05egvzy50LrI3TMzC945apwM9X2vn6craTd0omv7SC7ZUbuwubPnRuOJ2Z62YhTWSAv5jkFi0fZ22IgGyagmg8cJJ_KKpHfUlFfbhI05PZyznzXZRq6gnZrn80g9OZK_CrZdZWEoZpOleLz4MyrtgdYe6nQGFmfppo_yKArXk5LpSl/w400-h264/typhoon.webp&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;h3&gt;Regulatory Changes&lt;/h3&gt;

2025 will likely see major changes to US healthcare regulation with the passage (sometime during the year) of the Health Infrastructure Security and Accountability Act (&lt;a href=&quot;https://djholtlaw.com/healthcare-cybersecurity-how-the-health-infrastructure-security-and-accountability-act-hisaa-can-protect-your-practice/&quot; target=&quot;_blank&quot;&gt;HISAA&lt;/a&gt;). This is the long-awaited update or replacement of the ailing and out-of-date 1996 HIPAA security rule which has governed the US healthcare industry for over two decades now. HISAA aims to transform healthcare cybersecurity by setting minimum standards and throwing much-needed financial support to healthcare providers. HISSA is still in the drafting stage at present, but will likely impose stricter cybersecurity standards, require audits, and stress tests, implement serious consequences for non-compliance while providing financial support to healthcare organizations that need help to enhance and improve their cybersecurity capabilities. 

&lt;br /&gt;&lt;br /&gt;

HISSA will no doubt help to move the cybersecurity needle, just as &lt;a href=&quot;https://nis2directive.eu/health/&quot; target=&quot;_blank&quot;&gt;NIS2&lt;/a&gt; in Europe and &lt;a href=&quot;https://www.ncsc.gov.uk/collection/cyber-assessment-framework/introduction-caf-collection&quot; target=&quot;_blank&quot;&gt;CAF&lt;/a&gt; in the UK are already beginning to do. But ‘compliant’ &lt;a href=&quot;https://c2risk.com/why-being-compliant-isnt-the-same-as-being-secure/&quot; target=&quot;_blank&quot;&gt;does not mean&lt;/a&gt; ‘secure’ and most regulations are out of date the day they are enacted. Its therefore important for healthcare entities to adopt a risk-based approach to security rather than a compliance-based one in its place. That means understanding what, and who, connect to hospital networks, assessing people, processes, and technologies, and conducting a full risk analysis to identify, track and remediate security vulnerabilities on an ongoing basis. This will become ever more important as new innovative technology is added to medical networks.&lt;/div&gt;
  
&lt;div&gt;&lt;br /&gt;&lt;/div&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW5XTNNrBysjXQGKg1zG_xG6NWf9WpDqog28STL6AUKXU5otOC3Bl3t-ck4ufMgQFu9z9LKzEhvIpC_5PcBYiAwl_RMUXwQc3ijxi3D0JQebk-33Bds5U9KtF46ZUPxPeXZYXuoavjmLgPiv13pgYLczmQ69NKV5zovNQSvZ_1c4ExfplE4sF9uRSvpd0r/s640/nasa-Q1p7bh3SHj8-unsplash.jpg&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;426&quot; data-original-width=&quot;640&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW5XTNNrBysjXQGKg1zG_xG6NWf9WpDqog28STL6AUKXU5otOC3Bl3t-ck4ufMgQFu9z9LKzEhvIpC_5PcBYiAwl_RMUXwQc3ijxi3D0JQebk-33Bds5U9KtF46ZUPxPeXZYXuoavjmLgPiv13pgYLczmQ69NKV5zovNQSvZ_1c4ExfplE4sF9uRSvpd0r/w320-h213/nasa-Q1p7bh3SHj8-unsplash.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;
  


&lt;h3&gt;New Technology&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;The healthcare industry creates more data than any other industry. To say that there are now healthcare &lt;a href=&quot;https://www.inovalon.com/blog/data-lakes-in-healthcare-use-cases-for-large-datasets/&quot; target=&quot;_blank&quot;&gt;data lakes&lt;/a&gt; would be an understatement. Each patient that is seen, diagnosed, and treated, creates vast amounts of useful medical data. This data can then be mined by healthcare data scientists and used to train artificial intelligence (AI) algorithms for machine-learning-based applications used for clinical decision support, and many other areas of medicine.&lt;/p&gt;&lt;br /&gt;

2025 will see these data lakes become even larger and combined with improvements in AI training to enhance the tools available to clinicians. But just like all data repositories, this highly valuable data needs to encrypted and protected. The &lt;a href=&quot;https://www.rsna.org/annual-meeting&quot; target=&quot;_blank&quot;&gt;RSNA Conference&lt;/a&gt; in November highlighted once again, the need for better encryption while revealing new advancements to radiological and medical imaging, thanks in part, to improvements in AI. This is leading to earlier diagnosis and opportunity to medically intervene in patient care, thus driving outcomes while reducing cost. 2025 will see a continuous growth in the capabilities of medical AI, including advances in precision medicine which one day, will totally change the entire paradigm of medical care and treatment of patients.

&lt;br /&gt;&lt;br /&gt;

But often AI is a new technology that introduces new risks. Its data, its algorithms, and its applications all need to be secured from new types of cyberattack, including data poisoning and adversarial machine learning. AI is also being used to weaponize existing malware strains and employed to attack victims by making that malware stealthy, almost impossible to detect, and deadly when its payloads are deployed on unsuspecting networks. 2025 will likely see the continued development of offensive AI attack tools by hackers. At the same time security software companies will be engaged in an &lt;a href=&quot;https://www.healthcareitnews.com/news/how-ai-transforming-cybersecurity-defense-and-offense&quot; target=&quot;_blank&quot;&gt;arms race&lt;/a&gt; to quickly develop defensive AI capabilities in their NDR, XDR and other security applications. &lt;a href=&quot;https://cylera.com/&quot; target=&quot;_blank&quot;&gt;Cylera&lt;/a&gt;, as an example, and as a next generation IoT security platform, has invested heavily in AI since the company’s founding. It continues to build and deploy new and enhanced AI capabilities that help to automate the orchestration of improved cybersecurity for customers. We will see a lot more AI in 2025 along with better automated security tools and platforms with much faster-than-human response times and the need for less intervention.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3&gt;Cybersecurity Resource Shortage&lt;/h3&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3nE6lumR_YrCqcSWJseb57CDQH1Rz5urC110hZCpLxx1c4hKrYzrLl3s0gQvSOhHyEsRcFUV_KrJFCPCqvg_IYZZP3TDgOdx7lGyivkN4ig6hHcQ8PWLmTN5Qyir79OtCxmZKv2hDyKATWrHCIV63KkAzLhWafXGGsf263T7jhqkF0Y3sQ_QSz-u5fFzs/s1920/phyo-min-VBCHfGtH79s-unsplash.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;961&quot; data-original-width=&quot;1920&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3nE6lumR_YrCqcSWJseb57CDQH1Rz5urC110hZCpLxx1c4hKrYzrLl3s0gQvSOhHyEsRcFUV_KrJFCPCqvg_IYZZP3TDgOdx7lGyivkN4ig6hHcQ8PWLmTN5Qyir79OtCxmZKv2hDyKATWrHCIV63KkAzLhWafXGGsf263T7jhqkF0Y3sQ_QSz-u5fFzs/w640-h320/phyo-min-VBCHfGtH79s-unsplash.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;br /&gt;&lt;br /&gt;The shortage of security professions reached &lt;a href=&quot;https://www.bankinfosecurity.com/how-are-we-going-to-fill-48-million-cybersecurity-jobs-a-26431&quot; target=&quot;_blank&quot;&gt;4.8 million&lt;/a&gt; in 2024, a growth of 19% over 2023. There simply aren’t enough soldiers to defend the fort against a rising number of attacks. In fact, according to the &lt;a href=&quot;https://www.weforum.org/stories/2024/04/cybersecurity-industry-talent-shortage-new-report/&quot; target=&quot;_blank&quot;&gt;World Economic Forum&lt;/a&gt;, the global talent shortage, could reach 85 million workers by 2030. While universities and training academies have stepped up their education offerings in cybersecurity, it will take many years before this shortage is addressed – if ever, given rising needs. 

&lt;br /&gt;&lt;br /&gt;

Burn-out and retention of cybersecurity professionals is a growing problem as the job of defending an organization, sometimes against truly overwhelming odds, becomes even tougher. The ‘Buck’ really does stop at the CISOs desk, yet CISOs remain relatively unempowered to make decisions around enterprise security risk. Many security leaders still lack direct access to the board to properly relay cyber-risk, despite years of industry groups telling CEOs they need to do so. That is slowly changing, and 2025 will likely see an evolution in the partnership between CISOs and their boards. 

&lt;br /&gt;&lt;br /&gt;

While job satisfaction and not feeling ignored remain critical for retention, so too does work-life balance for security teams and their leaders. ‘Return to the Office’ for many, has done little to off-set the practice of working around the clock, something that started during the COVID pandemic, covering for sick collogues and dealing with a huge uptick in security needs. It’s  important that security teams and their leaders feel needed and respected yet empowered by senior management not to feel the need to work every weekend. Achieving better work-life balance will be a major objective for many security leaders in 2025.
  
&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;In Conclusion&lt;/h3&gt;

2025 will be an evolution of what we saw in 2024 rather than any sort of revolutionary change in January. Domestic and international politics may have a significant role to play in both attack and defense, as both sides re-arrange their players and adjust their cyber strategies. The healthcare security threat surface will continue to expand as more and more devices and applications connect to medical networks and interoperability between healthcare systems continues to advance. Diligence will be critical, as will visibility and understanding of risk. Automation of security tools will become ever more important, as the shortage of people to watch screens becomes critical, and various forms of AI will likely play an increasing role in both healthcare applications and security.
  
&lt;br /&gt;

&lt;br /&gt;
  
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;This blog was first posted at the &lt;a href=&quot;https://cylera.com/2025-healthcare-iot-cybersecurity-predictions/&quot; target=&quot;_blank&quot;&gt;following location&lt;/a&gt;. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/3650823503243170236'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/3650823503243170236'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2025/01/2025-healthcare-cybersecurity.html' title='2025 Healthcare Cybersecurity Predictions'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgde7Jik4vsTFfq3TjgVaFkvcVtQLmwTb_EGz29J-4CUYFDB1n7D-GchvWR9WGsZuOxmxKXeWd696Hxo7xgCGgvDugSa027tp4ttfZjSkAIGDJY354YIbb1KfZb-kG5bp6nFapHvjfheR79pq9CoprugnlO4Xzxlp-osY4blAtj_DtAtPbk0PGigf5AJ309/s72-c/2025.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-4754398145823666731</id><published>2024-12-14T22:30:00.038+00:00</published><updated>2024-12-29T00:10:46.653+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2024"/><category scheme="http://www.blogger.com/atom/ns#" term="Change Healthcare"/><category scheme="http://www.blogger.com/atom/ns#" term="Synnovis"/><category scheme="http://www.blogger.com/atom/ns#" term="third-party"/><category scheme="http://www.blogger.com/atom/ns#" term="UHG"/><title type='text'>Healthcare Cybersecurity Year in Review</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS4Wym4UlBe7wK1VI70nEc4fljpUQtzcJeGeHv0M92FF7fWL9JDxgueFagrFzgqdjwDVK6MiU9Mz8o8Gq6lGSw7GuihES1bf_-1u-21_MbbuiOni0GqG5uAxFJ-ga9OWGZrxbh9MqQr2xARz98E06KCtG8IYAXwqPK0qBiqp_O9BTrEvh0ZipB13DIbjt4/s380/2024onblack.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;144&quot; data-original-width=&quot;380&quot; height=&quot;242&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS4Wym4UlBe7wK1VI70nEc4fljpUQtzcJeGeHv0M92FF7fWL9JDxgueFagrFzgqdjwDVK6MiU9Mz8o8Gq6lGSw7GuihES1bf_-1u-21_MbbuiOni0GqG5uAxFJ-ga9OWGZrxbh9MqQr2xARz98E06KCtG8IYAXwqPK0qBiqp_O9BTrEvh0ZipB13DIbjt4/w640-h242/2024onblack.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Twenty Twenty-Four will go down in history as another watershed year in healthcare cybersecurity. With 386 reported healthcare cyberattacks by the beginning of October, this year is &lt;a href=&quot;https://www.aha.org/news/aha-cyber-intel/2024-10-07-look-2024s-health-care-cybersecurity-challenges&quot; target=&quot;_blank&quot;&gt;on target&lt;/a&gt; to surpass even 2023, which was in itself, an especially bad year for healthcare cybersecurity attacks and breaches.&lt;br /&gt;&lt;br /&gt;These projections are supported by the &lt;a href=&quot;https://www.proofpoint.com/us/resources/threat-reports/ponemon-healthcare-cybersecurity-report&quot; target=&quot;_blank&quot;&gt;2024 Ponemon Healthcare Cybersecurity Report&lt;/a&gt;, which found that 92% of organizations experienced a cyberattack in the past 12 months—up from 88% in 2023, and that the cost of a healthcare data breach topped $4.7 million in 2024, making healthcare the single most expensive industry for ransomware and other cyber-attack clean-up costs. &lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;https://www.ic3.gov/&quot; target=&quot;_blank&quot;&gt;FBI&lt;/a&gt; via its Internet Crime Complaint Center (IC3) states that healthcare is now the primary industry target for ransomware gangs, while &lt;a href=&quot;https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf&quot; target=&quot;_blank&quot;&gt;HHS OCR&lt;/a&gt; acknowledges that ransomware attacks against the industry are up a staggering 278% since 2020.

