Guarding Against Fileless Ransomware Attacks

Guarding Against Fileless Ransomware Attacks

Fileless ransomware attacks are predicted to comprise 35 percent of all attacks next year, according to the Ponemon Institute

Fileless Ransomware Attacks are the new way for cybercriminals to maneuver around ransomware blocks and remain undetected. As forms of protection technology advance, so do the technology the criminals are using to attack.

A recent study indicates that 77 percent of compromised attacks this year were fileless ransomware attacks, and are ten times more likely to succeed than file-based attacks.  These emerging forms of cyber attacks go unrecognized by antivirus tools since they don’t download new software.

Fileless ransomware attacks target vulnerabilities, like browser vulnerabilities, to make the browser run malicious code.  Typically, this happens when a user receives a spam message with a link to a malicious website.  What this also means, is that much of the discourse on preventing ransomware to this point is now outdated.  The focus recently has been preventing ransomware by not downloading attachments from unknown senders.  While that is still applicable, it is not a silver bullet to preventing ransomware attacks.

As this new threat emerges, it is important to update your prevention mechanisms.  A successful fileless attack relies on software vulnerabilities in the software already installed, therefore patching and updating the operating systems and applications are critical.  Additionally, implementing behavior-based systems, including endpoint protection, into your defenses can also spot and prevent a fileless attack. Finally, updating your training, or including a reminder that ransomware attacks can come in ways other than just through email, will also be helpful.  As with many other technical threats to PHI, this one will require a multi-layer approach.

fileless ransomware attacks
KRACK: Understanding the Vulnerability

KRACK: Understanding the Vulnerability

The KRACK WIFI vulnerability was announced by security researchers and the US-CERT today. This vulnerability can affect every modern WIFI network and has the potential to impact every device that connects to WIFI. If affected, KRACK could allow for any information sent over wifi to be stolen including passwords, credit card numbers, private emails, and so on. This vulnerability is a major problem for our enterprises and users. Vendors will be required to step up and provide fixes quickly and everyone throughout the organization to pitch in and follow the recommended remediation.

What is KRACK?

KRACK is a vulnerability in the most common security protocol, WPA2, used to authenticate WIFI connections to a secure network and is used by virtually every WIFI network. When this vulnerability is exploited, it permits an attacker to decrypt the session between a WIFI client (e.g. a mobile device) and the server (e.g. wireless router).  In certain cases, it would permit the alteration of content.  All versions of WPA2 are affected.

How serious is it for me?

KRACK is a very serious problem in the long run, but how concerned you should be in the short term depends upon analyzing your threats.  Threats of concern are those that are local (e.g. within range of your WIFI) and interested in compromising the confidentiality or integrity of your trusted network and the data it contains.  This means that it is not scalable to international actors such as crime cartels.  It can only be exploited by a local actor.

What actions should I be taking?

In the short term, we suggest revisiting your threat assessment and your staff training.  To assess if the threat is imminent, determine whether a local person (e.g.. disgruntled current or former staff)  who may be interested and capable of exploiting this vulnerability.  If this threat exists, a defensive strategy should be developed.

The specific strategy is very organization specific but should include working with law enforcement, upgrading monitoring and log analysis, changing of firewall rules or restructuring of trust zones. Staff should also be trained to pay close attention to HTTPS connections.  This protocol is a weak protection against exploitation, but if the user always checks the internal web resource is protected (e.g. lock icon or “https://” in the URL) the contents will still be encrypted as a  second line of defense. Users must be trained to pay attention to this as they may not receive alerts if it is missing.

Long-term, we recommend that you connect with all vendors of WIFI associated equipment that is used in your environment and determine their schedule for release of software patches and upgrades.  As soon as these are available, install and test each wireless device to ensure proper function.

What WIFI connections and activities are safe?

Bear in mind that “Safe” is a relative word in cybersecurity.  These are safer activities,

  • Use of SSL (HTTPS) connections encrypt data, but the user must pay close attention; and
  • Use of “Thinclients” (e.g. Citrix, VNC or other proprietary protocols) which allow connection to a data that is a picture of the data, rather than a copy of the data.
What WIFI connections are unsafe?

The following connections are not considered safe,

  • VPN connection assumed to be trusted and not using SSL (HTTPS);
  • Internal wireless connection where internal servers do not require SSL;
  • Home WIFI of remote users;
  • Anywhere that the login credentials to WIFI can be reused in another context (e.g. Active Directory);
  • Wherever WPA2 is used in any form to connect to a wireless access point.
Summary

To summarize, a new vulnerability has just come to light that impacts WIFI connections.  This vulnerability can only be carried out by a local actor, therefore you need to evaluate potential threats to staff and others.  If you determine an imminent threat, you should take action immediately.  Otherwise, install and test updates from WIFI associated equipment vendors to mitigate this vulnerability.  

