Saturday, March 9, 2024

Capital Health Breached

 

No CISO wants to receive the urgent call from the SOC informing them of an issue. This may take the form of a request to make a missed vendor payment by month end or there’s a user that keeps on clicking on the internal phishing campaign emails. The conversation you don’t really want revolves around the defenses being breached. That is clear and immediate project.

Capital Health (NJ) had such an occurrence. LockBit 3.0 claims to have compromised the defenses and liberated over 10M files or over 7TB of confidential medical data. The estimated value of this was $250k. The group did have a bit of their conscious during the attack. They didn’t encrypt the data which quickly would have interfered with the patient care. It’s notable though LockBit 3.0 did not post evidence to document this. While this is the case, there were network outages near the end of December due to a cybersecurity incident. This is not a new event, as too many medical facilities have experienced this on some level.

There have been minimal details as to this which is the standard model. This does highlight the need for this industry to be hyper vigilant and maintain your info cybersecurity toolsets. Periodically when your contract is nearing renewal for the tools, scan the other vendors for their offerings and pricing. Running a PoC and going through the vendor vetting can take time, but it may be well worth it. 


Services 

Enterprise and Embedded System Cybersecurity Engineering & Architecture


Red Team Product Pentesting   |   HW & SW BoMs  |   CBoM  | 

Vulnerability Management   |   Tabletop Exercises (TTX)   | 

Embedded Systems Architecture   |   Threat Intelligence   | 

TARA (Threat Assessment and Remediation Analysis) |

Supply Chain Cybersecurity Review 

Reverse Engineering


 charles.parker@mielcybersecurity.net 810-701-5511


No comments:

Post a Comment