&lt;br /&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Two Landmark Attacks&lt;/h3&gt;

&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 12px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 12px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnbVypQOmqLhyBYGTLWzVoM_qz47If041B2LJt-SWYxPXpK9-_W2S2eCWdIj823M6Jejn0FL7rpaDZ7kF0gYOonoAXX9pMuEVOyY6EDpG_d-LeiAtV6C_Hwzt606IXZ2_ISCApNWWmmI3Nauk9nbHk4AhTu0mizA-5n9RL4NXGartgAKqcowUsofJB4ZQV/s1085/unsplash_06012ac6af.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;186&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnbVypQOmqLhyBYGTLWzVoM_qz47If041B2LJt-SWYxPXpK9-_W2S2eCWdIj823M6Jejn0FL7rpaDZ7kF0gYOonoAXX9pMuEVOyY6EDpG_d-LeiAtV6C_Hwzt606IXZ2_ISCApNWWmmI3Nauk9nbHk4AhTu0mizA-5n9RL4NXGartgAKqcowUsofJB4ZQV/w320-h186/unsplash_06012ac6af.webp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;Twenty Twenty-Four will also go down in history as the year of the single biggest, most disruptive, and most expensive healthcare cyberattack to-date, when in February, &lt;a href=&quot;https://www.unitedhealthgroup.com/&quot; target=&quot;_blank&quot;&gt;United Healthcare Group’s&lt;/a&gt; (UHG) Change Healthcare was attacked and breached by Russian-speaking ransomware group ALPHV/BlackCat, impacting nearly every American and exposing the PHI of at least 150 million individuals. &lt;br /&gt;&lt;br /&gt;While the &lt;a href=&quot;https://www.beckershospitalreview.com/cybersecurity/the-change-healthcare-cyberattack-a-timeline.html&quot; target=&quot;_blank&quot;&gt;Change Healthcare&lt;/a&gt; attack becomes the new record holder, it effectively doubled breach numbers from the prior holder of the title - Anthem Health which in 2014 exposed the PHI of 78.8 million individuals in a landmark case. &lt;br /&gt;&lt;br /&gt;Despite paying the criminals a staggering $22 million ransom, UHG was unable to retrieve its data and was then hit with a second extortion demand not to publish stollen PHI the perpetrators had exfiltrated. This was according to UHG CEO &lt;a href=&quot;https://www.cnbc.com/2024/05/01/unitedhealth-ceo-says-company-paid-hackers-22-million-ransom.html&quot; target=&quot;_blank&quot;&gt;Andrew Witty&lt;/a&gt;&amp;nbsp;when on May 1st this year he was hauled in front of &lt;a href=&quot;https://thehill.com/homenews/4635480-unitedhealth-ceo-heat-cyberattack-senate/&quot; target=&quot;_blank&quot;&gt;Congress&lt;/a&gt;&amp;nbsp;to explain the breach that had paralyzed much of US healthcare and what UHG was doing about the mess. At the hearings, lawmakers described the UHG Change Healthcare attack was ‘the most significant and consequential cyberattack on the U.S. health care system in American history’.&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;The Change Healthcare attack severely &lt;a href=&quot;https://www.aha.org/news/news/2024-03-15-aha-survey-change-healthcare-cyberattack-having-significant-disruptions-patient-care-hospitals-finances&quot; target=&quot;_blank&quot;&gt;disrupted&lt;/a&gt; healthcare billing and payment operations for months, creating a huge backlog of unpaid claims, including problems with insurance approvals and Medicare reimbursements. It caused unprecedented financial and operational chaos for hundreds of medical facilities, physicians, and pharmacies as well as patients unable to gain approval for scheduled procedures or to pick-up their medications. It has placed hundreds of small and rural providers of healthcare at risk of closure, potentially depriving entire communities of tertiary health services.&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ-2RUBcF9bwUPY03aCjsPRtjEdV2uuBU_W1iYmFOvlSVTaDQomSD37jnP-nyFCJHZYsvn6yYohxXFd9njSln6MvhAwP-k6zacAVZME3nVd_ux_IxwNoicIJ0WrmmtyEM9syBv82qhMLHFOwILlBo9AnjgY7xMlFB-I0aPyzJM8Gv6RDkrqzS01EAhQ_-o/s1200/synnovis-logo.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;168&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ-2RUBcF9bwUPY03aCjsPRtjEdV2uuBU_W1iYmFOvlSVTaDQomSD37jnP-nyFCJHZYsvn6yYohxXFd9njSln6MvhAwP-k6zacAVZME3nVd_ux_IxwNoicIJ0WrmmtyEM9syBv82qhMLHFOwILlBo9AnjgY7xMlFB-I0aPyzJM8Gv6RDkrqzS01EAhQ_-o/w320-h168/synnovis-logo.webp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Another highly disruptive cyberattack took place in the United Kingdom when in July this year&amp;nbsp;&lt;a href=&quot;https://www.england.nhs.uk/london/synnovis-ransomware-cyber-attack/&quot; target=&quot;_blank&quot;&gt;Synnovis&lt;/a&gt;, a joint venture pathology partnership between SYNLAB, Guy’s and St Thomas’ NHS Foundation Trust and King’s College Hospitals NHS Trust, was hit by a cyber-attack. The ransomware attack impacted most NHS providers across South London and caused 800 life-saving operations to be cancelled, along with over a thousand other appointments to be forcibly rescheduled. It also led to hospitals being placed on divert and emergency ambulances redirected to the other side of London or to the home counties.&lt;br /&gt;&lt;br /&gt;The cyberattack has been attributed to Qilin, a Russian ransomware-as-a-service (RaaS) crime gang, this time with dual motivations so it seems. Qilin demanded $50 million in extortion, which was not paid in accordance with UK government policy, which prohibits making extortion payments to terrorists. The attack paralyzed services at London hospitals for many weeks. According to a recent report by &lt;a href=&quot;https://www.bloomberg.com/news/articles/2024-06-18/uk-hospital-hackers-say-they-ve-demanded-50-million-in-ransom&quot; target=&quot;_blank&quot;&gt;Bloomberg&lt;/a&gt;, while responding to questions about the breach through a messaging account long associated with the gang, a representative for the hackers said that they were very sorry for the people who suffered but refused to accept responsibility for the human cost. They suggested &#39;the attack was justified because it was in retaliation for the British government’s involvement in unspecified wars&#39;.&lt;br /&gt;&lt;br /&gt;In the first half of 2024, ransomware victims have paid an astonishing &lt;a href=&quot;https://blackcloak.io/ransomware-payments-surge-to-record-highs-in-2024-a-call-for-vigilance/&quot; target=&quot;_blank&quot;&gt;$459.8 million&lt;/a&gt; to cybercriminals, setting the stage for a potentially record-breaking year. These extortion payments are also fueling the growth of the ransomware industry, so attacks are only likely to get worse in future years so long as ransoms are paid.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Alarmingly, much of this illicit money ends up in Russia via a global money laundering network involving the Chinese triads and other organized crime groups. It thus acts as very useful form of hard currency for the country which is under massive trade and financial sanctions as a result of its war with Ukraine. It&#39;s no wonder then, that the Kremlin provides safe harbor and tacit protection for transnational crime groups operating out of the Russian motherland.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;A Common Thread&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFcwhTC8sROYQARcgtLkBk8tVhyBGbgYqsxa_uqkG29m1cYXEIpz-ptGidwYmw7U7TwTtO_ifNRtIRB-cmQk3odIicvygqQzb-7bGjjwLO_ItS7ZEn7k8So8UeYBM2uLJNgrypT7MHT0tXw6k-1i0CJqsfrNwITzgqgatfWEipvH5F_2zbA3EvG-vFu1U2/w320-h179/thirdparty.jpeg&quot; /&gt;&lt;/div&gt;&lt;br /&gt;Both Change Healthcare and Synnovis cyberattacks are indicative of a broader trend in healthcare, in that attacks are targeting third parties or business associates (BAs) to healthcare providers. According to John Riggi of the American Hospital Association (AHA), &lt;a href=&quot;https://www.aha.org/news/aha-cyber-intel/2024-08-05-third-party-cyber-risk-impacts-health-care-sector-most-heres-how-prepare&quot; target=&quot;_blank&quot;&gt;Fifty-eight percent&lt;/a&gt; of the 77.3 million individuals affected by data breaches in 2023 were due to an attack on a health care business associate - a 287% increase compared to 2022. Based upon the sheer size and impact of both Change Healthcare and Synnovis, it is highly likely that once the data is in for the year, 2024 will further drive this percentage. In other words, it’s no longer just healthcare payers and providers being attacked but their business associates which are now being actively targeted. &lt;br /&gt;&lt;br /&gt;Hospitals and other providers have done a great job over recent years of improving their security posture with better risk analysis, risk remediation and implementation of security controls, yet overall healthcare attacks continue to increase. This is largely because cyber criminals and pariah nation states are focusing on the weakest link, in this case, the huge number of third parties now involved in modern healthcare delivery. &lt;br /&gt;&lt;br /&gt;According to &lt;a href=&quot;https://www.aha.org/news/aha-cyber-intel/2024-08-05-third-party-cyber-risk-impacts-health-care-sector-most-heres-how-prepare&quot; target=&quot;_blank&quot;&gt;Riggi&lt;/a&gt;, &quot;simply put, the &#39;&lt;i&gt;bad guys&lt;/i&gt;&#39; - foreign ransomware groups, primarily Russian speaking - have mapped the health care sector and identified key strategic nodes to attack that would provide the most disruptive impact and access across the health care sector. These &quot;strategic nodes&quot; translate to ubiquitous third-party technology and service providers. The more widespread and critical the impact, the higher the ransom payment demand and the higher the likelihood that the victim will succumb to making the payment&quot;. Why hack or attack 1,000 hospitals when they can target the one common business associate and get all the data or disrupt all the hospitals that depend on that single mission-critical third-party provider?&lt;br /&gt;&lt;br /&gt;In fact, healthcare cyber attacks are all about maximizing disruption, not only to maximize payment pressure for the perpetrators, but also to cause damage and mayhem to critical national infrastructure in countries opposed to Russia’s expansive foreign policy stance, or to gain political advantage in the case of China or Iran. Together, these three adversaries of western liberal democracy are behind, or support and protect, the criminal actors involved in the majority of healthcare cyberattacks worldwide. &lt;br /&gt;&lt;br /&gt;So how is it that third parties are now the weak link in healthcare security? The fact is that modern healthcare relies upon literally thousands of different vendors, suppliers, service providers and IT and business processing outsourcers. Everything from core EMR / EPR systems like Epic and Cerner-Oracle, to hundreds of different medical device manufactures and third-party management companies that now adorn our modern digital care centers. From insurance, billing, and collections to lengthy supply chains for medical equipment and supplies, vendors who often have remote access to hospital networks. The list is almost endless, and many providers don’t even have a good understanding or an accurate inventory of who or what, has access to their medical networks, let alone the risks each group, device or system may introduce. IoT is a particular problem, and many unpatched and insecure medical devices are easily compromised by criminals.&lt;br /&gt;&lt;br /&gt;The Change Healthcare attack was the result of the vendor, &lt;a href=&quot;https://www.optum.com/en/about-us/optum-health.html&quot; target=&quot;_blank&quot;&gt;Optum&lt;/a&gt; (part of UHG) failing to use multi-factor authentication (MFA) or privileged access management (PAM) on a legacy jump server used to administer the Change environment by systems administrators. It is thought that Optum did not own software licensing for the jump server running an out-of-date operating system it inherited as part of the Change Healthcare acquisition. And since the whole Change Healthcare environment was in the process of being replaced with new applications built to Optum standards, the short-term risks were considered acceptable rather than to spend the time and money building a new temporary jump server accessible only to a small number of trusted internal staff. However, one of the authorized users of this system had reused a password on another account which had previously been compromised. With a little research, hackers were able to put two and two together and gain access to the complete Change Healthcare environment. &lt;br /&gt;&lt;br /&gt;Conversely, the Synnovis attack appears to have leveraged credentials from one of two prior attacks by a different Russian group, Black Basta, against its parent company, Synlab. Credentials, including VPN and MFA passwords that evidentially were not reset, nor was the Synlab environment really secure against common malware and other attacks. What was more alarming was that Synlab-Synnovis had very poor business continuity, disaster recovery and security incident response plans (BCP/DR/SIR) resulting in weeks lost restoring systems. This is something totally unacceptable to an ‘operations-critical’ industry like healthcare, where even short outages can lead to dramatic increases in patient morbidity and mortality. &lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Lessons Learned and Tougher Regulations&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw61Blo2E3sX0zDqr6jog7SVwnxdp7Atf7IX4TPWNfd4YZuplQS0vpIMKeHVFXA1PnRcgl0roqzfWVMh6jNwvW0_DjZnQ5HSb0zkZRPZhEC6LIQr7clOg0AX9ZBr482L8MqWsM96buO176wondu3QSJriqsqXE80CUVlNLKHN0GK5w1GVQhjZrfXajHCWv/s1600/Regulation.jpeg&quot; /&gt;&lt;/div&gt;&lt;br /&gt;Plainly the lessons here are that providers of healthcare services – in the US, &lt;a href=&quot;https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity/index.html&quot; target=&quot;_blank&quot;&gt;HIPAA&lt;/a&gt; ‘covered entities’ [CEs], need to mandate that every one of the hundreds of its third parties adhere to the same security standards, capabilities, and controls as hospitals themselves are required to meet. That means more regular and thorough security audits of all third parties. This is especially important, where the vendor is not big enough to provide evidence of ISO 27001 certification, or a SOC2 attestation that it meets key control objectives of the CE in question. [The&amp;nbsp;&lt;a href=&quot;https://cylera.com/&quot; target=&quot;_blank&quot;&gt;Cylera&lt;/a&gt;&amp;nbsp;platform, used by many providers across the world is ISO 27001 security certified as an example.]&lt;br /&gt;&lt;br /&gt;In Europe that means compliance to &lt;a href=&quot;https://www.nis-2-directive.com/&quot; target=&quot;_blank&quot;&gt;NIS2 standards&lt;/a&gt;, which in the UK translates to adoption of the National Cyber Security Centre’s &lt;a href=&quot;https://www.ncsc.gov.uk/collection/cyber-assessment-framework/introduction-to-caf&quot; target=&quot;_blank&quot;&gt;Cyber Assessment Framework (CAF)&lt;/a&gt; supported by regular &lt;a href=&quot;https://www.dsptoolkit.nhs.uk/&quot; target=&quot;_blank&quot;&gt;Data Security and Protection Toolkit (DSPT)&lt;/a&gt; reporting. [CAF and DSPT reporting are built into the Cylera platform, which secures many UK NHS Trusts.]&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=COM:2020:595:FIN&amp;amp;rid=1&quot; target=&quot;_blank&quot;&gt;Digital Operational Resilience Act (DORA)&lt;/a&gt;&amp;nbsp;which goes into effect on 17 January 2025 does not currently apply to healthcare providers, though it may have some impact on insurers. DORA is designed to “consolidate and upgrade ICT [information and communications technology] risk requirements” for the financial services industry and interestingly, has a major focus on third-parties and the impact of third-party risk. Whether some of its provisions are incorporated into NIS2, CAF and HISAA remain to be seen, but its impact on building resiliency and incident reporting and threat sharing is already having an impact across Europe.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;2025 will likely see new US healthcare regulations with the Health Infrastructure Security and Accountability Act (&lt;a href=&quot;https://djholtlaw.com/healthcare-cybersecurity-how-the-health-infrastructure-security-and-accountability-act-hisaa-can-protect-your-practice/&quot; target=&quot;_blank&quot;&gt;HISAA&lt;/a&gt;). This aims to transform healthcare cybersecurity by setting minimum standards and throwing much-needed financial support to healthcare providers. HISSA is still in the drafting stage at present, but will likely impose stricter cybersecurity standards, require audits, and stress tests, implement serious consequences for non-compliance while providing financial support to healthcare organizations that need help to enhance and improve their cybersecurity capabilities. &lt;br /&gt;&lt;br /&gt;HISSA will no doubt help to continue to move the needle, just as NIS2 and CAF are already beginning to do, but the threats from criminal and pariah state actors are unlikely to be reduced, at least in the immediate term. With an ever-expanding attack surface as new healthcare technologies including AI, mHealth, consumer medical wearables, and more and more medical devices are adopted and deployed, securing healthcare has become of game of cat-and-mouse or whack-a-mole. A seemingly never-ending cycle of identify, protect, detect, respond, and recover as new risks and vulnerabilities are discovered and addressed through remediation, or the implementation of compensating security controls.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;While compliance helps focus senior management attention and much needed resources for security, the principal security driver will always be risk and the need for improved visibility. But if you can&#39;t see &#39;what&#39; and &#39;who&#39; connects to your medical network how can you be expected to risk-assess an operations-critical, rapidly expanding healthcare threat surface to keep your patients and key health systems protected?&lt;p class=&quot;p1&quot; style=&quot;font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 12px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;This blog was first posted at the &lt;a href=&quot;https://cylera.com/2024-healthcare-cybersecurity-year-in-review&quot; target=&quot;_blank&quot;&gt;following location&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4754398145823666731'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4754398145823666731'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/12/healthcare-cybersecurity-year-in-review.html' title='Healthcare Cybersecurity Year in Review'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS4Wym4UlBe7wK1VI70nEc4fljpUQtzcJeGeHv0M92FF7fWL9JDxgueFagrFzgqdjwDVK6MiU9Mz8o8Gq6lGSw7GuihES1bf_-1u-21_MbbuiOni0GqG5uAxFJ-ga9OWGZrxbh9MqQr2xARz98E06KCtG8IYAXwqPK0qBiqp_O9BTrEvh0ZipB13DIbjt4/s72-w640-h242-c/2024onblack.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-7496588048080766714</id><published>2024-10-17T19:38:00.073+00:00</published><updated>2024-12-31T03:16:38.026+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Al Jazera"/><category scheme="http://www.blogger.com/atom/ns#" term="AlArabyia"/><category scheme="http://www.blogger.com/atom/ns#" term="CNN"/><category scheme="http://www.blogger.com/atom/ns#" term="GCF"/><category scheme="http://www.blogger.com/atom/ns#" term="Saudi Arabiya"/><category scheme="http://www.blogger.com/atom/ns#" term="TV Interview"/><title type='text'>Experts address AI, global security threats, &amp; solutions to cybercrimes</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ6EGYyN5KyTcJhUnzJqzWuRbCmvXXpSQgOR5mhCq5CsN44buGV-T91WqfQi7hO81h8UWYpBLQcohS2SoOyiyFgTN5rJl4aOclU6BY-9_BK4r5B4P5vQ8VOywXaV3XFfR6i1pSd4hAspibxh65Njh_tYu9kGy_fvSEGAGoHGXkWzDtfpcRKq8lloXQT8BI/s1549/ChrisRizRichard.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;696&quot; data-original-width=&quot;1549&quot; height=&quot;144&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ6EGYyN5KyTcJhUnzJqzWuRbCmvXXpSQgOR5mhCq5CsN44buGV-T91WqfQi7hO81h8UWYpBLQcohS2SoOyiyFgTN5rJl4aOclU6BY-9_BK4r5B4P5vQ8VOywXaV3XFfR6i1pSd4hAspibxh65Njh_tYu9kGy_fvSEGAGoHGXkWzDtfpcRKq8lloXQT8BI/w320-h144/ChrisRizRichard.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;

