(Seongsu Park, security researcher at Kaspersky)

 

The dark web is made of anything that is not commonly indexed on the surface web. To be able to get into this hidden part of the web, a user should use a special software such as Tor. Tor stands for “the onion router” and is a method for anonymizing data.

 

Based on the research of the global cybersecurity company, hospital and healthcare infiltrations are among the newest services being offered by anonymous hacking groups, alongside targeted attacks and cyberespionage against specific countries as well as infections to gain energy and maritime information.

 

“With the healthcare sector a bit lagging in terms of their cybersecurity capabilities, we observe that hacking groups are now off to exploit this fact by adding medical information and hospital attacks to their services list publicly available on the dark web. Any organizations, individuals, and companies can be their potential customers since these cybercriminals are offering various services,” comments Seongsu Park, security researcher at Kaspersky.

 

Park also noted that medical records can be considered more valuable than a simple credit card. This is because a hospital generally requires a patient’s personal and financial credentials before a check-up or an admission.

 

“Based on the indications and patterns we have seen and are still seeing on the dark web, the main purpose of the individuals behind these hacking groups is to sell the medical information to another crime group or to any individual who aims to access confidential medical data. It is quite alarming that we are increasingly coming across such active advertisements, which can either mean this illegal practice has turned into a normal type of business or the demand for such attacks are becoming increasingly high,” adds Park.

 

The motives of the buyers, according to Park, can include calling scam, identity and monetary theft, as well as blackmailing and any derived crimes. Such malicious actions are possible with the amount of records and confidential data hacking for hire groups can harvest illegally from the affected health institutions. When it comes to the possible customer profiles, the nature of the dark web being anonymous opens the possibility that it could be anyone – from a new hacker, to an enterprise, or even a nation-backed cyberespionage group. The hospital loopholes and how to secure them

 

The current threats posed against the healthcare sector show how more and more malicious actors are targeting the industry. To be able to help protect these organizations and their patients, Kaspersky names the possible security loopholes and how to build their defenses below:

 

1. Exposed vulnerable servers and patient records

 

  • The security challenge: These vulnerabilities are usually unintentional and are the result of misconfiguration or unconcern.
  • The suggested solutions:
    • Kaspersky suggests healthcare organizations to identify the important data they are storing and to figure out how they can protect them.
    • Increased in education in terms of cybersecurity is also needed so the workforce could know the do’s and don’ts and the signs of a cyber incident. This could be done through a series of Security Awareness Training.

 

2. Complex and ultra-connected medical devices

 

  • The security challenge: The functions of medical devices are becoming diverse and complex. Many medical devices are also being connected to the network without considering its security.
  • The suggested solutions:
    • Follow the basic rules including keeping all software up to date and institute a strong password policy for devices connected to the web.
    • For added layer of security, it is suggested to employ real-time and in-depth threat intelligence as well as holistic cybersecurity solutions into a medical organization’s IT infrastructure.

RECOMMENDED ARTICLE FOR TECHWORLD


 
Simplify Your Life with the USB Type-C Storage Solutions from Transcend
Techworld Date Posted: 10 May 2019 11:26 AM | 182 Views
With the growing adoption of the USB Type-C standard by new platforms and devices, Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, has constantly developed a wide range of USB.... See More
 
Simplify Your Life with the USB Type-C Storage Solutions from Transcend
Techworld Date Posted: 11:26 AM | 182 Views
With the growing adoption of the USB Type-C standard by new platforms and devices, Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, has constantly developed a wide range of USB...See More

 
PLDT Introduces a New Era of Home Broadband with All-New Google Wifi Plans
Techworld Date Posted: 4 January 2019 3:53 PM | 456 Views
Leading digital services provider PLDT is ushering in a new era of home broadband as it introduces the new PLDT Home Google Wifi Plans, which lets you enjoy Unli Fibr in every room and.... See More
 
PLDT Introduces a New Era of Home Broadband with All-New Google Wifi Plans
Techworld Date Posted: 3:53 PM | 456 Views
Leading digital services provider PLDT is ushering in a new era of home broadband as it introduces the new PLDT Home Google Wifi Plans, which lets you enjoy Unli Fibr in every room and...See More

 
Five Questions to Ask Your Internet Installer
Techworld Date Posted: 21 February 2019 8:53 AM | 285 Views
You decide to change your provider or perhaps have an Internet connection installed in your new apartment. One way to go would be to call an installer and quietly wait in the kitchen for.... See More
 
Five Questions to Ask Your Internet Installer
Techworld Date Posted: 8:53 AM | 285 Views
You decide to change your provider or perhaps have an Internet connection installed in your new apartment. One way to go would be to call an installer and quietly wait in the kitchen for...See More

 
Special Delivery: Cybercriminals Use Pirated Software to Secretly Infect PCs for Cryptocurrency Mining
Techworld Date Posted: 3 January 2018 2:23 PM | 568 Views
Kaspersky Lab researchers have identified a fraud scheme where mining software was distributed and secretly installed on users’. See More
 
