Protecting Healthcare Organisations from Cyberattacks

No business sector is safe from ransomware attacks these days. But one industry that has been increasingly under attack—and has life-or-death consequences—is healthcare, as recently uncovered in a new research report from the Ponemon Institute.

In the last year, cyberattacks on the healthcare industry have spiked during the pandemic, threatening disruptions to patient care and exposure of private data. Some recent examples of attacks on healthcare systems include the ransomware attack on Ireland’s health service operator, which crippled diagnostic services and disrupted COVID-19 testing, and Hive’s ransomware takedown of Memorial Health System, which affected hospitals, clinics, and healthcare sites across Ohio and West Virginia.

Why are healthcare organizations in the crosshairs of cybercriminals? Healthcare is a prime target for threat actors because there’s a potentially big payout. Hospitals are likely to pay the ransom because data breaches can trigger litigation and regulatory enquiries, and cause months of disruption while the organization conducts remediation activities. But the consequences of a cyberattack against a hospital go far beyond the fallout of a data leak. When a hospital comes to a standstill because of a cyberattack, lives are at stake. Patient care is disrupted while IT teams race to get healthcare services back online.

Cybercriminals are literally banking on the fact that healthcare organizations are under extreme pressure to get up and running again—so they’re likely to pay staggering sums in ransom. According to a recent Sophos report, 34% of healthcare companies end up paying the ransom after an attack—more than any other industry sector.

So why are healthcare organizations so vulnerable—and what can they do about it? First, they’re dealing with myriad data privacy regulations, including the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act (SOX), and the Payment Card Industry Data Security Standard (PCI DSS). A healthcare system’s Active Directory (AD) provides valuable insights into the status of user roles and privileges as well as any critical changes to the environment. AD can show whether an organization has implemented an architecture that supports the level of access controls specific regulations require, making AD a rich source of information for compliance auditors. However, AD’s ability to demonstrate who has access to what information is also what makes it one of the most common attack vectors for cybercriminals. Among various other tactics, in the attacks on Memorial Health System and the Irish Health Service, bad actors infiltrated systems to then deploy tools to map the AD environment and grant access to critical assets.

Second, in a high-stress hospital environment, employees come and go on a regular basis. IT teams in charge of onboarding and offboarding need to be extra vigilant about checking permission settings, creating new accounts, and deleting accounts.

Third, the rollout of cloud-based telehealth services—which started before the pandemic but certainly accelerated during it—has led to challenges with securing remote access to systems. As organizations embrace the cloud and authenticate to these third-party systems, their attack surface expands considerably as the vendor might have loose security policies. Any serious security vulnerabilities third-party cloud-based systems have can also be used to infiltrate a healthcare organization’s own network, putting patient data at risk.

Defending healthcare identity systems against cyberattacks

So what can be done about cyberattacks on healthcare organizations? The same solid Active Directory security hygiene tactics that work in other industries will work for healthcare, too.

1. Secure Active Directory.

Critical infrastructure attacks often start with cybercriminals exploiting AD weaknesses to gain access to critical information systems. These vulnerabilities include indicators of exposure, such as configurations that have drifted over time, and indicators of compromise, such as evidence of malicious activity.

According to a recent survey of users of Purple Knight, a free AD security assessment tool, organizations of all sizes and across every industry are failing to address AD security gaps that can leave them vulnerable to cyberattacks. Healthcare companies reported an average score of 63% across five Active Directory security categories—a failing grade—behind every other industry except insurance. Healthcare companies also reported the highest number of critical indicators of exposure, reporting the lowest scores with account security. This low score is attributed to problems such as leveraging administrator accounts with old passwords and not requiring user accounts with passwords.

Gaining visibility into your organization’s AD environment to identify these vulnerabilities is the first step in preventing identity-related cyberattacks. Organizations that don’t have a way to screen for these problems can download the free Purple Knight tool at purple-knight.com.

2. Watch for malicious changes in AD.

The tricky part about detecting attacks is that some AD changes fly under the radar of traditional logging tools. This oversight by traditional SIEM solutions paves the way for attackers to lurk in the environment for weeks or months before unleashing malware. During that time, attackers can gain higher privileges and access, allowing them to move laterally through a network to map the system and identify targets before launching an attack. Leveraging tools that can identify attacks that bypass agent-based or log-based detection and provide autonomous rollback of suspicious activity can help organizations spot malicious changes.

3. Have a rock-solid plan for a complete AD forest recovery.

When cybercriminals are sending ransomware notes and the entire hospital staff is locked out of patient records, a fast, tested, and malware-free AD forest recovery plan can significantly minimize the impact of AD outages. In a widespread outage, organizations must recover their AD before they can recover their business. But, according to a poll by the SANS Institute, only one in five organizations have a tested plan in place for recovering AD after a cyberattack.

This oversight can have devastating consequences for healthcare organizations, as AD forest recovery is notoriously cumbersome and prone to failure. While Microsoft provides a lengthy technical guide that details the 28 steps to recover an AD forest, the process is mostly manual and prone to errors that require a restart. The manual AD recovery process can take days, if not weeks, and might reintroduce malware that enables attackers to breach the systems again using the same tactics.

Regular testing is required to reduce the risk of errors and speed recovery when ransomware hits an organization. Furthermore, an automated forest recovery process cuts the time to fully recover AD to minutes—speeding the resumption of normal operations and ensuring the systems is recovered to a known-secure state.

Given the increased attacks and the dire consequences of disrupted patient care, healthcare organizations must deal with the real possibility of a threat actor exploiting AD vulnerabilities to breach and ultimately cripple the entire IT environment. By closing existing AD security gaps, deploying effective threat detection solutions, and implementing a tested AD recovery plan, healthcare organizations can mitigate the risks of a potentially life-threatening cyberattack.

Sean Deuby Director of Services Semperis

Sean Deuby brings 30 years’ experience in Enterprise IT and Hybrid Identity to his role as Director of Services at Semperis. An original architect and technical leader, Sean has been involved with Microsoft identity technology since its inception.

Unlock the Power of WiFi 6: How To Leverage It...

TBT Newsroom • 01st March 2023

Are you tired of being left behind in the technological world? Well, fear not! WiFi 6 is here to save the day and bring your business into the future. With unprecedented speeds and a host of new capabilities, WiFi 6 is the must-have technology for any business looking to stay ahead of the curve.

Sustainable Phones

TBT Newsroom • 04th May 2022

Cat phones (made by UK-based company Bullitt Group) are explicitly designed to be rugged, with devices built to last and have a longer lifespan. Industry Analyst firm Canalys notes that the current average lifecycle of smartphones in the mass market is approximately 37 months for iPhones and 33 months for Android devices.

From Credit Cards To Mobile Payment  

Ripsy Plaid • 27th April 2022

Plaid, the open finance data network, and payments platform have appointed Ripsy Bandourian as its first Head of Europe as it continues to rapidly expand across the continent. Based in Amsterdam, Ripsy will lead the business strategy and operations for Plaid’s Europe arm as it moves into its next stage of growth. 

How biometric technology can be used for remote proof of...

Chris Corfield • 08th April 2022

The pandemic has accelerated the adoption of digital financial services, driving organizations to speed up their transformation programs globally. Most banks, as well as pension providers, are still in the early stages of integrating technologies such as machine learning and artificial intelligence, and as the world continues to battle the long-term effects of COVID-19, the...