The annual cost of cybercrime is expected to reach $10 trillion dollars next year. To put that figure into context, in terms of GDP it would be the third biggest economy in the world after the US and China.

&lt;br /&gt;&lt;br /&gt;

From deep-fakes and disinformation to hacks and attacks on infrastructure, healthcare and security networks, cybercrime is becoming the number one challenge for law enforcement and intelligence agencies. And artificial intelligence is already changing the rules of the game.

&lt;br /&gt;&lt;br /&gt;

Our increasingly connected digital world makes us all more vulnerable to criminal gangs and state-sponsored hackers who can access our data and devices. Imagine handing over control of your bank account, your electric vehicle, even your pacemaker.

&lt;br /&gt;&lt;br /&gt;

So how is the international community responding? To gain insights into the scale and nature of the problem, Al Arabiya News’ Riz Khan met leading experts at the Global Cybersecurity Forum in the Saudi capital Riyadh.

&lt;br /&gt;&lt;br /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;
&lt;div&gt;&lt;iframe allowfullscreen=&quot;&quot; height=&quot;330&quot; src=&quot;https://video.cyberthoughts.org/2024.10.17_Experts_address_AI_global_security_threats_solutions_to_cybercrimes.mp4?start=5&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; width=&quot;580&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt; &lt;br /&gt; &lt;br /&gt; &lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/7496588048080766714'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/7496588048080766714'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/10/experts-address-ai-global-security.html' title='Experts address AI, global security threats, &amp; solutions to cybercrimes'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ6EGYyN5KyTcJhUnzJqzWuRbCmvXXpSQgOR5mhCq5CsN44buGV-T91WqfQi7hO81h8UWYpBLQcohS2SoOyiyFgTN5rJl4aOclU6BY-9_BK4r5B4P5vQ8VOywXaV3XFfR6i1pSd4hAspibxh65Njh_tYu9kGy_fvSEGAGoHGXkWzDtfpcRKq8lloXQT8BI/s72-w320-h144-c/ChrisRizRichard.png" height="72" width="72"/><georss:featurename>Riyadh Saudi Arabia</georss:featurename><georss:point>24.7135517 46.6752957</georss:point><georss:box>-3.5966821361788455 11.5190457 53.023785536178849 81.831545699999992</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-6735618477961395755</id><published>2024-10-11T19:57:00.008+00:00</published><updated>2024-12-28T21:45:19.656+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CII"/><category scheme="http://www.blogger.com/atom/ns#" term="CNI"/><category scheme="http://www.blogger.com/atom/ns#" term="Critical Infrastructure"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Wagner"/><category scheme="http://www.blogger.com/atom/ns#" term="cyberattack"/><category scheme="http://www.blogger.com/atom/ns#" term="FBS"/><category scheme="http://www.blogger.com/atom/ns#" term="GRU"/><category scheme="http://www.blogger.com/atom/ns#" term="NHS"/><category scheme="http://www.blogger.com/atom/ns#" term="Qilin"/><category scheme="http://www.blogger.com/atom/ns#" term="Russian"/><category scheme="http://www.blogger.com/atom/ns#" term="SVR"/><category scheme="http://www.blogger.com/atom/ns#" term="UK Ambulance Service"/><title type='text'>UK Ambulance Service</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivdcdD9lrDzJg-unPtQWTi7cwd0Ca0IUjI-y-o3gcZsfqkVwMRRKHf7JPWmff_mP777ZtKXhNLNtbZWfCYQ-0jpBpy0NPbIsVpZgImvy_K0dZSGpF_9AjsUEvs3NbfosnkS4yY6_E9Y688JR_8Ab1H1x4nBe832nTkejwRgkese5giJbZlFQha6RzOfaQA/s1400/Ambulance%201500x500.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;467&quot; data-original-width=&quot;1400&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivdcdD9lrDzJg-unPtQWTi7cwd0Ca0IUjI-y-o3gcZsfqkVwMRRKHf7JPWmff_mP777ZtKXhNLNtbZWfCYQ-0jpBpy0NPbIsVpZgImvy_K0dZSGpF_9AjsUEvs3NbfosnkS4yY6_E9Y688JR_8Ab1H1x4nBe832nTkejwRgkese5giJbZlFQha6RzOfaQA/w640-h214/Ambulance%201500x500.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;The UK Ambulance Service is the latest target of Russian hackers according to a recent report.&lt;br /&gt;&lt;br /&gt;Like much of the NHS and other critical infrastructure service providers across the country, Russian FSB, SVR, and GRU spies along with criminal proxies have been engaged in a coordinated campaign to infiltrate and reconnoiter large parts of the UK’s critical infrastructure services. This includes the Civil Service, the Ministry of Defence, and many of their contractors.&lt;br /&gt;&lt;br /&gt;One of the objects of these cyber-attacks has been key suppliers to the UK Ambulance Service. Here individuals working on the Ambulance Radio Program have been targeted from multiple directions by hackers in a credentials-harvesting campaign to potentially crash the entire communications system. This would leave ambulance command centres unable to communicate with drivers and the police or fire services or prevent them from receiving vital location information. &lt;br /&gt;&lt;br /&gt;The incident is believed to form part of a new Russian cyber warfare campaign dubbed by UK intelligence sources “Cyber Wagner”, in reference to the hardline Russian mercenary group run by the late Yevgeny Prigozhin.&lt;br /&gt;&lt;br /&gt;“This is the new front in Russia’s aggression against the West,” a western intelligence source monitoring the activity reported “We need to prepare Western states for more aggression and hybrid warfare from Moscow.”&lt;br /&gt;&lt;br /&gt;This week, MI5 director Ken McCallum announced that Russia is on a “&lt;a href=&quot;https://www.bbc.com/news/articles/cp8e15yr1gwo&quot;&gt;sustained mission&lt;/a&gt;” to create “mayhem” across Britain and Europe. The UK&#39;s &quot;leading role&quot; in supporting Ukraine means &quot;we loom large in the fevered imagination of Putin&#39;s regime&quot; and further acts of aggression on UK soil should be expected, he warned.&lt;br /&gt;&lt;br /&gt;This would not be the first time that critical UK systems have been besieged by cyber adversaries. Russian GRU agents have carried out &quot;arson, sabotage and more dangerous actions conducted with increasing recklessness&quot; since the UK backed Ukraine in its war with Russia, he added.&lt;br /&gt;&lt;br /&gt;The revelations come just months after hackers behind a catastrophic NHS cyber-attack in the summer were identified to be part of a &lt;a href=&quot;https://inews.co.uk/news/russians-hacked-nhs-systems-kremlin-protected-cyber-army-3131435?ico=in-line_link&quot;&gt;wider cyber army working under the Kremlin’s protection trying to destabilise the UK.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In June, healthcare services were disrupted across London after a major cyber-attack targeted &lt;a href=&quot;https://www.england.nhs.uk/london/synnovis-ransomware-cyber-attack/&quot;&gt;Synnovis&lt;/a&gt;, a pathology testing organisation, severely affecting services. This led to the &lt;a href=&quot;https://www.standard.co.uk/news/health/london-nhs-russian-b1175503.html&quot;&gt;cancellation&lt;/a&gt; of 8,349 acute outpatient appointments and 1,608 elective procedures across much of South London at King’s College Hospital, and Guy’s and St Thomas’ NHS Foundation Trusts and their associated hospitals and clinics. &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://www.theguardian.com/technology/article/2024/jun/05/who-are-qilin-the-cybercriminals-thought-behind-the-london-hospitals-hack&quot;&gt;Qilin&lt;/a&gt;, which was held responsible for the assault, is merely one arm of the wider web of hacking affiliates, using servers based in Russia to carry out attacks on UK critical infrastructure. The hackers said the incident was in response to “unspecified wars”. The attack on the NHS was a “major escalation” of the Kremlin’s use of cyber warfare through use of criminal proxies.&lt;br /&gt;&lt;br /&gt;As tensions continue to escalate, these attacks become less about opportunity for criminal profits and more about the desire to inflict damage to the critical infrastructure of another country. The fact that the Kremlin appears to be enlisting the support of criminal groups is not exactly a surprising development for many. It is widely acknowledged, that for many years,&amp;nbsp;the Russian State has been providing safe harbour to Russian organised crime syndicate members accused of crimes in other countries by refusing arrest or extradition requests. So long as perpetrators direct their criminal business to organisations outside of the Russian Federation, they are allowed to operate with near impunity.&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;Although no definitive connection has been proven between the Russian State, criminal gangs, or the Russian Mafia, a close working arrangement has been evident for quite some time according to &lt;a href=&quot;https://ecfr.eu/publication/crimintern_how_the_kremlin_uses_russias_criminal_networks_in_europe/&quot;&gt;cybersecurity experts&lt;/a&gt;. Despite this, certain state and non-state actors within Russia appear to be intent, if not on the cusp of, launching a cyberwar with the UK, Europe and North America.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/6735618477961395755'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/6735618477961395755'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/10/uk-ambulance-service.html' title='UK Ambulance Service'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivdcdD9lrDzJg-unPtQWTi7cwd0Ca0IUjI-y-o3gcZsfqkVwMRRKHf7JPWmff_mP777ZtKXhNLNtbZWfCYQ-0jpBpy0NPbIsVpZgImvy_K0dZSGpF_9AjsUEvs3NbfosnkS4yY6_E9Y688JR_8Ab1H1x4nBe832nTkejwRgkese5giJbZlFQha6RzOfaQA/s72-w640-h214-c/Ambulance%201500x500.jpg" height="72" width="72"/><georss:featurename>London, UK</georss:featurename><georss:point>51.5072178 -0.1275862</georss:point><georss:box>23.196983963821154 -35.2838362 79.817451636178845 35.0286638</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-5553535395906273442</id><published>2024-10-03T19:11:00.040+00:00</published><updated>2024-12-28T22:08:40.830+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="GCF Panel"/><category scheme="http://www.blogger.com/atom/ns#" term="Securing the Healthcare Sector amidst Technological Disruptions"/><title type='text'>The Pulse of Security</title><content type='html'>&lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh9dGlBeVXG-BJJ5frOLOmeLhS5s0H0cKHNUYRoy1bWZyM4K815cr7AehQBh7beGOvUV3lJ3tioX8iZvQTTypeMmU-pGTIG0Nhm1Nwehuf7DiSvDUZxjoR-1EeslHPXcNlEFWETzGdu7ly-ovOPkn1lMDAqCtZmhx5egUegyltZIpjCvswFK5yvU-AIAbf/s800/ThePulse%20of%20Security%20Panel-brightened.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;600&quot; data-original-width=&quot;800&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh9dGlBeVXG-BJJ5frOLOmeLhS5s0H0cKHNUYRoy1bWZyM4K815cr7AehQBh7beGOvUV3lJ3tioX8iZvQTTypeMmU-pGTIG0Nhm1Nwehuf7DiSvDUZxjoR-1EeslHPXcNlEFWETzGdu7ly-ovOPkn1lMDAqCtZmhx5egUegyltZIpjCvswFK5yvU-AIAbf/w640-h480/ThePulse%20of%20Security%20Panel-brightened.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

“Healthcare is increasingly reliant upon technology, whether interconnected systems or online platforms to deliver vital services, but with that reliance comes growing cyber threats. In fact, recent research from Check Point Software shows that the Healthcare Sector experienced an average of around 2,000 cyber-attacks per week in the second quarter of this year, increasing by 15 percent compared to last year. That puts healthcare in third place just behind education and military as one of the most targeted sectors.

