Lawrence Abrams reports: The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient data to a remote IP address and downloads and executes files on the device. Contec is a China-based company that specializes in healthcare technology, offering…
Category: Health Data
Exclusive: Apex Custom Software hacked, threat actors threaten to leak the software (1)
On January 20, the hackers known as 0mid16B tweeted, “At 7:40AM 20th Jan (US time), a US healthcare software provider has been hacked. All data in server has been deleted. 48 hours left before we publish all data.” The attached screenshot showed a listing of medications, but without any patient information attached. Two days later,…
No need to hack when it’s leaking: ZAR clinics edition
Heise.de reports: A massive data leak potentially affects hundreds of thousands of patients at ZAR rehab clinics across Germany. Among other things, highly sensitive medical reports were accessible. The affected rehab centers are under the umbrella of Nanz medico, which claims to be the largest provider of outpatient rehab services in Germany. This includes a…
New York Blood Center Enterprises Ransomware Attack Update
A personal message to whatever threat actor or ransomware group hit the New York Blood Center: You are endangering lives, and every day that goes by will put more lives at risk. Do the morally right thing and give them a decryptor now. — Dissent. A statement from the New York Blood Center: January 29:…
Personal medical information might have been exposed on Chicago Department of Public Health dashboard
Todd Feuer reports: Some people might have had their names and medical information exposed on a Chicago Department of Public Health online dashboard last fall, city officials said. On Oct. 8, 2024, the department learned about an “inadvertent potential disclosure of sensitive information used to generate statistics related to public health and safety,” CDPH officials…
How Interlock Ransomware Infects Healthcare Organizations
The Hacker News reports on Interlock: The Interlock ransomware group begins its attack with a strategic and highly deceptive method known as a Drive-by Compromise. This technique allows the group to gain initial access to targeted systems by exploiting unsuspecting users, often through carefully designed phishing websites. Initial Attack of the Ransomware# The attack starts…