HHS alerts health sector to leading ransomware, social engineering threats | #ransomware | #cybercrime

The Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) April 5 released an advisory on the top 10 ransomware groups targeting the health care sector. HC3 has tracked over 530 attacks against the U.S. health care sector in the past six months, nearly half of them ransomware related. HC3 also recently released an advisory recommending actions to protect against advanced social engineering attacks targeting IT help desks in the health care sector.  
“These timely intelligence reports contain useful information on how to identify and mitigate cyber threats related to top ransomware threats and social engineering schemes,” said John Riggi, AHA’s national advisor for cybersecurity and risk. “The top ransomware threats continue to emanate from Russia-associated groups that leverage common tactics such as phishing emails, exploitation of known vulnerabilities and remote desktop protocols. The BlackCat ALPHV group was the first to use Rust programming language to help bypass security controls not designed to detect Rust. In addition, social engineering schemes continue to target health care IT help desks to bypass multi-factor authentication (MFA) for password reset and new device enrollment. Building upon alerts issues by the AHA, the HC3 alert provides specific technical guidance to help better secure MFA and unauthorized use of privileged accounts within the Microsoft cloud environment.”  
On April 24, the HC3 Cyber Working Group will host All Hands Across America, which will bring health care sector chief information officers and chief information security officers together for regional networking, cyber threat briefings and tabletop exercises.   
For more information on this or other cyber and risk issues, contact Riggi at [email protected]. For the latest cyber and risk resources and threat intelligence, visit

Source link


National Cyber Security