From the Summary: The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Treasury Department (Treasury) are issuing this joint Cybersecurity Advisory (CSA) to highlight the cyber threat associated with cryptocurrency thefts and tactics used by a North Korean state-sponsored advanced persistent threat (APT) group since at least 2020….
Category: Commentaries and Analyses
Learning Opportunities from Ransomware and Redline Infostealer Events Inside America’s Universities
Britton White writes: After a university was recently hit with Ransomware, I decided to research the university’s domain name searching for any users who might have been hit with Redline Infostealer/Malware. To no surprise, I found many students had unknowingly had their saved browser credentials scraped (stolen/exfiltrated). It didn’t take long to find a student…
SuperCare Health Sued After Data Breach
The gap from the disclosure of a data breach to the filing of a potential class-action lawsuit is often a matter of weeks (or less), although a lot of lawsuits are dismissed for lack of Article III standing (see a 2021 review of data breach litigation here). In March, in-home respiratory care provider SuperCare…
Patients increasingly suing hospitals over data breaches
Jeff Lagasse reports: Industries are increasingly being sued by consumers for data breaches, but the sector with the biggest litigation increase is healthcare, according to new findings from the law firm BakerHostetler. In fact, healthcare comprises 23% of lawsuits due to data breaches. The next highest after that is business and professional services at 17%,…
On-the-Spot Intervention 95% Effective in Reducing Healthcare Employees’ Unauthorized Access to Protected Health Information (PHI)
The following is a press release from Protenus. As a reminder/disclosure: DataBreaches.net compiles data and performs some data analytic services for Protenus’s Breach Barometer each year. Protenus is pleased to announce a recent study found that on-the-spot interventions for healthcare employees who inappropriately accessed PHI were 95% effective in preventing repeat offenses. The article, “Effectiveness of…
‘JekyllBot:5’ Vulnerabilities Allow Remote Hacking of Hospital Robots
Eduard Kovacs reports: Cybersecurity researchers specializing in healthcare IoT systems have discovered five serious vulnerabilities that can be exploited to remotely hack Aethon’s TUG autonomous mobile robots. The TUG robots are used by hundreds of hospitals in North America, Europe and Asia to transport goods, materials and clinical supplies. Their role is to give staff…