Hospital Cyber-Attack Highlights Health Care Vulnerabilities

Advertisement
By Associated Press | Updated: 31 March 2016 17:08 IST
A cyber-attack that paralyzed the hospital chain MedStar this week is serving as a fresh reminder of vulnerabilities that exist in systems that protect sensitive patient information.

That attack came a month after a Los Angeles hospital paid hackers $17,000 (roughly Rs. 11,25,000) to regain control of its computer system and more than a year after intruders broke into a database containing the records of nearly 80 million people maintained by the health insurer Anthem.

In Anthem's case, only a single password stood between hackers with a stolen employee ID and a chance to plunder the Blue Cross-Blue Shield carrier's database, according to a federal lawsuit filed by customers over the breach.

Cyber criminals also have staged high-profile attacks in recent years against the federal government, retail chains and the adultery website Ashley Madison, among many other targets. But security experts say health care companies make especially inviting targets for a number of reasons.

Advertisement

The information they protect is more valuable on the black market than a credit card number stored by a retailer. Health care cyber-security also can lag behind measures taken in other sectors like banking.

Advertisement

This can stem in part from a business emphasis on tight budgets and convenience over security. Health care companies also have to deal with an additional headache: Multiple entry points into a system, with security quality varying among clinics, labs, hospitals that may have access.

Cyber-security experts note that government guidelines for health care data protection also are light on details and standards. The federal law known as HIPAA tells health care companies when they can disclose a person's records and to whom. It also requires them to protect the information.

Advertisement

But it doesn't come with a lot of specific mandates for that protection, said Lee Kim, director of privacy and security for the nonprofit Healthcare Information and Management Systems Society.

Intruders cracked Anthem's database sometime between the end of 2014 and the start of 2015 in a hack that is still under investigation. They gained access to Social Security numbers, birth dates and employment details for customers as far back as 2004, all key ingredients for stealing someone's identity.

Advertisement

Anthem, the nation's second-largest health insurer, has said that hackers staged a sophisticated attack that evaded multiple layers of security to reach its database. But a lawsuit filed last year by customers who say they were affected by the breach paints Anthem as a ripe target.

It says the insurer allowed wide employee access to its database and didn't train employees how to handle "phishing" emails, which can bait a recipient into revealing a password.

Investigators have said they think hackers may have used a phishing scheme to compromise the credentials of several workers.

A partially redact complaint filed in the litigation also said the company failed to employ common defenses like encryption, which can scramble data and make it useless.

"Stealing this much data takes time, and there were numerous steps along the way when any company following standard IT security practices would have foiled the hackers," the complaint states.

An Anthem spokeswoman said the details in the federal lawsuit were merely allegations, and the company could not comment on pending litigation.

"At Anthem, securing our member, provider and client data is a top priority," spokeswoman Jill Becher said in an email.

Hackers cracked Anthem's database by stealing the credentials of an employee whose job didn't require access to the database, according to the complaint, which was based in part on a security assessment Anthem commissioned after the breach.

A failure to restrict access to sensitive information is one of the biggest security weaknesses hackers exploit, said Michael Zweiback, an attorney and former federal prosecutor. Allowing widespread access gives hackers many chances to try to trick a worker into divulging a password.

"This is something that happens in hospitals, it happens in Fortune 500 companies right now, every day," he said.

Companies hesitate to restrict access because they want to make it easy for employees to move from network to network and do their jobs, Zweiback said.

"When security becomes the emphasis, employees start to complain because maybe they don't get access as quickly," he said.

The lawsuit also states that Anthem only required a single password for those who wanted to get into its database from a remote location. Experts say two-factor authentication is the more common practice. This basically involves an employee entering a user name and password and then a separate password or identification number that can change.

Only about 10 percent of health insurers use two-factor authentication and encryption to protect data, said Avivah Litan, a cyber-security analyst for the information technology adviser Gartner. Litan works as a consultant in several sectors, including health care.

Anthem has said it normally encrypts data it exports, but that practice would not have helped because the hacker used high-level security credentials to get into its system.

Experts say encryption can be tuned so that even authorized users can view only one person's account or a portion of a record at a time.

Litan and other consultants say health care companies have started showing more interest in cyber-security, and top executives of these companies have begun to pay closer attention to it. But Litan hasn't seen the actual investment from these companies yet.

"I'm sure Anthem has made some changes, but the other ones are waiting until they get budgets, and they won't get budgets until they get breached," she said. "That's just the way it works."

Anthem has said in regulatory filings that it quickly fixed a security vulnerability it discovered after its breach and has continued to improve security since then.

Ultimately, no security plan is perfect against a determined hacker, noted John Gunn, vice president for VASCO Data Security. But companies that drop several layers of security between an intruder and sensitive information can convince a hacker to try elsewhere.

"The more systems that companies put in place, the more attractive other targets are based on what a hacker has to invest and what they will get for it," Gunn said. "Companies make this cost-reward decision, so do hackers."

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. Samsung Galaxy Tab A11, Tab A11+ Design, Features Leaked Ahead of Launch
  2. iPhone 17 Pro Max Cosmic Orange Variant Out of Stock in the US, India: Report
  3. These New AI Features Are Coming to Your Updated iPhone, iPad and Mac
  4. Google Pixel 10 Review: A Brilliant Phone We Wanted to Love
  5. Early Deals on PlayStation 5 and Accessories Revealed Ahead of Amazon Sale
  6. iOS 26 Update Brings These New Features to AirPods Pro 3, Pro 2, AirPods 4
  1. Sony Said to Be Planning State of Play Broadcast for Next Week
  2. France Could Block Crypto Firms With MiCA Licenses Due to Enforcement Gap Concerns
  3. Oppo Find X9 Pro With Dimensity 9500 SoC Scores 4 Million Points on AnTuTu; Spotted on Geekbench
  4. Xiaomi 17 Pro Design Render Gives Us a Good Look at Its Leica-Branded Rear Cameras, Secondary Display
  5. Clair Obscur: Expedition 33 Has Sold 4.4 Million Copies in Less Than Six Months of Launch
  6. Materialists Now Streaming on Netflix: What You Need to Know About Dakota Johnson’s Starrer Movie
  7. The Trial Season 2 OTT Release Date: When and Where to Watch Kajol’s Legal Drama Series Online
  8. Ghaati OTT Release Reportedly Revealed Online: When and Where to Watch Anushka Shetty-Starrer Movie Online?
  9. American Express Launches NFT Passport Stamps to Commemorate Travel Memories
  10. Huawei Watch GT 6, GT 6 Pro Price, Specifications Leak Ahead of September 19 Launch: Report
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.