The spread of COVID-19 has prompted an enormous shift by organizations to the use and implementation of remote working solutions for a wide range and number of employees. Unfortunately – but perhaps not surprisingly – this shift has provided malicious cyber actors with additional ways to infiltrate remote use networks. The spread of COVID-19 has brought with it a huge surge in data security incidents, as hackers look to exploit new organizational vulnerabilities and distracted and overburdened IT security personnel.
Year: 2020
$100,000 HIPAA Settlement With Solo Physician Practice
Dr. Steven A. Porter, M.D., P.C. (Dr. Porter’s Practice) and the Office for Civil Rights (OCR) at the U.S. Department of Health and Human Service (HHS) entered into a $100,000 no-fault settlement agreement and two year corrective action plan to settle potential violations of the Health Insurance Portability and Accountability Act (HIPAA).
Continue reading “$100,000 HIPAA Settlement With Solo Physician Practice”
ED and HHS Issue Updated Joint Guidance Regarding Student Health Records Privacy
On December 19, 2019, the U.S. Department of Health and Human Services (HHS) and the U.S. Department of Education (ED) issued an updated version of its “Joint Guidance on the Application of the Family Educational Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to Student Health Records” (the Joint Guidance, available here). Educational institutions at both the K-12 and postsecondary level can be subject to FERPA or HIPAA, and in certain circumstances, both. The Joint Guidance, which was first issued in November 2008 and has not been previously updated, seeks to assist educational institution administrators, health care professionals, and others in navigating what can be a complex intersection between FERPA and HIPAA as applied to health-related records maintained on students. It also addresses certain disclosures that are allowed without the written consent of the parent or eligible student under FERPA or without authorization under the HIPAA Privacy Rule, especially when those disclosures are related to emergency health or safety situations.
Continue reading “ED and HHS Issue Updated Joint Guidance Regarding Student Health Records Privacy”
Disruptionware II – The “Cyber Terminator” and What This New Threat Means to You and Your Data
We recently published a blog about a very new and emerging threat coined “disruptionware,” now faced by workforces in multiple industries – especially focused on workers employed in government and in the health care sector. As first identified and discussed by the Institute for Critical Infrastructure Technology (ICIT), disruptionware is designed to attack the traditional “CIA Triad,” i.e., the confidentiality, integrity and availability of a user’s systems, networks and data. Disruptionware is an emerging form of malware, with a greater adverse impact than more traditional, standalone ransomware attacks, in that it is designed to actually suspend physical operations within a victim organization. Unlike most cyber-attacks focusing on the “IT” networks in a business, disruptionware directly attacks a company’s “Operational Technology” (OT) environments — in short, it attacks a firm’s physical infrastructure in addition to attacking its networks, systems and/or data.
To understand how disruptionware works, one must understand its basic foundational construction. This graphic, reprinted with permission of ICIT, provides an excellent representation of characteristic disruptionware components:
While ransomware is still the leading “go to” form of disruptionware for many cyberattacks, disruptionware introduces many new cyber-attack soldiers to do its bidding, such as:
- Wipers – wiper malware maliciously wipes data making it unrecoverable
- Bricking Capabilities – a PDoS (permanent denial of service attack) malware that renders devices unusable by overwriting portions of the device’s firmware
- Automated Component Attacks – uses tools such as botnets and other automated components to overwhelm a network with inbound traffic, leading to a destructive denial of service attack
- Data Exfiltration Tools – tools used by malicious actors to target, copy and transfer sensitive data from one network to another; causes extreme disruption of employer business focus and severely taxes human resources of the victim company
- Enhanced Network Reconnaissance Tools – tools such as remote access Trojans, key loggers and network-mapping tools that infiltrate and permanently destroy the OT environment of their victims
Many of these tools are designed to do more than just encrypt data in hopes of ransom, but to actually and utterly destroy a user’s systems, networks and data permanently. Due to the ubiquitous and intense nature of these attacks, it is imperative that companies immediately consider, at least to start, hardening their IT and OT networks as much as possible as well as provide social awareness training to their employees to help curtail the spread of disruptionware.
The severe danger of disruptionware attacks on the OT environment of critical infrastructure in places like government institutions and hospitals is that the attacks are tailored to their actual business continuity and physical foundational IT and OT systems. Disruptionware attackers particularly focus on targeting the growing connection (and merging) of IT and industrial control systems (ICS). In doing so, disruptionware is able to heap massive potential damages on organizations that are trying to turn these disparate networks into a single unified system. This threat is highlighted by the huge rise in ransomware attacks alone. According to Cybersecurity Ventures, ransomware attacks are predicted to occur every 11 seconds by 2021, with a cost to victims of over $20 billion, and with global cyber-crime-related damages in 2021 estimated to reach $6 trillion.
There have already been some recently identified disruptionware attacks with losses in the hundreds of millions of dollars, as victim companies were unprepared to defend themselves against the devastating damage caused by these multifaceted attacks. So, the natural next question is why disruptionware is so dangerous despite its lack of advanced “sophistication.” This is because disruptionware:
- Has a high rate of successful compromise
- Requires little to no continued adversarial effort
- Consumes a target’s internal resources very effectively
- Disrupts daily operations
- Has the ability to spread down the supply chain, making it very attractive to cyber-villains, from traditional script-kiddies to nation-state threat actors
Disruptionware was initially very successful in taking advantage of remote desktop protocol (RDP) attacks which, until the last few months, were a reasonably unknown attack point of entry. In July 2019 alone, there were over 805,000 systems considered vulnerable to RDP exploits — making those systems targets for additional attacks in the form of disruptionware.
In short, disruptionware provides another major advantage for cyber-criminals. In many of these attacks, the cyber adversary may still maintain access to the system, thus allowing installation of backdoors, remote-access Trojans or other types of dangerous or unknown malware. ICIT has noted that disruptionware could also stem from cloud-based attacks, due to its ability to maintain “persistent synchronization” and could even potentially attack millions of devices attached by the Internet of Things (IoT). Disruptionware may allow a cyber-criminal to take control of (or destroy) smart appliances in private residences, such as smart washers and dryers or smart thermostats.
With the assistance of outside counsel, organizations are well-advised to begin thinking about how to confront these new forms of cybersecurity threats from both a business and technical perspective. There are, in fact, multiple defenses that can combat these new and emerging disruptionware attacks.
We will discuss those defenses in more depth in my next disruptionware blog.
CCPA Revised Regulations
California’s Attorney General recently released revised draft regulations for the California Consumer Privacy Act (CCPA). Comments to the revisions are currently accepted through February 25, 2020.
Read the update to see the changes, with key additions and deletions highlighted.
Emerging Cyber-Security Threats for 2020: The Rise of Disruptionware and High-Impact Ransomware Attacks
Disruptionware is defined by the Institute for Critical Infrastructure Technology (ICIT) as a new and “emerging category of malware designed to suspend operations within a victim organization through the compromise of the availability, integrity and confidentiality of the systems, networks and data belonging to the target.” New forms of disruptionware can be a more crippling form of cyber-attack than other more “garden-variety” malware and ransomware attacks. This is the case since, as the ICIT notes, disruptionware not only attempts to encrypt and deny users access to their data, but works as a “layered attack” designed to “disrupt operations and production in manufacturing or industrial environments (as well as infrastructure) in order to achieve some other strategic goal.”