Special Delivery: Cybercriminals Use Pirated Software to Secretly Infect PCs for Cryptocurrency Mining
Techworld Date Posted: 2:23 PM | 568 Views
Kaspersky Lab researchers have identified a fraud scheme where mining software was distributed and secretly installed on users’See More

 
Q3 2017 Akamai State of the Internet / Security Report Reveals Significant Increase in Web Application Security Attacks, Evolution of Attacker Strategies
Techworld Date Posted: 1 December 2017 3:40 PM | 511 Views
Newly released data shows that web application attacks continued to rise significantly in both the quarter-over-quarter and year-over-year timeframes, according to the Third Quarter, 2017 State of the Internet / Security Report released by.... See More
 
Q3 2017 Akamai State of the Internet / Security Report Reveals Significant Increase in Web Application Security Attacks, Evolution of Attacker Strategies
Techworld Date Posted: 3:40 PM | 511 Views
Newly released data shows that web application attacks continued to rise significantly in both the quarter-over-quarter and year-over-year timeframes, according to the Third Quarter, 2017 State of the Internet / Security Report released by...See More

 
Grade School Students, Big Winner in Power Mac Center App Contest
Techworld Date Posted: 27 February 2019 3:51 PM | 309 Views
A game app that will help toddlers and grade school students build their passion for learning bagged the grand prize in Power Mac Center’s recently concluded “emPOWER UP! Design a Better World: App Development.... See More
 
Grade School Students, Big Winner in Power Mac Center App Contest
Techworld Date Posted: 3:51 PM | 309 Views
A game app that will help toddlers and grade school students build their passion for learning bagged the grand prize in Power Mac Center’s recently concluded “emPOWER UP! Design a Better World: App Development...See More

 
Win a Brand New Car in TCL Cool Deals Hot Wheels 2 Promo
Techworld Date Posted: 4 November 2017 4:15 PM | 757 Views
TCL, one of the leading TV and AV brands in the country, will give away One (1) brand new Toyota Wigo in its TCL Cool Deals Hot Wheels 2 raffle promo which will run.... See More
 
Win a Brand New Car in TCL Cool Deals Hot Wheels 2 Promo
Techworld Date Posted: 4:15 PM | 757 Views
TCL, one of the leading TV and AV brands in the country, will give away One (1) brand new Toyota Wigo in its TCL Cool Deals Hot Wheels 2 raffle promo which will run...See More

 
Smart Widens Lead in Overall Mobile Data Download Speeds – OpenSignal
Techworld Date Posted: 1 June 2018 9:00 AM | 207 Views
PLDT wireless subsidiary Smart Communications, Inc. has almost doubled its overall mobile data download speeds over the past year largely because of improved LTE availability and speeds, according to a just-released analysis by independent.... See More
 
Smart Widens Lead in Overall Mobile Data Download Speeds – OpenSignal
Techworld Date Posted: 9:00 AM | 207 Views
PLDT wireless subsidiary Smart Communications, Inc. has almost doubled its overall mobile data download speeds over the past year largely because of improved LTE availability and speeds, according to a just-released analysis by independent...See More

 
Industrial Networks of Energy and ICS Integration Companies Hit by More Cyberattacks than Any Other Industry in H2, 2017
Techworld Date Posted: 28 March 2018 3:32 PM | 180 Views
Almost 40% of all industrial control systems (ICS) in energy organizations protected by Kaspersky Lab solutions were attacked by malware at least once during the last six months of 2017, closely followed by 35.3%.... See More
 
Industrial Networks of Energy and ICS Integration Companies Hit by More Cyberattacks than Any Other Industry in H2, 2017
Techworld Date Posted: 3:32 PM | 180 Views
Almost 40% of all industrial control systems (ICS) in energy organizations protected by Kaspersky Lab solutions were attacked by malware at least once during the last six months of 2017, closely followed by 35.3%...See More

 
Fujitsu Selects Cebu for Philippines Expansion
Techworld Date Posted: 19 October 2017 5:27 PM | 621 Views
From L-R:Arlene Gregorio, Head of Fujitsu's Global Delivery Center in the Philippines, Hidenori Furuta, Executive Vice President and Head of Global Delivery, Monchito Ibrahim: Undersecretary of the Department of Information and Communications Technology of.... See More
 
Fujitsu Selects Cebu for Philippines Expansion
Techworld Date Posted: 5:27 PM | 621 Views
From L-R:Arlene Gregorio, Head of Fujitsu's Global Delivery Center in the Philippines, Hidenori Furuta, Executive Vice President and Head of Global Delivery, Monchito Ibrahim: Undersecretary of the Department of Information and Communications Technology of...See More


Power by

Download Free AZ | Free Wordpress Themes