Security Experts:

Connect with us

Hi, what are you looking for?


Incident Response

The Latest Strains of Attacks on the Pharmaceutical and Healthcare Sector

Cyber Attacks Continue to Plague the Pharmaceutical and Healthcare Industries That Remain Lucrative Targets

Cyber Attacks Continue to Plague the Pharmaceutical and Healthcare Industries That Remain Lucrative Targets

Schools were shut down due to high levels of absences and for sanitation purposes. Medical facilities were overflowing with patients. Visitor restrictions at hospitals and nursing facilities were in full force. Thankfully the flu season is starting to wind down, but this has been a particularly nasty episode. Several reasons have been cited, including the circulation of a particularly severe form of the flu virus that can cause more health complications, as well as local shortages and limited effectiveness of vaccines and antiviral medications against certain strains. 

But these aren’t the only types of attacks that the pharmaceutical and healthcare sectors have had to contend with. Cyber attacks, campaigns and security incidents continue to plague these industries that remain lucrative targets primarily because of the type of information they hold, including personal health information (PHI) such as medical records and insurance information, personally identifiable information (PII), and financial information. The value of this data to financially-motivated threat actors is evident by continued extortion attempts against companies in this sector and data breaches. Let’s look at a few recent examples.

● Extortion attacks, the now infamous ransomware attacks we read about daily, are affecting all sectors and healthcare and pharmaceutical companies are not immune. The personal and sensitive information they hold, offer lucrative opportunities for threat actors to conduct identity theft, fraud and sell data to other threat actors. 

Last October the threat actor, thedarkoverlord, appears to have been hard at work. A U.S.-based clinic was the target of an attempted extortion attack following a data breach that contained PII and some health-related information. The threat group mentioned the attack on Twitter but there has been no indication that the data has been publicly released. Around the same time, there was another report of a U.K.-based healthcare clinic that suffered a data breach and received an extortion demand from thedarkoverlord. An unspecified amount of data was reportedly stolen, which included PII, as well as pre- and post-operative photographs. As in the first case, there has been no indication that the data is widely available – yet.

These are just two examples of the repeated attacks by thedarkoverlord against healthcare organizations. While details aren’t clear as to how they are able to gain access to victims’ networks, they have alluded to using zero-day exploits in remote desktop protocol (RDP) servers. 

● Data breaches can have long-lasting impacts on organizations and individuals. Just consider the Yahoo breaches if you have any doubts. In the healthcare industry we see the same thing. Late last year the HaveIBeenPwned website added approximately four million records from Malaysian websites to its data repository. The data was obtained reportedly from multiple companies, many in the healthcare industry, and appears to have been sourced in 2012. It includes PII, physical addresses, government-issued ID numbers and some credentials. The data was allegedly freely available to download on a hidden service and was likely accessed by a variety of threat actors for a range of malicious purposes including social engineering attempts, identity theft and account compromise.

Just as healthcare and pharmaceutical companies continuously look for more effective vaccines and protocols to contain outbreaks and mitigate consequences from the flu, what can these sectors do to boost their defenses against cyber threats and comply with legislation such as the Health Insurance Portability and Accountability Act (HIPAA)?

It starts with a defense-in-depth strategy guided by four main principles. These include: use of host-based firewalls and IP-whitelisting measures, segmenting networks and restricting workstation-to-workstation communication, applying patches and disabling unneeded legacy features, and restricting access to important data to only those who are required to have it.

But as I have previously discussed, you also need visibility outside your organization and across the widest range of data sources possible to mitigate digital risk and better protect your organization. Digital risks include cyber threats, data exposure, brand exposure, third-party risk, VIP exposure, physical threats and infrastructure exposure. Often these threats and risks span data sources and cannot be detected in full context by any point solution or even by multiple solutions used in isolation. 

In these examples of extortion attacks and breaches, monitoring social media for mentions of your company, IP addresses, and even industry can help you determine if you’ve been targeted or may be, so you can proactively strengthen defenses. Threat actors may also post messages via social media or to Pastebin to apply pressure to the CEO to pay the ransom. Access to hacked RDP sites will allow you to check for mentions of your IP addresses. And monitoring the dark web can provide information on threat actor profiles to understand their motivation and gauge credibility.

An approach that combines monitoring across the entire Internet for risks to your business, with a defense-in-depth strategy, won’t stop every case of what ails you. But it will get you on the road to a full recovery faster and boost your defenses and compliance in advance of the next “flu” season.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...