Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:55 PM
Connect Directly

Healthcare Organizations Bear the Brunt of Cyberattacks Amid Pandemic

In the past two months alone, attacks against the sector soared 45% - more than double the rate of other sectors, Check Point says.

Hospitals and other healthcare organizations bore the brunt of cyberattacks last year, all the while struggling to cope with the challenges posed by the COVID-19 pandemic.

According to a new report this week from Check Point Software, attacks on healthcare entities worldwide jumped 45% in the past two months as attackers tried to take advantage of the pandemic by disrupting operations and extorting ransoms from organizations under tremendous pressure to provide uninterrupted services.

Related Content:

Ransomware Wave Targets US Hospitals: What We Know So Far

How Data Breaches Affect the Enterprise

New From The Edge: Security Pros Reflect on 2020

The increase in attacks was, in fact, double the increase in cyberattacks on all other industries, Check Point says. On average, healthcare organizations experienced 626 attacks per week in November, compared with 430 attacks on average in the previous months. The most common attack vectors were ransomware, distributed denial-of-service (DDoS), botnets, and remote code execution attacks.

Health organizations in Central Europe were hit particularly hard, Check Point's data shows. Attacks there increased 145% in November and December, followed by attacks on organizations in East Asia (137% increase), Latin America (112% increase), and Europe (67% increase). Attacks on North American healthcare organizations increased by 37%. At a country-specific level, Canada topped the list with a 200% increase in cyberattacks against hospitals and other healthcare entities.

Check Point's latest statistics pertain to attacks the company detected and blocked specifically on networks belonging to its healthcare customers. But the trend is consistent with the alarming number of cyberattacks others have reported in recent months against the healthcare industry.

According to Mimecast, for instance, 90% of healthcare organizations experienced e-mail borne attacks — the most common vector for phishing scams — last year. The activity was especially heavy during the first 100 days of the COVID-19 outbreak, causing significant downtime for almost three-quarters of impacted organizations.

Zscaler, meanwhile, counted a staggering 1.6 billion SSL-based attacks that targeted organizations in the healthcare sector between January and September 2020. That number represents 25.5% of all attacks delivered over encrypted channels during that time frame. Eighty-four percent of all encrypted threats blocked for the healthcare sector were malicious web content, says Deepen Desai, CISO and vice president of security threat research at Zscaler.

Another major attack trend for the healthcare sector was a significant increase in the use of cloud storage service providers like Amazon Web Services, Google, Azure, and Dropbox to host malicious content used in attacks, he says. Attacks against the healthcare industry originating from cloud storage providers skyrocketed from around 55 million in April 2020 to some 396 million in September, according to Zscaler.

Healthcare organizations were also among the most targeted in ransomware attacks last year. Researchers from Zscaler's ThreatLabZ observed a 500% increase in ransomware attacks delivered over encrypted channels between March and September 2020, with the healthcare sector being the second most targeted after the communication sector.

Check Point reported a 71% increase in ransomware attacks against healthcare entities last October, making it the most heavily targeted sector for the month. Seventy-five percent of the attacks involved Ryuk — a ransomware family typically associated with targeted attacks.

The surge in ransomware attacks against hospitals and other healthcare organizations last fall prompted the FBI, the Department of Health & Human Services, and the US Department of Homeland Security's US Cybersecurity and Infrastructure Security Agency to issue a joint advisory urging them to take immediate precautionary measures.The advisory warned healthcare entities about adversaries using Trickbot and BazarLoader malware to distribute ransomware to disrupt operations and to carry out data theft.

"Malicious attacks across the healthcare sector throughout 2020 caused significant downtime for organizations, which resulted in productivity, data, and financial losses," says Matthew Gardiner, principal security strategist at Mimecast. There were many reports of disrupted operations and the delay of nonemergency services, which are both key to ongoing patient health and the financial health of providers, he notes.

Multiple Factors Drive Increase in Healthcare Cyberattacks
Security experts point to multiple factors for the recent surge in attacks against healthcare organizations. For cybercriminals — especially ransomware operators — healthcare entities are a perfect target not just for their sensitive data, but also for the fact that most organizations in the sector cannot afford any operational disruptions, especially in the middle of a pandemic. Security experts say cybercriminals perceive hospitals and other healthcare entities as generally more willing to accede to ransom demands because of the critical nature of their services.

The pandemic and the general stress it has placed on provider organizations was a starting point for a lot of the increased attacker focus on healthcare entities, Gardiner says.

"It is hard to prioritize IT and security when your ICU beds are filling up and planning around emergency expansions are taking priority," he says.

The shift to a remote work model for a lot of non-healthcare professionals, including IT and security personnel, also likely disrupted certain IT and security programs and operations, leaving organizations more vulnerable.

The situation was likely exacerbated by the fact that the healthcare industry traditionally has lagged behind many other industries in IT. Zscaler's Desai says healthcare organizations often lack security controls that others have deployed and are often vulnerable to known issues. Prolonged FDA approvals also can hinder the adoption of more secure technology, making it harder for healthcare entities to implement new security controls.

"For example, security in the healthcare sector is often hindered by legacy technology, with updates often delayed by prolonged FDA approvals," Desai says.

They also face the challenge of preserving compliance with the security and privacy provisions of HIPAA while looking to migrate to potential more secure channels for operation, he says.

"Without unified controls and centralized visibility and policy enforcement, the healthcare industry will continue to face gaps in their security controls that will always draw the attention of cybercriminals," Desai notes. 

Other problems include the many years of underinvestment in modern security systems and IT applications and the huge variability in the size and scale of healthcare providers, Gardiner adds.

"Small, regional healthcare providers lack the economies of scale of billion-dollar healthcare providers that help to afford the best security related people, technology, and processes," he says.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-22
Improper authorization in handler for custom URL scheme vulnerability in ????????? (asken diet) for Android versions from v.3.0.0 to v.4.2.x allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.
PUBLISHED: 2021-06-22
Cross-site scripting vulnerability in Welcart e-Commerce versions prior to 2.2.4 allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
PUBLISHED: 2021-06-22
Cross-site scripting vulnerability in ETUNA EC-CUBE plugins (Delivery slip number plugin (3.0 series) 1.0.10 and earlier, Delivery slip number csv bulk registration plugin (3.0 series) 1.0.8 and earlier, and Delivery slip number mail plugin (3.0 series) 1.0.8 and earlier) allows remote attackers to ...
PUBLISHED: 2021-06-22
NoSQL injection vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to obtain and/or alter the information stored in the database via unspecified vectors.
PUBLISHED: 2021-06-22
Improper authentication vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to view the unauthorized pages without access privileges via unspecified vectors.