For up-to-date information about the patches you need to secure your wifi, please visit ZD Net. 

QI Express to Present at 89th Annual AHIMA Convention

QI Express to Present at 89th Annual AHIMA Convention

The American Health Information Management Association (AHIMA) Convention and Exhibit is taking place this year in Los Angeles. This annual five-day conference brings together healthcare professionals to explore the vast world of information technology.

AHIMA American Health Information Management Association

The conference will examine the vital topics of health data analytics, informatics, security, and governance. As an increasing need for cyber solutions forms, conferences such as these become one of the main formats to discuss the changing climate of health technology. AHIMA allows presentations, panel discussions, and open forums to educate and advance the healthcare world.

QI Express is proud to announce, that Robert Zimmerman (C.E.O. and Founder) and Adam Bullian (Chief Operating Officer) will be presenting at the Privacy and Security Institute.

Robert Zimmerman, C.E.O.

Connect on LinkedIn

Robert will be kicking off the event early, co-presenting with Special Agent Boeing Shih of the FBI. Their discussion “Emerging Cybersecurity Threats In Small and Medium Sized Hospitals: A Conversation with the FBI Cybersecurity Task Force and Industry Experts” expects to draw a big turnout, as this issue is prevalent and growing in the industry. Robert and Boeing will provide insights into threats that can affect organizations, as well as provide guidance on the best practices on implementing prevention techniques. This panel will be on Saturday, October 7th at 9:15 am.

Adam Bullian, C.O.O.

Connect on Linkedin

Adam will be presenting later that day on “The Essentials of Auditing and Managing Business Associates.” This discussion will cover how healthcare organizations are growing more reliant on vendors to deliver critical business services. As more associates are added to the business chain, more vulnerabilities arise and the risk grows. Adam will provide practical steps that hospitals of all sizes can take to understand, evaluate, validate, and manage the safeguards our business associates are applying. Adam’s discussion will be on Saturday, October 7th at 1:45 pm.

QI Express’s solutions include Security Risk Assessments, Security Readiness for Small and Medium-Sized Businesses, Security Awareness Training, HIPAA HITRUST Audit and Certification, and Emergency Preparedness.

For more information on AHIMA please visit

http://www.ahima.org/For a schedule of AHIMA events please visit http://www.ahima.org/convention/schedule

We look forward to seeing you there! To request a demo or would like more information about our services, please fill out the form below. 

Your Name:*
E-mail:*
Message:
Type the characters you see here:

Where In The Cloud Is Your PHI?

Where In The Cloud Is Your PHI?

Storing Protected Health Information (“PHI”) in the cloud can be a very useful thing for covered entities and business associates.  As we know, HIPAA does permit storing PHI in the cloud if the cloud storage provider executes a Business Associate Agreement.  However, do you know exactly where that PHI is stored by the cloud provider?  In some instances the cloud storage vendor might store, backup, or process the PHI in an overseas location.  How do you protect the PHI, and yourself, in such a situation?

HIPAA does not specifically forbid storing PHI in an offshore location (some states do forbid storing Medicaid data offshore), but it does create challenges.  First, you must determine where your cloud vendors will be storing the information, and whether it will be offshore or not.  If it is offshore, you need to determine the specific location and what local rules might apply to the PHI. Local laws in the international jurisdiction where PHI might be stored might actually allow for access to the data that would be in violation of HIPAA.  The duty is on you, as you contract with the cloud provider, to determine if the security efforts are sufficient or if the location of the data will pose any risks. Furthermore, offshore cloud providers might not be bound by HIPAA, but you – presumably operating in the United States – are.  If your international cloud provider is at fault for a breach but cannot be held accountable, you might determined to be liable even if the only action you took was selecting the wrong vendor.

Without question, storing PHI offshore brings unique challenges. Whether they are worth it or not can only be answered by you. However, if you are considering a vendor that will store PHI internationally, be sure to conduct a risk assessment to ensure you are not putting PHI in increased or unnecessary risk.

California Primary Care Association 2017 Annual Conference

California Primary Care Association 2017 Annual Conference

CPCA’s Annual Conference is the organization’s premier event providing attendees with fresh educational content, abundant networking opportunities, and access to cutting-edge expertise. This year’s event will not disappoint with renowned keynote speakers, industry tradeshow, and new, exciting features you won’t want to miss! We hope to see you there!

More information