TLP White: In this edition of Hacking Healthcare, we begin the new year with a brief explanation of the increased nation state threat stemming from the killing of Iranian Gen. Soleimani. We then briefly review Mastercard’s most recent cybersecurity acquisition and what it might mean for them and their franchisees. Finally, we delve into Russia’s announcement that they have successfully tested their own “internal internet”.
As a reminder, this is the public version of the Hacking Healthcare blog. For additional in-depth analysis and opinion, become a member of H-ISAC and receive the TLP Amber version of this blog (available in the Member Portal.)
Hope you had a great holiday, and welcome back to Hacking Healthcare.
Targeted Killing of Iranian General Increases Nation State Threat Risk.
The killing of Iranian Gen. Soleimani, and the subsequent outpouring of promises by both Iranian government and non-government sources to retaliate against the United States, has many experts saying that the likelihood of offensive cyber operations targeting U.S. organizations has increased. Christopher Krebs, head of the U.S. Cybersecurity and Infrastructure Security Agency (“CISA”), has since re-iterated CISA’s guidance on Iran from this past summer by tweeting “Bottom line: time to brush up on Iranian TTPs and pay close attention to your critical systems, particularly ICS.”[i]
While significant attention has been given to the possible targets of a more traditional kinetic attack, Iran will almost certainly consider making use of its cyber capabilities as part of its response. This is especially true if it wishes to directly impact the United States while attempting to avoid direct attribution and not look like an aggressor. Iran has showcased significant offensive cyber capabilities in the recent past, with numerous intrusions and attacks in the Middle East and United States being attributed to one of several Iranian linked Advanced Persistent Threat (“APT”) groups.[ii], [iii]
Healthcare and Public Health (“HPH”) sector organizations should recognize the increased risk associated with the heightened tensions between the United States and Iran and assess the necessity of any changes to their cybersecurity posture. At a minimum, make sure you are paying close attention to threat intelligence via the H-ISAC and other sources.
Mastercard Looks to Purchase Supply Chain Monitoring Organization.
Last week, Mastercard announced that it had agreed to acquire supply chain monitoring company RiskRecon.[iv] This would be yet another cybersecurity acquisition that Mastercard has made in 2019, and it draws further attention to the seriousness that organizations are paying to supply chain risk management.
Mastercard is being tight lipped about its long-term plans for the company, but with the growth of awareness around supply chain attacks and the proliferation of Magecart malware, such an investment would seem prudent. Mastercard’s official press release also states that RiskRecon will “continue to provide cyber security solutions across a broader set of industries, including healthcare and manufacturing.”[v]
Russia Claims Internal Internet Success.
As we outlined previously, Russia began taking steps months ago to implement the technical infrastructure necessary to effectively disconnect the country from the global internet and operate an insulated Russian alternative. While there have been doubts as to the feasibility of the endeavor, the Russian government announced a successful trial of the technology on December 24th.[vi] There are reportedly few details as to the exact parameters of the test, but the Ministry of Communications declared that users did not notice the change and results are being delivered to President Putin for review.[vii]
The technical aspects of the project include the cooperation of domestic ISPs and regulation of global internet access points into Russia. Cooperation of these firms has been made easier by the fact that many are state-owned or heavily state-linked. Professor Alan Woodward of the University of Surrey explained that Russia is attempting to create a giant intranet, which is akin to creating a larger version of what a large corporation or business entity does.[viii]
Tuesday, January 7th:
– No relevant hearings
Wednesday, January 8th:
– No relevant hearings
Thursday, January 9th:
– No relevant hearings
International Hearings/Meetings –
-No relevant hearings
Conferences, Webinars, and Summits –
–H-ISAC Navigator Webinar from Valimail – A Sign of the Times: Automated communications fraud and what you can do to stop it (1/22/2020 at Noon ET)
–H-ISAC Security Workshop – London, UK (2/5/2020)
–Healthcare Cybersecurity Forum – Southern California – San Diego, CA (2/5/2020)
–Global Cyber Security in Healthcare & Pharma Summit – London, UK (2/6/2020)
–H-ISAC Analysts Security Workshop – Titusville, FL (3/4/2020)
–H-ISAC Security Workshop – Chennai, India (3/27/2020)
— 2020 APAC Summit – Singapore (3/31/2020-4/2/2020)
–H-ISAC Security Workshop – Cambridge, MA (4/7/2020)
–H-ISAC Security Workshop – Atlanta, GA (4/14/2020)
–Healthcare Cybersecurity Forum – Mid-Atlantic – Philadelphia, PA (4/20/2020)
–H-ISAC Security Workshop – Frederick, MD (6/9/2020)
Healthcare Cybersecurity Forum – Rocky Mountain – Denver, CO (7/20/2020)
Healthcare Cybersecurity Forum – Southeast – Nashville, TN (9/9/2020)
Healthcare Cybersecurity Forum – Northeast – Boston, MA (9/22/2020)
Healthcare Cybersecurity Forum – Texas – Houston, TX (10/8/2020)
Healthcare Cybersecurity Forum – Pacific Northwest – Seattle, WA (10/28/2020)
Healthcare Cybersecurity Forum – California – Los Angeles, CA (11/12/2020)
–Not so IDLE hands: FBI program offers companies data protection via deception
Coast Guard says Ryuk ransomware hit systems that monitor cargo transfers at maritime facility
–The Apple Watch Is Smart, but It Can’t Replace Your Doctor
–Hackers steal data for 15 million patients, then sell it back to lab that lost it
–‘Serious cyber-attack’ on Austria’s foreign ministry
Contact us: follow @HealthISAC, and email at contact