Almost a year after Wannacry took control of the NHS IT infrastructure, Orangeworm has been identified by Symantec as a new threat to healthcare. The group has targeted a number of countries – 32% of which are in Europe (5% in UK) and primarily targeting the healthcare industry (39%).
Sara Jost, a former nurse and now the Global Healthcare Industry Lead at BlackBerry, feels the heart of the healthcare industry’s vulnerability is due to the lack of IT experts and cybersecurity being seen as an afterthought, which could have consequences as harsh as loss of life.
Healthcare security still lags behind other industries, but it is a hacker’s heaven as they contain all the information necessary for medical identity fraud – an extremely lucrative crime, and selling up to ten times the price of stolen credit card numbers on the black market.
Included below is some insight and advice from BlackBerry following the identification of Orangeworm.
If you’d be keen to speak to Sara further about this and how the industry can look to better protect itself in a world that is becoming increasingly more connected, please do let me know.
Sara Jost, Global Healthcare Industry Lead, BlackBerry:
“Healthcare is an industry under siege. This statement was true this time last year when the NHS was hit by Wannacry and underscored by the latest discovery of new attack group, Orangeworm, which has been targeting various countries, 32% of which are in Europe. Care providers are targeted by cybercriminals with greater frequency than any other organisation. And thanks to old equipment and flagging security standards, these attacks find success far more often than they should.
Although healthcare isn’t the only industry targeted, it appears almost 40% of its victims operate within the healthcare industry and it appears to choose targets carefully and deliberately. From a criminal’s perspective, healthcare records are a golden goose. They contain all the information necessary for medical identity fraud, an extremely lucrative crime. And they sell for up to ten times the price of stolen credit card numbers on the black market.
This is compounded by the fact that healthcare security still lags well behind other industries. It is easier for a criminal to lift medical data from several small clinics than it is to steal money from a bank, for example. Given the potential for a much greater payoff, it isn’t difficult to see why so many criminals have hospitals and clinics in their crosshairs.
The heart of healthcare’s cybersecurity woes can be traced to a single cause – the men and women who run healthcare organisations are clinicians, not IT professionals. Though brilliant physicians and businesspeople, they are not security experts. They allot most their organisational budget towards excellent patient care and medical advances.
IT is often an afterthought, even as more and more healthcare data is digitised.
The entry of connected devices into hospitals and clinics will make things even worse if left unaddressed. Internet of Things (IoT) medical devices like infusion pumps and cardiac implants frequently contain vulnerabilities with the potential to be life-threatening. As for regulations and security standards – which many providers already have difficulty adhering to – they have failed to evolve as quickly as the threat landscape.
Device makers and care providers alike need to stop treating care and security as two separate entities. They aren’t. Ensuring health data is safe from people who’d misuse it is just as much a part of effective patient care as efficient treatment.”