The State of Healthcare Cybersecurity: VMware Carbon Black Explores the Surge in Cyber Threats By Samantha Mayowa, VMware February 4, 2021
To help understand the
state of healthcare cybersecurity, we took a look back
at 2020 and found that there were 239.4 million
attempted cyberattacks targeting VMware Carbon Black
healthcare customers. We also found an average of 816
attempted attacks per endpoint in 2020, a staggering
9,851% increase from 2019. The surge in attacks began as
early as February just as the pandemic started to spread
worldwide. From January to February, the number of
attempted attacks shot up by 51% as cybercriminals set
their sights on vulnerable healthcare organizations that
were navigating tremendous changes in the way they
operate and treat patients.
In the latter half of the
year, we saw the attempted attacks per endpoint peak
with an 87% increase from September to October. The
timing of this significant spike corresponds with the
October alert from the Cybersecurity and Infrastructure
Security Agency (CISA), which warned of increased
cyberattacks by a
Ryuk
ransomware gang specifically targeting healthcare
organizations. “Amid the pandemic,
cybercriminals now have limitless attack methods,” said
Rick McElroy, Principal Cybersecurity Strategist at
VMware Carbon Black. “Whether it’s using tried and true
malware like EMOTET or using BitLocker to ransom
systems, malicious actors continue to gain ground. The
FBI, Department of Homeland Security (DHS), and other
federal agencies have all issued warnings about the
surge in cyberattacks against healthcare organizations.” We are now also seeing
“secondary infections,” which are leveraged to
facilitate long-term cyberattack campaigns, happening
across the digital healthcare supply chain and have led
to a surge of extortions and helped fuel a cybercrime
market. Our research found protected health information
(PHI) being bought and sold on dark web markets as
cybercriminals look for the easiest way to cash in on
data. In 2020, we saw
ransomware go mainstream. The wide-reaching impact of
ransomware has been assisted largely by way of affiliate
programs. With many ransomware groups offering
ransomware-as-a-service (RaaS), making the deployment of
ransomware easily accessible to millions of
cybercriminals who previously didn’t have the tools to
carry out these attacks. Compounding these risks is the
adage of affiliate programs for ransomware groups,
providing new and unique ways for malware operators to
have others deploy their payloads for a cut of the
eventual profits. Throughout 2020, we have
seen expansions in the use of ransomware with some
threat actors repurposing ransomware for use as pure
wipers, wherein the decryption keys will be able to
recover the lost data, and more recently in
Denial-of-Service (DoS) attacks, impacting core services
that citizens rely on every day. There is no sign of
these groups slowing down. In fact, we are witnessing
the exact opposite, with groups beginning to collaborate
at an unprecedented scale, share stolen resources, and
even combine forces. “COVID-19 test results
are a hot commodity on the dark web right now, mostly in
the form of large data dumps,” said Greg Foss, senior
cybersecurity strategist at VMware Carbon Black. “An
interesting component around today’s ransomware attacks
is that underqualified, lesser-known cybercriminal
groups are behind them thanks to the rise in RaaS. All
it takes is a quick search on the dark web for someone
to license out a ransomware payload to infect targets.
Today, it’s unfortunately just as easy to sign up for a
grocery delivery service as it is to subscribe to
ransomware.”
Top 5 ransomware families of 2020The top five ransomware families used to target VMware Carbon Black healthcare customers in 2020 were identified as: Cerber (58%) Cerber ransomware is a type of malware (malicious software) that encrypts your files and then holds them hostage, demanding a ransom payment in exchange for returning them to you. Sodinokibi (16%) Sobinokibi ransomware is highly evasive and takes many measures to prevent its detection by antivirus and other means. VBCrypt (14%) VBCrypt is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker’s choice on an affected computer. This virus targets Windows programs. Cryxos (8%) Cryxos Trojans display deceptive alerts/notifications on compromised or malicious websites. The notifications claim that the user’s computer is infected with a virus (or viruses), is blocked, and some personal details have been stolen. VBKrypt (4%) The VBKrypt malware family is written in the Visual Basic programming language, which is its main distinguishing trait from other malware families. Based on the specific variant, the trojan may drop files, write to the registry and perform other unauthorized actions on the affected computer system. “It’s critical to note that the most commonly used ransomware family, Cerber, is classified as a RaaS. For a percentage of the profits, cybercriminals can sign-up as a Cerber affiliate and deliver all the Cerber ransomware they desire, said McElroy. “This is alarming as it accounts for nearly 60% of the ransomware attacks on healthcare organizations, demonstrating the rapid rate at which this strain can be licensed and utilized to infect victims.” Foss added, “As RaaS
explodes in popularity on the crimeware forums,
cybercriminals are finding new and unique ways to deploy
ransomware across organizations. Similar to how spies
are recruited for espionage against government agencies,
regular everyday people with access to high-value
targets can be recruited to deploy malware. Often, they
are lured through offers of significant sums of money or
even a percentage of the ransomware payout, with some
offering hundreds of thousands of dollars per victimized
organization. Affiliate programs and partnerships
between ransomware groups have also become a common
occurrence alongside the general recruiting of insiders.
These affiliate programs look to partner with initial
access brokers – criminals that specialize in breaking
into organizations and subsequently sell direct access
and other ransomware gangs in order to improve their
tradecraft, furthering their reach and overall
profitability.
The Rise in Secondary ExtortionRansomware groups have widely adopted double extortion as a core tactic to ensure profitability. By taking time to quietly exfiltrate sensitive information from the organization, cybercriminals gain incrementally significant leverage on their victim organizations, forcing organizations to not only pay to decrypt their content but also prevent potentially harmful data from being sold or otherwise publicly disclosed. Thus, significantly increasing the impact and damage that ransomware groups can inflict upon their victims and sending a stark warning to others to protect their networks from this ever-evolving threat. How to Fight Back: Three Security Recommendations for Healthcare CISOsFor healthcare organizations, understanding the evolving threat landscape is half the battle. Now that CISOs have a grasp of what they’re up against, there are key defenses that should be in place. Here are three best practices to help CISOs stay one step ahead of attackers:
Securing Healthcare Organizations in 2021 and Beyond
Healthcare organizations will continue to be extorted by cybercriminals looking for a payday or to monetize medical and patient data. As we move forward, it’s critical to pay close attention not only to how these criminals achieve their goals, but also how we respond to these threats. We must continue to leverage organizations like the H-ISAC to bring the industry together and enable real-time collaboration and threat intelligence sharing. Our 2020 findings should serve as a starting point for a discussion between the cybersecurity community and the defenders of the healthcare sector on how to best collaborate and ensure patient care is not disrupted by cyberattacks. |
Terms of Use | Copyright © 2002 - 2021 CONSTITUENTWORKS SM CORPORATION. All rights reserved. | Privacy Statement