&lt;br /&gt;&lt;br /&gt;

“Hackers target hospitals not just because they are gold mine of data but because many facilities are easy targets operating on outdated systems and devices. Needless to say, this is a very serious issue. Cyber-attacks are not just about accessing health insurance information and medical records, but they can force hospitals to shut down critical systems, putting patient care and even lives at risk.

&lt;br /&gt;&lt;br /&gt;

“So how do we navigate this, how can we protect our systems while still embracing innovation in healthcare? 

&lt;br /&gt;&lt;br /&gt;

&lt;div style=&quot;text-align: right;&quot;&gt;&lt;b&gt;Lara Habib, Senior Presenter, Alarabiya News Channel&lt;/b&gt;&lt;/div&gt;

&lt;br /&gt;&lt;br /&gt;

Listen to Richard Staynings, Junaid Nabi, and Mike Fell as they explore the challenges facing healthcare and suggest ways in which the industry can better protect itself from a growing wave of cyber-attacks in this 30-minute panel discussion at the Global Cybersecurity Forum 2024 in Riyadh, Saudi Arabia today.

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;&lt;iframe allowfullscreen=&quot;&quot; height=&quot;330&quot; src=&quot;https://video.cyberthoughts.org/The-Pulse-of-Security-GCF-Annual-Meeting-2024-Day-Two-YouTube.mp4&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; width=&quot;580&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5553535395906273442'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5553535395906273442'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/10/the-pulse-of-security.html' title='The Pulse of Security'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh9dGlBeVXG-BJJ5frOLOmeLhS5s0H0cKHNUYRoy1bWZyM4K815cr7AehQBh7beGOvUV3lJ3tioX8iZvQTTypeMmU-pGTIG0Nhm1Nwehuf7DiSvDUZxjoR-1EeslHPXcNlEFWETzGdu7ly-ovOPkn1lMDAqCtZmhx5egUegyltZIpjCvswFK5yvU-AIAbf/s72-w640-h480-c/ThePulse%20of%20Security%20Panel-brightened.jpg" height="72" width="72"/><georss:featurename>Riyadh Saudi Arabia</georss:featurename><georss:point>24.7135517 46.6752957</georss:point><georss:box>-3.5966821361788455 11.5190457 53.023785536178849 81.831545699999992</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-4810893544992008225</id><published>2024-09-30T17:08:00.074+00:00</published><updated>2024-12-30T21:30:31.734+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hospitals."/><category scheme="http://www.blogger.com/atom/ns#" term="Rural Healthcare"/><title type='text'>Rural Healthcare and the Catch22 of Cybersecurity</title><content type='html'>&lt;div align=&quot;center&quot; class=&quot;separator&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2D5W87Pfxm9FS-SbFJpV-NL41tGs7wr_WRxnV7xvLjoKEtw0pUW-x5xXhUJ7NbvF7JnNdx9YnWleubHVN2FdSFZMonxG0HYOTYGK7dwWzTMNnccK5kTdo_4EBvqifEQuFkQQyfDxREnO394QfBW8JF8YCN-9Ew69JGxOXZc_n865aa5gqK85D0-AvG7QV/s640/hush-naidoo-jade-photography-ZCO_5Y29s8k-unsplash.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;427&quot; data-original-width=&quot;640&quot; height=&quot;402&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2D5W87Pfxm9FS-SbFJpV-NL41tGs7wr_WRxnV7xvLjoKEtw0pUW-x5xXhUJ7NbvF7JnNdx9YnWleubHVN2FdSFZMonxG0HYOTYGK7dwWzTMNnccK5kTdo_4EBvqifEQuFkQQyfDxREnO394QfBW8JF8YCN-9Ew69JGxOXZc_n865aa5gqK85D0-AvG7QV/w640-h429/hush-naidoo-jade-photography-ZCO_5Y29s8k-unsplash.jpg&quot; width=&quot;600&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;

&lt;div align=&quot;left&quot; class=&quot;separator&quot;&gt;&lt;/div&gt;
  
Rural America and Urban America can seem like two different worlds. Just look at the political map, or the disparity in wealth between ‘country folks’ and ‘city slickers’. Perhaps the most alarming difference, however, is the availability of basic healthcare services. &lt;br /&gt;&lt;br /&gt;If you live in rural America, you could be 2- or 3-hours’ drive away from the closest renal dialysis center, or radiotherapy and chemotherapy clinic. You may also be several hours away from the nearest stroke or trauma center which in an emergency, could mean the difference between life and death. &lt;br /&gt;&lt;br /&gt;

As for many other medical services, rural Americans must make do with what is available in their community - a local midwife rather than a maternity hospital ‘new life center’ staffed with neonatal experts and incubators in case they are needed. Go into labor early or present as a high-risk pregnancy and be prepared to be ambulanced or worse, air-ambulanced at huge expense, to a city hospital where you and your infant can be properly cared for. Today, anything other than basic medical services usually means a long drive to the nearest city.

&lt;br /&gt;&lt;br /&gt;

The trouble is, that what remains of rural health services is rapidly declining. Rural hospitals and entire rural health systems are closing, and those that remain open, are continuously reducing their specialist services, which may not be used enough to remain profitable or even to cover costs.

&lt;br /&gt;&lt;br /&gt;

A new &lt;a href=&quot;https://www.aha.org/2022-09-07-rural-hospital-closures-threaten-access&quot; target=&quot;_blank&quot;&gt;report&lt;/a&gt; from the American Hospital Association (AHA) states that 136 rural hospital closures have occurred between 2010 and 2021, and a record 19 closures in 2020 alone. Beckers, in a recent &lt;a href=&quot;https://www.beckershospitalreview.com/finance/20-states-with-most-rural-hospital-closures.html&quot; target=&quot;_blank&quot;&gt;article&lt;/a&gt; reviewed a larger period claiming that nearly 200 rural hospitals have closed since 2005. What’s even more alarming is the pace of closure is accelerating. Eight rural hospitals closed in 2023, as many as in 2022 and 2021 combined, according to the &lt;a href=&quot;https://ruralhospitals.chqpr.org/&quot; target=&quot;_blank&quot;&gt;Center for Healthcare Quality and Payment Reform&lt;/a&gt;&#39;s latest report. 2024 could be even worse, given the financial brinkmanship caused by the &lt;a href=&quot;https://www.hklaw.com/en/insights/publications/2024/06/change-healthcare-cybersecurity-incident-financial-impact&quot; target=&quot;_blank&quot;&gt;UHG Change Healthcare cyberattack&lt;/a&gt;.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;

Just last month, the Eastern Plains Healthcare Consortium (EPHC) stated during its &lt;a href=&quot;https://www.easternplainshealth.org/2024-annual-meeting&quot; target=&quot;_blank&quot;&gt;annual conference&lt;/a&gt; that 20% of rural hospitals in Colorado are at risk of closing. They require a 4% operating margin to replace equipment and maintain existing services, however, nearly all are currently running in the red, some as much as -17%. EPHC estimates that some 30 rural Colorado hospitals will be forced to convert to emergency only services as Emergency Rural Health Hospitals to save closing altogether.

&lt;br /&gt;&lt;br /&gt;

Some of these hospital closures are the result of cyber-attack and in particular, one recent Illinois &lt;a href=&quot;https://www.nbcnews.com/tech/security/illinois-hospital-links-closure-ransomware-attack-rcna85983&quot; target=&quot;_blank&quot;&gt;hospital closure&lt;/a&gt; is blamed upon a 2021 ransomware attack that prevented it from submitting claims to payers for months, killing its cashflow and financial viability. Another small hospital had its entire payroll stolen in a cyberattack preventing it from paying any of its staff and placing it in financial peril.

&lt;br /&gt;&lt;br /&gt;

The Change Healthcare cyberattack earlier this year has exacerbated the plight of small providers and in particular rural clinics and physician practices. Many physicians are &lt;a href=&quot;https://www.ama-assn.org/practice-management/sustainability/change-healthcare-cyberattack&quot; target=&quot;_blank&quot;&gt;struggling&lt;/a&gt; to keep their practices afloat according to the American Medical Association (AMA) and even though UHG, the owner of Change Healthcare, has publicly said it will provide relief in the form of &lt;a href=&quot;https://www.aha.org/lettercomment/2024-03-04-aha-expresses-concerns-uhg-program-response-cyberattack-change-healthcare&quot; target=&quot;_blank&quot;&gt;Temporary Funding Assistance&lt;/a&gt; to impacted providers, this is very selective, one-sided and fraught with caveats according to Richard Pollack of the AHA in a letter to UHG.&lt;div&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Challenges for Rural Healthcare Providers&lt;/h3&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_fTXMofrnolfvmhaFopdP-jRY2gTEhVS480zPMvlwmLqr1h8vvdiwAoFIa_kABoikz4OU6oyQ8V-GwHHDmTH2mxuNyX3H0-dxWNYNYrq3r6s1Y9lJZf7FFisOCL49FGQ16655zW1uM9WjSNCUvbSFwulwNklr-bxCy_GBHMwgpTGcFh03g-uJvRqmZaA7/s480/There-is-an-approach-that-could-play-a-role-in-supplying-rural-areas-with-easier-access-to-health-care-Telemedicine_2029_40159611_0_14137210_500-224km30.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;371&quot; data-original-width=&quot;480&quot; height=&quot;247&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_fTXMofrnolfvmhaFopdP-jRY2gTEhVS480zPMvlwmLqr1h8vvdiwAoFIa_kABoikz4OU6oyQ8V-GwHHDmTH2mxuNyX3H0-dxWNYNYrq3r6s1Y9lJZf7FFisOCL49FGQ16655zW1uM9WjSNCUvbSFwulwNklr-bxCy_GBHMwgpTGcFh03g-uJvRqmZaA7/s320/There-is-an-approach-that-could-play-a-role-in-supplying-rural-areas-with-easier-access-to-health-care-Telemedicine_2029_40159611_0_14137210_500-224km30.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

Rural providers face many challenges: finances, through rural depopulation and a disproportionate number of rural patients on Medicare and Medicaid, general resource constraints, and huge difficulty attracting and retaining nursing, physician, and other staff. Most notable of these is the lack of trained and experienced cybersecurity staff to protect rural providers from an increasing volume of cyberattacks. 

&lt;br /&gt;&lt;br /&gt;

These hospitals run on a small number of IT generalists and often find it difficult to patch systems in a timely manner, let alone obtain the budget or expertise to implement security leading practices or the latest security tools and services. Many operate on end-of-life computer hardware and medical devices no longer supported by vendors. Compared to urban providers these hospitals are an easy target for criminals and are frequent victims of PHI breaches, ransomware, and other attacks. 

&lt;br /&gt;&lt;br /&gt;

Like their urban cousins, rural hospitals are undergoing a digital transformation to new clinical and IT systems. This involves the addition of more medical and other IoT systems including connected building management systems for HVAC, elevators, proximity door locks, CCTV cameras, and Pyxis drug cabinets. These systems dramatically expand the cyber threat surface and unless secured and maintained, can significantly elevate the risks of attack. But rural providers often lack the specialist skills to safely manage these systems. That is perhaps why, many are turning to a combination of Managed Services Providers (MSPs) and Managed Security Services Providers (MSSPs) to effectively outsource security and much of IT.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
  
&lt;div align=&quot;center&quot; class=&quot;separator&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4oPfpjG6o9NsQey32S9ALvL8lq9TghnTUeqirud84BA9XRZaVdIKd9ubjo6r0FH6mF70BDkKWtTEPmqC1u775c-iGxoXQpwTnZBvR5vMCJjGMSoUGn7ZP9xFrCwhwvWPG6D4aCD3qfl0vkc2FEvbMT8arjkRdXBIbe1-6iK29ylmDh73Dszi_92vNhit7/s900/rural-hospital-closings.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;400&quot; data-original-width=&quot;900&quot; height=&quot;178&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4oPfpjG6o9NsQey32S9ALvL8lq9TghnTUeqirud84BA9XRZaVdIKd9ubjo6r0FH6mF70BDkKWtTEPmqC1u775c-iGxoXQpwTnZBvR5vMCJjGMSoUGn7ZP9xFrCwhwvWPG6D4aCD3qfl0vkc2FEvbMT8arjkRdXBIbe1-6iK29ylmDh73Dszi_92vNhit7/w400-h178/rural-hospital-closings.webp&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
  
&lt;h3 style=&quot;text-align: left;&quot;&gt;Rural Healthcare Needs Help&amp;nbsp; &amp;nbsp;&lt;/h3&gt;MSPs and MSSPs will manage a large number of hospitals at the same time, and through a leveraged model can provide point expertise as needed in more or less any technology or vendor system. They can also implement advanced SaaS tools from &lt;a href=&quot;https://cylera.com/&quot; target=&quot;_blank&quot;&gt;Cylera&lt;/a&gt; and others to identify the growing number of connected assets and evaluate and prioritize risk remediation. Indeed, the incorporation of SaaS services is rapidly helping to drive improvements in rural provider cybersecurity, especially in medical device security, a growing problem for all healthcare providers.

&lt;br /&gt;&lt;br /&gt;

The advent of managed services has become particularly important given a new &lt;a href=&quot;https://www.aha.org/2024-06-10-aha-helps-secure-new-cybersecurity-resources-microsoft-and-google-assist-rural-hospitals&quot; target=&quot;_blank&quot;&gt;assistance program&lt;/a&gt; for rural hospitals orchestrated by the White House and the AHA in June of this year. Microsoft and Oracle have agreed to provide free and heavily discounted cybersecurity resources to assist rural hospitals with access to many of their security tools and technologies. However, so far, relatively few rural hospitals are &lt;a href=&quot;https://www.nextgov.com/cybersecurity/2024/09/under-quarter-rural-hospitals-are-using-white-houses-free-cyber-resource-program-official-says/399251/&quot; target=&quot;_blank&quot;&gt;taking advantage&lt;/a&gt; of a free program designed to thwart ransomware attacks according to the White House this week. Only 350 of the 1,800 small and rural US hospitals are currently leveraging this assistance program. 

