Finjan’s Malicious Code Research Center (MCRC) detected the server, which was used as a Command and Control (C&C) for the Malware that was executed on infected PCs. This same server was also drop off point for private information being harvested by the Malware. The C&C server allowed the attacker to harvest information and control the infected systems. The other issue, as Finjan explained, was that the captured data was left unprotected, and available to anyone online malicious or otherwise.
The data in the files varies from claims with patient data and records, to bank data on customers, business related email, and in a few cases, captured Outlook accounts with email communications.
This theft of data has been a major concern for healthcare providers. Infected PCs are a serious business problem that requires proactive action since it is no longer just a technical IT problem. The existence of large amount of data on a server that hackers can easily manage and control shows the rapid evolution of cybercrime. This wreaks havoc with healthcare providers who must comply with HIPPA guidelines and protect patient data from cyber criminals.
The data in the files varies from claims with patient data and records, to bank data on customers, business related email, and in a few cases, captured Outlook accounts with email communications.
This theft of data has been a major concern for healthcare providers. Infected PCs are a serious business problem that requires proactive action since it is no longer just a technical IT problem. The existence of large amount of data on a server that hackers can easily manage and control shows the rapid evolution of cybercrime. This wreaks havoc with healthcare providers who must comply with HIPPA guidelines and protect patient data from cyber criminals.
No comments:
Post a Comment