– New Mexico-based Roosevelt Basic Hospital found malware on the digital imaging server of its radiology division, which presumably allowed hackers to view the digital medical photos of about 500 sufferers.
Found on November 14, officers mentioned they promptly labored to isolate the contaminated server from the community and block entry with the command and management server utilized by the cybercriminals. The RGH IT workforce then eliminated the malware and rebuilt the server, whereas recovering all impacted affected person knowledge.
The IT workforce additionally performed a vulnerability scan to make sure the server was secured and guarded towards additional assaults. Officers mentioned they may not rule out entry or theft of affected person info, though there was no proof of exfiltration.
The possibly compromised knowledge included affected person names, contact info, Social Safety numbers, dates of delivery, driver’s licenses, medical knowledge, genders, and medical insurance particulars. RGH is continuous to analyze the safety incident, which officers mentioned was contained to the imaging server.
A large range of digital imaging servers are identified to have vulnerabilities that may place affected person knowledge in danger if left unpatched. In September, NIST launched proposed steerage to safe the image archiving and communication system (PACS) ecosystem in healthcare.
“If not correctly secured, vulnerabilities could also be launched into the PACS ecosystem, both affecting scientific info saved within the PACS setting or permitting malicious actors to leverage elements throughout the ecosystem as pivot factors into the built-in healthcare info system,” researchers wrote on the time.
Healthcare Administrative Companions’ E-mail Hack
Pennsylvania-based medical billing and coding vendor Healthcare Administrative Companions is notifying 17,693 sufferers that their knowledge was probably breached after the hack of an worker e mail account.
In accordance with the notification, HAP first found suspicious exercise inside an worker e mail account on June 26. All worker passwords have been instantly modified, as HAP carried out additional safety controls inside its e mail system.
An investigation assisted by a third-party forensics workforce confirmed a hacker accessed one company e mail account. Practically three months later on September 16, officers mentioned they decided the impacted account contained protected well being info, similar to names, medical file numbers, supplier names, prescriptions, diagnoses, dates of delivery, contact particulars, and restricted therapy knowledge.
Officers mentioned they may not decide whether or not any info contained within the account was seen throughout the hack.
HAP has since carried out extra safety controls and insurance policies, together with labeling all exterior emails, limiting mailbox sizes, and including archiving necessities. At present, officers mentioned they’re evaluating multi-factor authentication choices, whereas retraining workers on easy methods to acknowledge and reply to suspicious emails.
Phishing Assault on Sinai Well being System
Two worker e mail accounts of Sinai Well being System have been compromised by phishing assaults, which probably breached the information of about 12,578 sufferers. The notification didn’t define the date of discovery, however the investigation into the phishing incident concluded on October 16.
The investigation decided the hacker may have probably accessed the compromised accounts, which contained affected person info, similar to names, contact particulars, dates of delivery, Social Safety numbers, medical insurance info, and well being knowledge. The breached knowledge diversified by affected person.
In accordance with officers, the well being system has up to date its e mail filtering controls and revised the e-mail retention insurance policies. The workforce has additionally obtained extra safety coaching round figuring out malicious emails.
The Middle for Well being Care Companies Ransomware Assault
Pc programs have been shut down on the Middle for Well being Care Companies in San Antonio over Christmas, after a ransomware assault, in line with native information outlet San Antonio Categorical Information. CHCS is the most important psychological well being and substance abuse providers supplier in Bexar County, Texas.
The CHCS IT remoted the ransomware to a single pc system, after officers mentioned regulation enforcement brokers alerted the supplier to the assault final week. The FBI and Secret Service is presently investigating the assault, because it seems to be a part of a collection of focused cyberattacks on a number of organizations.
Upon discovery, the supplier shut down the pc programs throughout all of its clinics. CHCS is presently within the strategy of bringing its programs again on-line, starting with the bigger clinics. The programs are slowly being introduced again up to make sure the programs stay secured.
Insider Wrongdoing at Ann & Robert H. Lurie Kids’s Hospital of Chicago
A former worker of Ann & Robert H. Lurie Kids’s Hospital of Chicago was found improperly accessing affected person medical information for a few yr between September 10, 2018 and September 22, 2019. Upon discovery, the hospital terminated the worker’s entry.
On November 15, Lurie Kids’s found the worker wrongdoing, terminated the worker’s entry to affected person info, and launched an investigation. Officers mentioned they decided that the worker seen sure affected person names, contact info, dates of delivery, and medical info, similar to diagnoses and medicines.
The worker was unable to view Social Safety numbers, insurance coverage particulars, or monetary account knowledge. Officers mentioned the difficulty was addressed “in accordance with its disciplinary insurance policies,” and the worker was let go from the hospital.
“We deeply remorse any inconvenience and concern this incident could trigger our sufferers,” officers mentioned in a press release. “To assist forestall one thing like this from taking place sooner or later, we’re retraining our employees concerning acceptable entry to affected person information.”