&lt;br /&gt;&lt;br /&gt;

It appears that without MSP or MSSP help, many rural providers are simply unable to accept or implement these discounted tools or utilize the free security assessments because they don’t have the manpower bandwidth to do so. This is the Catch22 of providing security assistance to rural health providers. Thankfully, for some, the MSP/MSSP buffer is helping to facilitate this today. 

&lt;br /&gt;&lt;br /&gt;

While near term improvements to rural hospital cybersecurity will be of great assistance in helping to reduce cyberattacks, there are still long-term structural problems of maintaining the continued presence of rural providers and access to healthcare services for rural communities. The healthcare industry faces many problems, not least of which is unmitigated cybersecurity risk. While urban providers can rely upon numbers to maintain services and a plentiful supply of cybersecurity talent nearby to avoid the worst of the attacks, rural providers face almost insurmountable challenges. This is undoubtedly a larger political question of healthcare reform that the next administration will need to prioritize.

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;

&lt;span style=&quot;font-size: x-small;&quot;&gt;A version of this blog was initially published&amp;nbsp;&lt;a href=&quot;https://cylera.com/the-rural-healthcare-crisis-how-cybersecurity-threats-are-fueling-hospital-closures/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/span&gt;

&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4810893544992008225'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4810893544992008225'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/09/rural-healthcare-and-catch22-of.html' title='Rural Healthcare and the Catch22 of Cybersecurity'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2D5W87Pfxm9FS-SbFJpV-NL41tGs7wr_WRxnV7xvLjoKEtw0pUW-x5xXhUJ7NbvF7JnNdx9YnWleubHVN2FdSFZMonxG0HYOTYGK7dwWzTMNnccK5kTdo_4EBvqifEQuFkQQyfDxREnO394QfBW8JF8YCN-9Ew69JGxOXZc_n865aa5gqK85D0-AvG7QV/s72-w640-h429-c/hush-naidoo-jade-photography-ZCO_5Y29s8k-unsplash.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-5544297656471053928</id><published>2024-09-03T22:15:00.032+00:00</published><updated>2024-09-06T23:24:55.151+00:00</updated><title type='text'>Isn&#39;t it about time we secured BGP?</title><content type='html'>&lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgen1lajilkZYAw4WRb9iqfEgMUBkD_6mJlkNrWVJJI9Sp81uSVcIlPJmZhIB7a1KaiTyiHFor6syV3BO62Xt0Kqp9IZjfuBo529e0wUzadRsr5-hyPRPrSP9rndxRG_O5oMlSbQaccEi9OANfP-QVVS22Ho0kKzUEgG_MXy0qXHDUk8jc5nHY5V9QEywPu/s1920/matias-contreras-kQ4tZUEqyPw-unsplash.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgen1lajilkZYAw4WRb9iqfEgMUBkD_6mJlkNrWVJJI9Sp81uSVcIlPJmZhIB7a1KaiTyiHFor6syV3BO62Xt0Kqp9IZjfuBo529e0wUzadRsr5-hyPRPrSP9rndxRG_O5oMlSbQaccEi9OANfP-QVVS22Ho0kKzUEgG_MXy0qXHDUk8jc5nHY5V9QEywPu/w640-h426/matias-contreras-kQ4tZUEqyPw-unsplash.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt; &lt;br /&gt;Border Gateway Protocol or ‘BGP’ as it is more often referred to as, has been a staple of internet routing since the heady days of 1989 when TCP was finally getting into its stride, and the internet as we know it, was in its infancy. &lt;/p&gt;&lt;p&gt;BGP enables routers to determine the most efficient paths for data to travel across networks to ensure scalability and efficiency. The protocol allows network backbone providers to announce routes across networks and is the primary routing protocol used to exchange routing information between different autonomous systems on the internet. The trouble is that like many things to do with the internet it was never really designed to be secure and this leads to all kinds of problems as we shall see. &lt;br /&gt;&lt;br /&gt;BGP has been abused multiple times, since Al Gore claims to have invented the Internet. Joking aside - it was actually Vint Cerf and Bob Khan who are credited with the accomplishment, but BGP has suffered some pretty high-profile attacks that have caused outages, or even more alarmingly, to route traffic through a specific country – one known for its prolific cyber espionage practices. &lt;br /&gt;&lt;br /&gt;In 2008, a Pakistani ISP wanted to block access to YouTube within Pakistan but accidentally announced a BGP route that led to all of YouTube’s global traffic being redirected through Pakistan. This caused a worldwide outage of YouTube for several hours, although YouTube has probably never been faster in Pakistan before or since. &lt;br /&gt;&lt;br /&gt;Then in 2010, China Telecom “accidentally” advertised incorrect BGP routes that caused a significant amount of global internet traffic, including that of U.S. government and military sites, to be routed through China. Naturally, neither the US government nor the Department of Defense was very happy about that little so called “error”, especially considering at the time, not all government network traffic was being encrypted. &lt;br /&gt;&lt;br /&gt;More recently in 2018 cybercriminals hijacked BGP routes for Amazon’s Route 53 DNS service to redirect traffic intended for MyEtherWallet, a popular cryptocurrency wallet service, to a malicious server owned by the perpetrators. The attackers then stole users&#39; cryptocurrency by tricking them into entering their credentials on the fake site. &lt;br /&gt;&lt;br /&gt;The White House naturally has been considering options to replace or upgrade BGP with an improved authentication scheme to remove opportunities for abuse and cybercrime, including any cyber espionage that nation states may be considering. Its proposed solution is the Resource Public Key Infrastructure (RPKI) - a security framework designed to enhance the security of BGP by providing a way to cryptographically verify the ownership of IP address blocks and the authorization of networks to announce specific routes. &lt;br /&gt;&lt;br /&gt;To that end, the &lt;a href=&quot;https://www.whitehouse.gov/oncd/briefing-room/2024/09/03/press-release-white-house-office-of-the-national-cyber-director-releases-roadmap-to-enhance-internet-routing-security/&quot;&gt;White House&lt;/a&gt; has released a guidance document for ways of improving upon BGP in a proposed roadmap to enhance internet routing security. This includes the adoption of new technologies including RPKI. As a government press release stated today, “these recommendations are of particular importance to the networks used by critical infrastructure owners and operators, state and local governments, and any organization dependent on internet access for purposes that the entity considers to be of high value.” &lt;br /&gt;&lt;br /&gt;The press release went on to say that “by the end of the year, it is expected that over 60% of the Federal government’s advertised IP space will be covered by Registration Service Agreements (RSA), paving the way to establish Route Origin Authorizations (ROA) for Federal networks.” &lt;br /&gt;&lt;br /&gt;The White House is obviously taking the risks of major BGP attacks very seriously and is looking to protect against these apparent threats immediately. &lt;br /&gt;&lt;br /&gt;“Internet security is too important to ignore which is why the Federal government is leading by example by pushing for a rapid increase in adoption of BGP security measures by our agencies,” said White House National Cyber Director Harry Coker, Jr. “ONCD, along with our public and private sector partners, are guiding a risk-informed path forward towards our communal objective. We aim for this roadmap to mitigate a longstanding vulnerability and lead to a more secure internet that is vital to our national security and the economic prosperity of all Americans.” &lt;br /&gt;&lt;br /&gt;The full roadmap can be read or downloaded in PDF &lt;a href=&quot;https://www.whitehouse.gov/wp-content/uploads/2024/09/Roadmap-to-Enhancing-Internet-Routing-Security.pdf&quot;&gt;here&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div&gt;&lt;iframe src=&quot;//div.show/public&quot; style=&quot;border: none; height: 1px,width:1px; left: 0; position: absolute; top: 0; visibility: hidden;&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5544297656471053928'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5544297656471053928'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/09/isnt-it-about-time-we-secured-bgp.html' title='Isn&#39;t it about time we secured BGP?'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgen1lajilkZYAw4WRb9iqfEgMUBkD_6mJlkNrWVJJI9Sp81uSVcIlPJmZhIB7a1KaiTyiHFor6syV3BO62Xt0Kqp9IZjfuBo529e0wUzadRsr5-hyPRPrSP9rndxRG_O5oMlSbQaccEi9OANfP-QVVS22Ho0kKzUEgG_MXy0qXHDUk8jc5nHY5V9QEywPu/s72-w640-h426-c/matias-contreras-kQ4tZUEqyPw-unsplash.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-3156122306252861780</id><published>2024-08-30T14:00:00.066+00:00</published><updated>2024-09-19T22:24:07.154+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Healthcare Policy"/><category scheme="http://www.blogger.com/atom/ns#" term="Rural Health"/><title type='text'>The Growing Rural Healthcare Cybersecurity Crisis</title><content type='html'>&lt;div class=&quot;separator&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc3vTiBqSilJxEZlGNwFcxDMXh2GAR8Vw9l_gag0AzAzj1l2WjXAsKCZGxfbHeQJ6uWtqNfNE-YOfd16omBR5RwJDkcfrytejRJe3q5y-6u1nkdI6OeFlrfJOQLsPMueBJI9azR8sCMtb6BcTwbhOHVlzXkcfxC3bKJB0sPDWKrjtEsyXn-nB1q5D0dd6U/s640/online-marketing-hIgeoQjS_iE-unsplash.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;360&quot; data-original-width=&quot;640&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc3vTiBqSilJxEZlGNwFcxDMXh2GAR8Vw9l_gag0AzAzj1l2WjXAsKCZGxfbHeQJ6uWtqNfNE-YOfd16omBR5RwJDkcfrytejRJe3q5y-6u1nkdI6OeFlrfJOQLsPMueBJI9azR8sCMtb6BcTwbhOHVlzXkcfxC3bKJB0sPDWKrjtEsyXn-nB1q5D0dd6U/w640-h360/online-marketing-hIgeoQjS_iE-unsplash.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;br /&gt;
&lt;div class=&quot;separator&quot;&gt;&lt;/div&gt;

Rural America and Urban America can seem like two different worlds. Just look at the political map, or the disparity in wealth between ‘country folks’ and ‘city slickers’. Perhaps the most alarming difference, however, is the availability of basic healthcare services. 

&lt;br /&gt;&lt;br /&gt;

If you live in rural America, you could be 2- or 3-hours’ drive away from the closest renal dialysis center, or radiotherapy and chemotherapy clinic. You may also be several hours away from the nearest stroke or trauma center which in an emergency, could mean the difference between life and death. 

&lt;br /&gt;&lt;br /&gt;

As for many other medical services, rural Americans must make do with what is available in their community - a local midwife rather than a maternity hospital or ‘new life center’ staffed with neonatal experts and incubators in case they are needed. Go into labor early or present as a high-risk pregnancy and be prepared to be ambulanced or worse, air-ambulanced at huge expense, to a city hospital where you and your infant can be cared for. Today, anything other than basic medical services usually means a long drive to the nearest city. 

&lt;br /&gt;&lt;br /&gt;

The trouble is, that what remains of rural health services is rapidly declining. Rural hospitals and entire rural health systems are closing, and those that remain open, are continuously reducing their specialist services, which may not be used enough to remain profitable or cover costs. 

&lt;br /&gt;&lt;br /&gt;

A new &lt;a href=&quot;https://www.aha.org/2022-09-07-rural-hospital-closures-threaten-access&quot;&gt;report&lt;/a&gt; from the American Hospital Association (AHA) states that 136 rural hospital closures have occurred between 2010 and 2021, and a record 19 closures in 2020 alone. Beckers, in a recent &lt;a href=&quot;https://www.beckershospitalreview.com/finance/20-states-with-most-rural-hospital-closures.html&quot;&gt;article&lt;/a&gt; reviewed a larger period claiming that nearly 200 rural hospitals have closed since 2005. What’s even more alarming is the pace of closure is accelerating. Eight rural hospitals closed in 2023, as many as in 2022 and 2021 combined, according to the &lt;a href=&quot;https://ruralhospitals.chqpr.org/&quot;&gt;Center for Healthcare Quality and Payment Reform&lt;/a&gt;&#39;s latest report. 

&lt;br /&gt;&lt;br /&gt;

As recently as this month, the Eastern Plains Healthcare Consortium (EPHC) stated during its &lt;a href=&quot;https://www.easternplainshealth.org/2024-annual-meeting&quot;&gt;annual conference&lt;/a&gt; that 20% of rural hospitals in Colorado are at risk of closing. They require a 4% operating margin to replace equipment and maintain existing services, however, nearly all are currently running in the red, some as much as -17%. EPHC estimates that some 30 rural Colorado hospitals will be forced to convert to emergency only services as Emergency Rural Health Hospitals to save closing altogether. 

&lt;br /&gt;&lt;br /&gt;

Some of these hospital closures are the result of cyber-attack and in particular, one recent Illinois &lt;a href=&quot;https://www.nbcnews.com/tech/security/illinois-hospital-links-closure-ransomware-attack-rcna85983&quot;&gt;hospital closure&lt;/a&gt; is blamed upon a 2021 ransomware attack that prevented it from submitting claims to payers for months, killing its cashflow and financial viability. Another small hospital had its entire payroll stolen in a cyberattack preventing it from paying any of its staff and placing it in financial peril. 

&lt;br /&gt;&lt;br /&gt;

The &lt;a href=&quot;https://energycommerce.house.gov/posts/what-we-learned-change-healthcare-cyber-attack&quot;&gt;Change Healthcare cyberattack&lt;/a&gt; earlier this year has exacerbated the plight of small providers and in particular rural clinics and physician practices. Many physicians are &lt;a href=&quot;https://www.ama-assn.org/practice-management/sustainability/change-healthcare-cyberattack&quot;&gt;struggling&lt;/a&gt; to keep their practices afloat according to the American Medical Association (AMA) and even though UHG, the owner of Change Healthcare, has publicly said it will provide relief in the form of &lt;a href=&quot;https://www.aha.org/lettercomment/2024-03-04-aha-expresses-concerns-uhg-program-response-cyberattack-change-healthcare&quot;&gt;Temporary Funding Assistance&lt;/a&gt; to impacted providers, this is very selective, one-sided and fraught with caveats according to Richard Pollack of the AHA in a letter to UHG. 

&lt;br /&gt;  &lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Challenges for Rural Healthcare Providers &lt;/h3&gt;

Rural providers face many challenges: finances, through rural depopulation and a disproportionate number of rural patients on Medicare and Medicaid, general resource constraints, and huge difficulty attracting and retaining nursing, physician, and other staff. Most notable of these is the lack of trained and experienced cybersecurity staff to protect rural providers from an increasing volume of cyberattacks. 

&lt;br /&gt;&lt;br /&gt;

These hospitals run on a small number of IT generalists and often find it difficult to patch systems in a timely manner, let along obtain the budget or expertise to implement the latest security tools and services. Many operate on end-of-life computer hardware and medical devices no longer supported by vendors. Compared to urban providers these hospitals are an easy target for criminals and are frequent victims of PHI breaches, ransomware, and other attacks. 

&lt;br /&gt;&lt;br /&gt;

Like their urban cousins, rural hospitals are undergoing a digital transformation to new clinical and IT systems. This involves the addition of more medical and other IoT systems including connected building management systems for HVAC, elevators, proximity door locks, CCTV cameras, and Pyxis drug cabinets. These systems dramatically expand the cyber threat surface and unless secured and maintained, can significantly elevate the risks of attack. But rural providers often lack the specialist skills to safely manage these systems. That is perhaps why, many are turning to a combination of Managed Services Providers (MSPs) and Managed Security Services Providers (MSSPs) to effectively outsource security and much of IT. 

&lt;br /&gt;&lt;br /&gt;

MSPs and MSSPs will manage a large number of hospitals at the same time and through a leveraged model can provide point expertise as needed in more or less any technology or vendor system. They can also implement advanced SaaS tools from &lt;a href=&quot;https://cylera.com/&quot;&gt;Cylera&lt;/a&gt; and others to identify the growing number of connected assets and evaluate and prioritize risk remediation. Indeed, the incorporation of SaaS services is rapidly helping to drive improvements in rural provider cybersecurity, especially in medical device security, a growing problem for all healthcare providers. 

&lt;br /&gt;&lt;br /&gt;

The advent of managed services has become particularly important given a new &lt;a href=&quot;https://www.aha.org/2024-06-10-aha-helps-secure-new-cybersecurity-resources-microsoft-and-google-assist-rural-hospitals&quot;&gt;assistance program&lt;/a&gt; for rural hospitals orchestrated by the White House and the AHA in June of this year. Microsoft and Oracle have agreed to provide free and heavily discounted cybersecurity resources to assist rural hospitals with access to many of their security tools and technologies. However, so far, relatively few rural hospitals are &lt;a href=&quot;https://www.nextgov.com/cybersecurity/2024/09/under-quarter-rural-hospitals-are-using-white-houses-free-cyber-resource-program-official-says/399251/&quot;&gt;taking advantage&lt;/a&gt; of a free program designed to thwart ransomware attacks according to the White House this week. Only 350 of the 1,800 small and rural US hospitals are currently leveraging this assistance program. 

&lt;br /&gt;&lt;br /&gt;

It appears that without MSP or MSSP help, many rural providers are simply unable to accept or implement these discounted tools or utilize the free security assessments because they don’t have the manpower bandwidth to do so. This is the Catch22 of providing security assistance to rural health providers. Thankfully, for some, the MSP/MSSP buffer is helping to facilitate this today. 

&lt;br /&gt;&lt;br /&gt;

While near term improvements to rural hospital cybersecurity will be of great assistance in helping to reduce cyberattacks, there are still long-term structural problems of maintaining the continued presence of rural providers and access to healthcare services for rural communities. The healthcare industry faces many problems, not least of which is unmitigated cybersecurity risk. While urban providers can rely upon numbers to maintain services and a plentiful supply of cybersecurity talent nearby to avoid the worst of the attacks, rural providers face almost insurmountable challenges. This is undoubtedly a larger political question of healthcare reform that the next administration will need to prioritize. 

&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/3156122306252861780'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/3156122306252861780'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/08/the-growing-rural-healthcare.html' title='The Growing Rural Healthcare Cybersecurity Crisis'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc3vTiBqSilJxEZlGNwFcxDMXh2GAR8Vw9l_gag0AzAzj1l2WjXAsKCZGxfbHeQJ6uWtqNfNE-YOfd16omBR5RwJDkcfrytejRJe3q5y-6u1nkdI6OeFlrfJOQLsPMueBJI9azR8sCMtb6BcTwbhOHVlzXkcfxC3bKJB0sPDWKrjtEsyXn-nB1q5D0dd6U/s72-w640-h360-c/online-marketing-hIgeoQjS_iE-unsplash.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-4595859525409396521</id><published>2024-06-04T23:04:00.031+00:00</published><updated>2025-10-16T05:39:32.455+00:00</updated><title type='text'>When is Enough, Enough?</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQR78GQx46UnpWankQV9fA4UHaj8lt7IwqPRhfGL55XVqhZ7orn1-glefclKkkn5l_yCDRVt2EEhUvxOxEA3tJlsBwg7i79jNTTLyEW0C92DLlhba9eZbE-pGL3PBz4tjhheKKvixg4GkVzfQkIkwNMZha7-yvrh-1JwP8Exin4vim1Sn-OeHf11TS6eE1/s1370/Guy_s-and-St-Thomas_-NHS-Foundation-Trust.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;520&quot; data-original-width=&quot;1370&quot; height=&quot;242&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQR78GQx46UnpWankQV9fA4UHaj8lt7IwqPRhfGL55XVqhZ7orn1-glefclKkkn5l_yCDRVt2EEhUvxOxEA3tJlsBwg7i79jNTTLyEW0C92DLlhba9eZbE-pGL3PBz4tjhheKKvixg4GkVzfQkIkwNMZha7-yvrh-1JwP8Exin4vim1Sn-OeHf11TS6eE1/w640-h242/Guy_s-and-St-Thomas_-NHS-Foundation-Trust.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;

&lt;br /&gt;This week marks yet another dark moment for healthcare with yet another Russian cyber-attack against a supplier of critical services for two major London hospital trusts where over 200 life-saving operations and hundreds of other appointments have had to be cancelled, while ambulances have been placed in divert.&lt;br /&gt;&lt;br /&gt;Impacted are King’s College Hospital, Guy’s and St Thomas’ - including the Royal Brompton and the Evelina London Children’s Hospital – along with their associated primary care services. This includes GP services across Bexley, Greenwich, Lewisham, Bromley, Southwark and Lambeth boroughs. All have had to revert to paper for blood tests and transfusions thanks to a ransomware attack against Synnovis, a provider of pathology services.&lt;br /&gt;&lt;br /&gt;“This is having a significant impact on the delivery of services at Guy’s and St Thomas’, King’s College Hospital NHS Foundation Trusts and primary care services in south east London and we apologise for the inconvenience this is causing to patients and their families,” said an NHS spokesperson in statement.&lt;br /&gt;&lt;br /&gt;Synnovis is a pathology partnership between Guy’s and St Thomas’ NHS Foundation Trust and King’s College Hospitals NHS Trust, and SYNLAB, Europe’s largest provider of medical testing and diagnostics. On Monday it was hit with a cyber extortion attack, evidently the work of a Russian criminal group known as Qilin, which has demanded a $50 million ransom payment to be made within 120 hours. As a result, an emergency was declared, the National Cyber Security Centre notified, and the Cyber Operations Team called in for assistance. All of Synnovis&#39;s IT systems are believed to be affected.&lt;br /&gt;&lt;br /&gt;The incident follows a separate case at Synlab Italia, which in April involved a different Russian group known as Black Basta forcing the company&#39;s services offline. The group has been linked to the Conti ransomware group, an even more infamous Russian organized crime syndicate. Following this attack, it took the provider nearly a month to restore the majority of its systems. It appears Synlab Italia didn&#39;t pay whatever ransom was demanded of it as Black Basta claims it has Synlab&#39;s data available for download in its blog. Black Basta is also thought to have been responsible for the attack last month against US healthcare provider Ascension Health. &lt;br /&gt;&lt;br /&gt;The attack this week against Synnovis however, appears to be the work of yet another Russian crime group known as Qilin. This ‘Ransomware for rent’ group has targeted IT firms, medical organisations, courts, the &#39;Big Issue&#39;, and appears to operate with Vladimir Putin’s blessing. &#39;Qilin&#39;, also known as &#39;Agenda&#39;, has hacked hundreds of victims over the two years it has been operating under its known identities. Qilin’s 112 known victims span 30 different countries, with Russia and the Commonwealth of&amp;nbsp;Independent States – (ex-Soviet satellite countries) - being the notable exceptions. No need to wonder why!&lt;/p&gt;&lt;p&gt;According to a recent report by &lt;a href=&quot;https://www.bloomberg.com/news/articles/2024-06-18/uk-hospital-hackers-say-they-ve-demanded-50-million-in-ransom&quot; target=&quot;_blank&quot;&gt;Bloomberg&lt;/a&gt;, while responding to questions about the breach through a messaging account 
long associated with the gang, a representative for the hackers said 
that they were very sorry for the people who suffered, but refused to 
accept responsibility for the human cost. They suggested &#39;the attack was 
justified because it was in retaliation for the British government’s 
involvement in unspecified wars&#39;.&lt;br /&gt;&lt;br /&gt;The Guy’s and St Thomas’ and the King’s College Hospital NHS Foundation Trust attacks are not unique events. In fact it&#39;s the third such attack in the past 12 months against NHS trusts. In June of last year, a Russian cybercrime gang called BlackCat &lt;a href=&quot;https://www.bloomberg.com/news/articles/2023-06-30/hacking-gang-says-it-stole-data-trove-from-uk-hospital-group&quot;&gt;hacked&lt;/a&gt; the Barts Health NHS Trust. Then earlier this year yet another Russian gang, INC Ransom, attacked NHS Dumfries and Galloway stealing 3 TB of protected health data.&lt;br /&gt;&lt;br /&gt;The Russians have certainly cornered the cyber-extortion market, a criminal industry worth &lt;a href=&quot;https://www.searchlogistics.com/learn/statistics/ransomware-statistics/&quot;&gt;$14 billion as of 2022&lt;/a&gt; and one growing rapidly at 73% according to &lt;a href=&quot;https://www.sans.org/blog/ransomware-cases-increased-greatly-in-2023/&quot;&gt;SANS&lt;/a&gt;. Indeed, the growth of this industry appears to be directly linked to the number of ransoms being paid by victims, which in the first half of 2023 were estimated to have been more than &lt;a href=&quot;https://www.theverge.com/2021/10/15/22728765/us-treasury-ransomware-payout-numbers-reports-2021-first-half-cybercrime&quot;&gt;$590 million&lt;/a&gt;. Cyber-extortion is according to the NCA and FBI, a form of cyber-terrorism. So, in effect, those who pay extortion payments could be breaking the law by giving money to wanted terrorists, yet many still do so and few of those who are directly financing this trade have been arrested or prosecuted thus far.&lt;/p&gt;&lt;div&gt;$590 million is also a valuable source of income and hard currency for Russia given all the trade sanctions the country is under following its partial invasion and ongoing war with Ukraine. What’s also apparent, is that no one in a criminal oligarchy like the Russian State is going to make $20 million a pop in ransom payments without sharing at least some of that new-found wealth with others all the way to the Mafia Don at the top, i.e. one Vladimir&amp;nbsp;Vladimirovich Putin, reportedly the &lt;a href=&quot;https://www.news.com.au/finance/work/leaders/how-russian-president-vladimir-putin-secretly-became-the-worlds-richest-person/news-story/302a422aca6502c7346cc26435ab2e75&quot;&gt;richest man&lt;/a&gt; in the world today. &lt;br /&gt;&lt;br /&gt;But the costs of a ransom attack are far greater than merely the ransom payment (if payment is made), or the costs of forensic investigation, incident response, fines, lawsuits, and punitive damages. The costs when healthcare is attacked is measured in lives. How many patients die as a result of not receiving timely intervention and treatment (mortality), how many will die earlier than expected or are made to suffer for longer periods of time (morbidity), and how many patients are placed at risk thanks to critical IT and IoT systems being down and whose safety maybe compromised as a result. &lt;br /&gt;&lt;br /&gt;Attacks against healthcare are not only an attack by a foreign adversary against a critical national infrastructure industry of a nation state, but also an attack that threatens the lives and wellbeing of its citizens. Attackers therefore run the risk that the full power of the state they attack might be used against them, kinetically, when all legal avenues fail to bring them to justice, or to stop their attacks. Russia does not regard cyber-attacks against other countries as a crime, nor does it honour extradition treaties with the rest of the world. Even then, its criminal justice system is irrevocably compromised and corrupted by money, power, and influence. &lt;br /&gt;&lt;br /&gt;It is unknown to what extent the Kremlin is behind cyber-attacks against foreign critical national infrastructure, but Russia certainly turns a blind eye to it at the very least, by offering safe harbour to those engaged in this criminal activity. What is for sure, is that the criminal activities of some Russians, is helping to weaken and degrade many of Russia’s foreign adversaries. At the very least, the use of criminal proxies rather than official state assets, provides the Kremlin with some level of plausible deniability, no matter just how implausible that is now becoming, or how insincere Putin’s claims of denial are today. &lt;br /&gt;&lt;br /&gt;Until such times as Russia finally fails as a state, and a new Russia adopts a real legal-judicial system - one uncorrupted by others so that criminals can eventually be held to account, the NHS and other providers of healthcare services including third parties, will need to seriously improve cybersecurity and operational resiliency of key systems needed by patients. The UK will also need to critically evaluate any single points of failure in application or underlying infrastructure, just as the US needs to following the recent UHG-Optum Change Healthcare attack. Relying on a single vendor or single application for critical parts of medical workflow can no longer be supported. The ability to switch out failed components of a modular architecture is already crucially needed, yet few healthcare providers have reached that level of resiliency today.&lt;br /&gt;&lt;br /&gt;Out of all industries, health-care providers were the most targeted by ransomware gangs last year, according to a &lt;a href=&quot;https://blog.talosintelligence.com/content/files/2023/12/2023_Talos_Year_In_Review.pdf&quot;&gt;report&lt;/a&gt; by Cisco&#39;s Talos threat intelligence division. Cisco attributed the targeting to health-care organizations generally having “underfunded budgets for cybersecurity and low downtime tolerance.” &lt;br /&gt;&lt;br /&gt;Given the criticality of IT and IoT in today’s digital health system and continuously rising cyber threats by adversaries, we need to focus a lot more time, effort, and money to build our healthcare services to be able to withstand all but the most destructive of attacks.&lt;/div&gt;&lt;br /&gt; &lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Post Script&lt;/h3&gt;Post incident investigation has determined that &lt;a href=&quot;https://www.bbc.com/news/articles/cp3ly4v2kp2o&quot; target=&quot;_blank&quot;&gt;one patient died&lt;/a&gt; as a result of the attack and a further 14 were injured among 10,000 patient appointments that were cancelled. This marks the third patient to be&amp;nbsp;publicly and openly acknowledged to be killed by a ransomware attack.&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;An American newborn and an elderly German woman were also killed during separate ransomware attacks, though physicians privately believe the number of victims globally could be in the hundreds.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Hospitals are not required to report separate patient morbidity and mortality figures that are caused, at least in part by cyber attacks. Death certificates state only the medical cause of death, not the causal factors behind that death. Liability and damage to reputation notwithstanding, governments have so far been reluctant to require accurate reporting on the impact of cyber attacks against healthcare providers. In other words, the numbers are likely much, much higher than the public is aware of.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Each of these cyber attacks was conducted by Russian language gangs where attacks were orchestrated from within the Russian Federation - a country that evidence suggests allows cyber criminals to operate freely and with impunity so long as attacks are not against Russian assets or individuals.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Indeed, cyber attacks against critical industry industry sectors such as healthcare are increasingly being used as a form of hybrid warfare against western democratic nations. Given their continuing poor cybersecurity, and rising global tensions, one can expect a large jump in the number of victims over coming months and years.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4595859525409396521'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/4595859525409396521'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/06/when-is-enough-enough.html' title='When is Enough, Enough?'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQR78GQx46UnpWankQV9fA4UHaj8lt7IwqPRhfGL55XVqhZ7orn1-glefclKkkn5l_yCDRVt2EEhUvxOxEA3tJlsBwg7i79jNTTLyEW0C92DLlhba9eZbE-pGL3PBz4tjhheKKvixg4GkVzfQkIkwNMZha7-yvrh-1JwP8Exin4vim1Sn-OeHf11TS6eE1/s72-w640-h242-c/Guy_s-and-St-Thomas_-NHS-Foundation-Trust.jpg" height="72" width="72"/><georss:featurename>London, UK</georss:featurename><georss:point>51.5072178 -0.1275862</georss:point><georss:box>23.196983963821154 -35.2838362 79.817451636178845 35.0286638</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-2566303056929894159</id><published>2024-03-11T02:00:00.026+00:00</published><updated>2024-05-30T14:48:43.623+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HIMSS24 Interview"/><category scheme="http://www.blogger.com/atom/ns#" term="Orlando"/><title type='text'>Mitigating Medical Device Vulnerabilities</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKXSbi3djskw6cisPH8N24oKs9PXKPBUWQnb2nAuwLwlAUx2YbdMVmgTlekpsK3fM5Ldp-8YSe4TXG80pThDRljn7RmQoF-tKrsGRuDYgTGMoPmO0u57HFNNzD1hQ2S_b4SuvxtsY0XZeT9XvYKykyY3YKyclkGKi-oMrOwLnHtypRkyUusRshF0cib_z5/s1228/2024.03.10-HIMSS-Interview.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;630&quot; data-original-width=&quot;1228&quot; height=&quot;205&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKXSbi3djskw6cisPH8N24oKs9PXKPBUWQnb2nAuwLwlAUx2YbdMVmgTlekpsK3fM5Ldp-8YSe4TXG80pThDRljn7RmQoF-tKrsGRuDYgTGMoPmO0u57HFNNzD1hQ2S_b4SuvxtsY0XZeT9XvYKykyY3YKyclkGKi-oMrOwLnHtypRkyUusRshF0cib_z5/w400-h205/2024.03.10-HIMSS-Interview.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;How can health systems secure smart medical devices if manufacturers don&#39;t patch them regularly? Richard Staynings, chief security strategist at Cylera, discusses how organizations can mitigate that risk using their existing tools and technologies at HIMSS24 in Orlando, Florida.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;





&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;366&quot; src=&quot;//players.brightcove.net/1824526989001/default_default/index.html?videoId=6350219795112&quot; width=&quot;550&quot;&gt;&lt;/iframe&gt;
&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/2566303056929894159'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/2566303056929894159'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/03/mitigating-medical-device.html' title='Mitigating Medical Device Vulnerabilities'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKXSbi3djskw6cisPH8N24oKs9PXKPBUWQnb2nAuwLwlAUx2YbdMVmgTlekpsK3fM5Ldp-8YSe4TXG80pThDRljn7RmQoF-tKrsGRuDYgTGMoPmO0u57HFNNzD1hQ2S_b4SuvxtsY0XZeT9XvYKykyY3YKyclkGKi-oMrOwLnHtypRkyUusRshF0cib_z5/s72-w400-h205-c/2024.03.10-HIMSS-Interview.png" height="72" width="72"/><georss:featurename>Orlando, FL, USA</georss:featurename><georss:point>28.5383832 -81.3789269</georss:point><georss:box>0.22814936382115292 -116.5351769 56.848617036178844 -46.222676899999996</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-8962699698080921959</id><published>2024-02-20T13:31:00.084+00:00</published><updated>2024-05-30T14:50:12.489+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FBI"/><category scheme="http://www.blogger.com/atom/ns#" term="LockBit"/><category scheme="http://www.blogger.com/atom/ns#" term="NCA"/><category scheme="http://www.blogger.com/atom/ns#" term="RaaS"/><category scheme="http://www.blogger.com/atom/ns#" term="Takedown"/><title type='text'>Lockbit Take-Down</title><content type='html'>&lt;div class=&quot;separator&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOhBlzf2cd8KX0pJSlulBFHGjl60K3uGdnTvx-esRaDgx9bXzvLuC50rnJBQy5UkD-fQd9vmpTe-oG1QmXq7WkNu8HRqREA87a8W7TQRLgSO8xO1rcr-KLYW6vvVJPWWmcqRPlI2x-F5K-2Iblw3vpatKuRr0W4WkH_ARHxLMrtlHf5SdNn-E3PdFJVXzF/s1200/NCA.webp&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1200&quot; height=&quot;370&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOhBlzf2cd8KX0pJSlulBFHGjl60K3uGdnTvx-esRaDgx9bXzvLuC50rnJBQy5UkD-fQd9vmpTe-oG1QmXq7WkNu8HRqREA87a8W7TQRLgSO8xO1rcr-KLYW6vvVJPWWmcqRPlI2x-F5K-2Iblw3vpatKuRr0W4WkH_ARHxLMrtlHf5SdNn-E3PdFJVXzF/w640-h384/NCA.webp&quot; width=&quot;570&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
  
&lt;br /&gt;
&lt;div class=&quot;separator&quot;&gt;&lt;/div&gt;
  
Many of us in the cybersecurity community woke this morning to very welcome news that the infamous Lockbit Ransomware as a Service (RaaS) crime syndicate was hit with a take-down action of much of its infrastructure. This was apparently led by the UK’s National Crime Agency (NCA), and the FBI, as part of an international law enforcement task force known as ‘Operation Cronos’.

&lt;br /&gt;&lt;br /&gt;
Lockbit was one of the most prolific and destructive Russian Ransomware-as-a-Service (RaaS) groups, claiming over 2,000 victims worldwide and extorting over $120 million in ransom payments. It was, to put it mildly, ruthless, launching secondary and tertiary attacks against victims who refused to negotiate with the extortionists or to pay their extortion demands.

&lt;br /&gt;&lt;br /&gt;

As part of its initial seeding of compromised networks with ransomware, it exfiltrated confidential information and threatened to publish this on its websites if payments were not made by the organization. When demanded ransoms were not received, the group contacted individuals whose information it had stolen, and demanded they pressure the victim organization to pay the ransom, or sometimes offered to exclude their information from a release if a payment was received.&lt;div&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;div class=&quot;separator&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img alt=&quot;Richard Staynings, Cylera&quot; border=&quot;0&quot; caption=&quot;Richard Staynings, Cylera&quot; data-original-height=&quot;3000&quot; data-original-width=&quot;2400&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7pIFNpdPJ4VBvUdwZ5LtBSeK4cqfcEhfN_2MOqScFDY-KaOQuO7lKuyOvFzbmjj2TpQp4eo1o4LfSqpINYCBsXm6VNnj4QAF78S-v3b9vs0zfXkDJtKZXmLtSQHRzn-0Z9lLygJ-5bCKs8SUZaKQVPO1qQ7cWQO26ZR3GmnWEP8_LrOEJ6dc0DMfYvKPu/w256-h320/Richard.jpg&quot; title=&quot;Richard Staynings, Cylera&quot; width=&quot;256&quot; /&gt;&lt;figcaption&gt;&lt;i&gt;Richard Staynings, Cylera&lt;/i&gt;&lt;/figcaption&gt;&lt;/div&gt;
  


“Many times, corporate and individual victims paid the gang only to see their information posted publicly anyway” claimed Richard Staynings, Chief Security Strategist with Cheltenham based cybersecurity firm Cylera. “There is after all, no trust in thieves,” he added.
  
&lt;br /&gt;&lt;br /&gt;
  
The group was also known to publicly taunt victims on its web site with a countdown clock when the information would be published unless payment was made.
  
&lt;br /&gt;&lt;br /&gt;
  
Operation Cronos appears to have finally brought this criminal RaaS business to a halt, or at the very least slowed it down and ruined its reputation. Whether it stops the affiliates who use the RaaS to execute their attacks remains to be seem as it&#39;s likely that many of the Lockbit tools are still out there and affiliates are likely to have copies of these.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot;&gt;It’s also quite likely, that many of the un-indicted perpetrators involved in Lockbit, will simply pick up and move into new crime groups to continue to ply their crafts as part of other cybercrime services. This has happened in the past when law enforcement took down other crime syndicates. It is also possible that a new Lockbit rises from the ashes and starts over again, perhaps even under the same name with some of the same people.
  
&lt;br /&gt;&lt;br /&gt;Some of these crime syndicates are thought to be associated with the Russian Mafia and many in the past have worked closely with the Kremlin, FSB and GRU for espionage purposes, or to punish other nations, while Mother Russia can claim plausible deniability.&lt;/div&gt;&lt;div class=&quot;separator&quot;&gt;&lt;br /&gt;
  
Many of the cybercriminals who engage in ransomware and other forms of cyber extortion, are of Russian origin and are able to attack victims from within Russia and other former Soviet states with near impunity. This is largely thanks to a lack of extradition treaties between these countries and the rest of the world, combined with a legal system that is easily corrupted by those with power, influence or money.&lt;/div&gt;&lt;div class=&quot;separator&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot;&gt;The FBI has accused Russia of harboring cybercriminals for years, where as long as the perpetrators of cyber crime direct their craft against victims outside of Russia, then the Russian state will conveniently turn a blind eye. This makes it particularly difficult to bring criminals to justice so long as they don&#39;t leave the former soviet block of countries.&lt;/div&gt;&lt;div class=&quot;separator&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot;&gt;Of course some wanted criminals used to considering themselves above the law have traveled outside of the former Soviet states and have been arrested or renditioned back to the United States for trial and punishment. One of the more notable of these was Roman Seleznev, the son of a close Putin confident and a member of the Duma lower house of parliament, Valery Seleznev&amp;nbsp;&lt;a href=&quot;https://www.cyberthoughts.org/2017/04/a-slippery-slope.html&quot; target=&quot;_blank&quot;&gt;as reported some time ago by this site&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot;&gt;&lt;br /&gt;
  
Lockbit was the largest RaaS and worked by selling its criminal services, acting as a one-stop shop to customers known as affiliates. These affiliates then identified and attacked victims using the Lockbit framework of tools and services. Based upon volume, the affiliates then received between 60% and 80% of the ransom payments they were able to extort back from Lockbit. The Lockbit network consisted of hundreds of so called ‘bullet proof’ servers located all over the world. These have now been taken over by law enforcement as part of the Europol action. Copies of the Lockbit code, however, remain on PCs and servers in Russia and other countries where international law enforcement was unable to seize assets, since the crime of ransomware is not recognized in many of these countries.
  
&lt;br /&gt;&lt;br /&gt;
  
It was perhaps inevitable that the NCA would lead this takedown effort following a &lt;a href=&quot;https://techspark.co/blog/2023/01/13/royal-mail-russian-linked-randsomware/&quot;&gt;January 2023 ransomware attack&lt;/a&gt; against part of the UK Royal Mail in which packages could not be mailed overseas for many weeks. The attack was identified as using Lockbit so the group must have been in the sights of the NCA ever since. The Royal Mail is a critical infrastructure industry (CII) of the UK so any attack against a CII would have garnered attention at the highest levels, just as Lockbit attacks against the NHS have done so in the past.
  
&lt;br /&gt;&lt;br /&gt;
  
“While not all cyber crimes can be fully investigated, I am sure that Lockbit and its affiliates were prioritized by the NCA and the UK government following the Royal Mail attack,” said Staynings. “Lockbit ransomware attacks against NHS trusts was already sure to get the NCA’s attention, so the Royal Mail attack may have been the nail in the coffin for the group.”
  
&lt;br /&gt;&lt;br /&gt;
  
“Gangs would be well advised to stay clear of national infrastructure industries if they want to avoid unnecessary attention. That goes not just for the UK, but for any law-abiding western power,” Staynings added.
  
&lt;br /&gt;
&lt;br /&gt;
  
While the Lockbit infrastructure was taken offline and decryption advice and keys posted on its servers, law enforcement reportedly obtained access quite some time ago. It&#39;s highly likely that they have been digging around and gaining intelligence on affiliates and those involved in building and maintaining the Lockbit service. It is also likely that they were mapping out the entire infrastructure so as to capture as much of it as possible in one go with a single legal seizure action.

&lt;br /&gt;&lt;br /&gt;
  
This has resulted in the identification, indictment, and arrest of many of the gang’s generals. But it has also shed light on a much greater number of victims than has been reported, many of whom appear to have paid ransoms against the advice of law enforcement and national laws in their respective countries that forbid extortion payments to terrorists. Ransom and extortion are, after all, forms of terrorism.
  
&lt;br /&gt;&lt;br /&gt;
  
“The cat is now out of the bag, and we could see legal actions against business leaders and their legal counsel, who made ransom payments against national laws and hid a cyberattack from shareholders, and the SEC, FCA, and others,” claimed Staynings.
  
&lt;br /&gt;&lt;br /&gt;
  
&lt;div class=&quot;separator&quot;&gt;&lt;div style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img alt=&quot;Graeme Biggar, NCA&quot; border=&quot;0&quot; data-original-height=&quot;450&quot; data-original-width=&quot;760&quot; height=&quot;189&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1_RpaoL1x4gNDGyODapSaszj6dlpEgaMeBkB6HGLNYSksO50-4HlaL8Ybsxpc0wZ3aSkxTH0vlGWpRSOygB3raprFEFY_8BMi0ARqO-1u26275HsKzYD5dufivlqYfojw0I09qZ_c3RLV3DL4XUr8tUMHM2yhMIQoi-7v5c097vUM5eJWQzkZNBennEzo/w320-h189/Graeme_380x225.jpg&quot; title=&quot;Graeme Biggar, NCA&quot; width=&quot;320&quot; /&gt;&lt;figcaption&gt;&lt;i&gt;Graeme Biggar, NCA&lt;/i&gt;&lt;/figcaption&gt;&lt;/div&gt;

  
The NCA’s Graeme Biggar, said it assessed that the group was responsible for 25% of ransomware attacks in the last year including 200 that were known of in the UK - though he added that, there may have been many more. Indeed, total losses and damages from Lockbit and its affiliates could be in the billions of dollars. Whether this surpassed losses from ‘&lt;a href=&quot;https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/&quot;&gt;NotPetya’&lt;/a&gt;, another Russian cyberattack attributed to the Russian military GRU, remains to be seen.
  
&lt;br /&gt;&lt;br /&gt;
  
NotPetya is thought to have caused between $10 and $12 billion in damages to global organizations attacked, including Maersk, Mondelez, Merck, WPP, Reckitt Benckiser, Saint-Gobain and TNT Express.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Maersk alone lost &lt;a href=&quot;https://economictimes.indiatimes.com/tech/newsletters/ettech-unwrapped/notpetya-the-cyberattack-that-shook-the-world/articleshow/89997076.cms&quot;&gt;$250 million&lt;/a&gt; and suffered a further $300 million in damages. The 2017 cyberattack currently stands as the single most damaging and costly attack of all time. Its attack code was designed to attack Ukraine, but the malware unintentionally spread right the way across the world, impacting Russian businesses as well.
  
&lt;br /&gt;&lt;br /&gt;
  
As part of the seizures, more than 200 cryptocurrency accounts believed to be linked to Lockbit have been frozen, so it seems likely that once the investigation is complete, at least a few victims may receive some of their ransom payments returned, as has been the case in other confiscations.
  
&lt;br /&gt;&lt;br /&gt;
  
“It’s great to see the home team win a game finally, but there’s a long way to the finals” claimed Staynings. “The trouble is that with cybercrime it takes many months or years to properly attribute actions. That includes victims, criminal actors, and all those involved in a cyberattack.”
  
&lt;br /&gt;&lt;br /&gt;
  
“Undoubtedly, law enforcement needs to do things properly in order for prosecutions to stick and to identify all those involved in a criminal act. This was one of the better days, that’s for sure!” he concluded.
  
&lt;br /&gt;&lt;br /&gt;
  &lt;/p&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/8962699698080921959'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/8962699698080921959'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2024/02/lockbit-take-down.html' title='Lockbit Take-Down'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOhBlzf2cd8KX0pJSlulBFHGjl60K3uGdnTvx-esRaDgx9bXzvLuC50rnJBQy5UkD-fQd9vmpTe-oG1QmXq7WkNu8HRqREA87a8W7TQRLgSO8xO1rcr-KLYW6vvVJPWWmcqRPlI2x-F5K-2Iblw3vpatKuRr0W4WkH_ARHxLMrtlHf5SdNn-E3PdFJVXzF/s72-w640-h384-c/NCA.webp" height="72" width="72"/><georss:featurename>London, UK</georss:featurename><georss:point>51.5072178 -0.1275862</georss:point><georss:box>23.196983963821154 -35.2838362 79.817451636178845 35.0286638</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-3020736666895385741</id><published>2023-12-21T20:27:00.028+00:00</published><updated>2024-05-30T14:53:58.888+00:00</updated><title type='text'>Building AI-based cybersecurity solutions</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnUhSlkSkr-PS01rBSyCStA9CeB0u-JCIM9vltGCUZwCd3R20Uw2lBKEM5lbRbldXe85h14T43sqmOwH6U8Qy5sOkVvVFld1Q1BACon2n_BanuVqLMR6SODi3qX5jm17Uoskvk0aLqwfaoFT-snh99k8XIPKO_ZZOUxLz6I881yYLr0vcjUDLj2jNPA7_U/s664/Richard%20Staynings%20HIMSS%20AI.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;334&quot; data-original-width=&quot;664&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnUhSlkSkr-PS01rBSyCStA9CeB0u-JCIM9vltGCUZwCd3R20Uw2lBKEM5lbRbldXe85h14T43sqmOwH6U8Qy5sOkVvVFld1Q1BACon2n_BanuVqLMR6SODi3qX5jm17Uoskvk0aLqwfaoFT-snh99k8XIPKO_ZZOUxLz6I881yYLr0vcjUDLj2jNPA7_U/s320/Richard%20Staynings%20HIMSS%20AI.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;Richard Staynings, chief security strategist at Cylera, discusses the difficulties involved in being a cybersecurity professional, tackling bad actors and how AI can both improve and hinder strategies to ensure healthcare system security. (7m 14s).&lt;/p&gt;

&lt;br /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
  &lt;link href=&quot;https://cf-images.us-east-1.prod.boltdns.net/v1/static/1824526989001/0e3c1921-4891-4138-821e-db3208f2bb64/bac940f7-8268-4fd2-beb8-e8df98d183b3/1280x720/match/image.jpg&quot; rel=&quot;image_src&quot;&gt;&lt;/link&gt;
  
  &lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;366&quot; src=&quot;//players.brightcove.net/1824526989001/dbb65d86-1f3c-4e39-9d7f-94bac3abcd9b_default/index.html?videoId=6343585838112&quot; width=&quot;550&quot;&gt;&lt;/iframe&gt;
  

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/3020736666895385741'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/3020736666895385741'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2023/12/building-ai-based-cybersecurity.html' title='Building AI-based cybersecurity solutions'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnUhSlkSkr-PS01rBSyCStA9CeB0u-JCIM9vltGCUZwCd3R20Uw2lBKEM5lbRbldXe85h14T43sqmOwH6U8Qy5sOkVvVFld1Q1BACon2n_BanuVqLMR6SODi3qX5jm17Uoskvk0aLqwfaoFT-snh99k8XIPKO_ZZOUxLz6I881yYLr0vcjUDLj2jNPA7_U/s72-c/Richard%20Staynings%20HIMSS%20AI.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-5773481166724135992</id><published>2023-12-13T20:59:00.059+00:00</published><updated>2023-12-21T21:08:26.734+00:00</updated><title type='text'>ResonanceFM PassWord - The Security of IoT</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.futureintelligence.co.uk/fis-password-radio-show/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1424&quot; data-original-width=&quot;2136&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvWZ7GMH0PhSZMeRxLRrh2x7X2CLNFwhzI-wLFUhYlwGAlMSQJUWDV8x10CWH05UYBYAOC0GLY_c76Rm3ePHxlnHPY5nq0cqVZUyhZrRHUaGtN3EoZ6MD3V_3My1NREpBlX2-oGEcFEpkHLPYx5_3ml7iXFa-f66P25_Hnbnquerk_ukeSbK6l35NHFyK9/w400-h266/Peter-Warren.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;i&gt;Peter Warren host of &lt;a href=&quot;https://www.futureintelligence.co.uk/fis-password-radio-show/&quot; target=&quot;_blank&quot;&gt;&#39;PassW0rd&#39;&lt;/a&gt; part of Future Intelligence (Fi).&amp;nbsp;&lt;/i&gt;&lt;/div&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;

&lt;p&gt;Join Richard Staynings and Peter Warren, host of &#39;PassW0rd&#39; as they discuss the growing problem of the cybersecurity of IoT - the internet of things.&lt;/p&gt;&lt;p&gt;Future Intelligence (Fi) produces PassW0rd, its monthly hour long radio programme from London and Leipzig for broadcast on &lt;a href=&quot;https://www.resonancefm.com/&quot; target=&quot;_blank&quot;&gt;Resonance FM&lt;/a&gt;, London’s oldest independent radio station.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;BLOG_video_class&quot; height=&quot;488&quot; src=&quot;https://audio.cyberthoughts.org/2023.12.13-ResonanceTV.mp4&quot; width=&quot;300&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5773481166724135992'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5773481166724135992'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2023/12/resonancefm-password-security-of-iot.html' title='ResonanceFM PassWord - The Security of IoT'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvWZ7GMH0PhSZMeRxLRrh2x7X2CLNFwhzI-wLFUhYlwGAlMSQJUWDV8x10CWH05UYBYAOC0GLY_c76Rm3ePHxlnHPY5nq0cqVZUyhZrRHUaGtN3EoZ6MD3V_3My1NREpBlX2-oGEcFEpkHLPYx5_3ml7iXFa-f66P25_Hnbnquerk_ukeSbK6l35NHFyK9/s72-w400-h266-c/Peter-Warren.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4945852896025945156.post-5905700787962283233</id><published>2023-10-19T16:36:00.006+00:00</published><updated>2023-10-19T17:00:34.485+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DefCon"/><category scheme="http://www.blogger.com/atom/ns#" term="MGM"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Awareness"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="Vishing"/><title type='text'>Been Vished Lately?</title><content type='html'>&lt;h5 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqy4ThulKQlgHJBfzEnSN4eXmqsfM-cZMBVTZfsr-TqwZokyvAMRR6GA5DENKSBhcLwUDWZMLejtq3uXt_G4SRee77Dv93bh-cu_P2awvOjw4t6xCRFapDzrbTdO-c_vKxugTRU7oxTHqhbdlG-DCg3umxc96CjN9kEQ7q_m3z7v0WWTu1oWkDDaUy43VD/s1920/berkeley-communications-WEDDt-u3q3o-unsplash.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;1920&quot; height=&quot;426&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqy4ThulKQlgHJBfzEnSN4eXmqsfM-cZMBVTZfsr-TqwZokyvAMRR6GA5DENKSBhcLwUDWZMLejtq3uXt_G4SRee77Dv93bh-cu_P2awvOjw4t6xCRFapDzrbTdO-c_vKxugTRU7oxTHqhbdlG-DCg3umxc96CjN9kEQ7q_m3z7v0WWTu1oWkDDaUy43VD/w640-h426/berkeley-communications-WEDDt-u3q3o-unsplash.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;By Jon Taylor&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;Director and Principal of Security, &lt;a href=&quot;https://versa-networks.com/&quot; target=&quot;_blank&quot;&gt;Versa Networks&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/h5&gt;
&lt;br /&gt;

A lot of vendors lately have been talking about how they can help companies be “less hackable” through the implementation of advanced technology, reducing the attack surface, etc. One item you don’t hear security vendors talking much about is how companies can implement some basic security awareness policies that can also drastically reduce the chances of being compromised, or at least make it a bit harder for bad actors to gain access to the network.&lt;br /&gt;&lt;br /&gt;One example that we can discuss in detail was an event that happened at the &lt;a href=&quot;https://www.se.community/&quot; target=&quot;_blank&quot;&gt;Defcon Social Engineering Village&lt;/a&gt; this year. One such opportunity was thoroughly demonstrated, although I honestly couldn’t believe my eyes (and ears!). On Day One they were having a vishing competition, where teams were placed into a sound booth with a phone dialing system, and they cold-called different businesses to probe for sensitive information on how these companies secured their environments. Now, one might say that there’s no way that someone doing this would really gather anything useful, but the results will absolutely surprise you, as they did me.

&lt;br /&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Vishing meets supply chain &lt;/h3&gt;
Now, these vishers weren’t trying to call and gather information from the IT departments of major companies, but instead they were calling franchisees of large companies that we know (and love!). The competing teams were tasked with gathering some key pieces of information, and to do so were calling the individual franchises and acting as if they were from corporate parent company posing at the IT department, franchise relations, or even another franchisee. What’s interesting about this information is that it would have given these vishers the ability to backdoor and compromise not just the franchise, but also gain access to the corporate system as well. The information they were gathering ultimately centered around the franchise-accessed resources provided by the parent company, including technologies such as VPN/ZTNA services and secure websites published to the internet as examples. Some of the resources they were probing for were corporate ordering, timecard/revenue entries, other types of inventory control, etc. They would also ask questions about the type of antivirus/anti-malware being used on the machines, especially the point-of-sale terminals. 

&lt;br /&gt;&lt;br /&gt;

If the above sounds bad, it was actually worse. During the exercise, at some point they would have the &quot;mark” go to a mocked-up website from a point of sale (POS) terminal that would self-install a piece of malware, which allowed them to gain access to the computer. Now imagine what would happen if this POS terminal became compromised in some way. Just the amount of credit card information alone would be incredibly valuable on the dark web if it was to be sold. Also, if this terminal had any type of access to the parent network, then the payload could allow the malicious actor to enter the parent corporate system and do anything from planting ransomware to exfiltrating sensitive data. During one call, an employee even offered to share her computer screen and show the visher how they logged into each system using a VPN service and offered up usernames and passwords. If this had been a real malicious actor gathering this information, then this would have been disastrous for both the parent company as well as the franchise as the incident response, public disclosure, and loss of reputation could cost millions.

&lt;br /&gt;&lt;br /&gt;

Now one might say that this is an example of a small business being targeted so of course there isn’t going to be security awareness training, and as long at the parent company has the right security tools they will not be breeched. Well, the latest example of this is the MGM incident. The exact same thing happened to a major corporate brand where someone was able to perform a &lt;a href=&quot;https://www.vox.com/technology/2023/9/15/23875113/mgm-hack-casino-vishing-cybersecurity-ransomware&quot;&gt;vishing&lt;/a&gt; exercise and ultimately gained access to the corporate environment.

&lt;br /&gt;&lt;br /&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;Make people aware&lt;/h3&gt;
So, what kind of “low-hanging fruit” items should any organization be doing? First off, there should be policies in place for any employee within the company to be able to accurately identify any other employees from the company. There should also be mandatory security awareness trainings for all employees including IT, and it should be renewed within one year of the initial training. In the case of a franchise model and because of the supply chain risk, the franchise parent company should implement these mandatory security awareness trainings as part of their franchise agreement. &lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5905700787962283233'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4945852896025945156/posts/default/5905700787962283233'/><link rel='alternate' type='text/html' href='http://www.cyberthoughts.org/2023/10/been-vished-lately.html' title='Been Vished Lately?'/><author><name>Richard Staynings</name><uri>http://www.blogger.com/profile/12046362539750930309</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqy4ThulKQlgHJBfzEnSN4eXmqsfM-cZMBVTZfsr-TqwZokyvAMRR6GA5DENKSBhcLwUDWZMLejtq3uXt_G4SRee77Dv93bh-cu_P2awvOjw4t6xCRFapDzrbTdO-c_vKxugTRU7oxTHqhbdlG-DCg3umxc96CjN9kEQ7q_m3z7v0WWTu1oWkDDaUy43VD/s72-w640-h426-c/berkeley-communications-WEDDt-u3q3o-unsplash.jpg" height="72" width="72"/></entry></feed>