• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

 | 

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

 | 

How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

 | 

WhatsApp cracks down on 6.8M scam accounts in global takedown

 | 

Trend Micro fixes two actively exploited Apex One RCE flaws

 | 

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

 | 

Google fixed two Qualcomm bugs that were actively exploited in the wild

 | 

Zero Day Quest returns: Microsoft ups the stakes with $5M bug bounty

 | 

Cisco disclosed a CRM data breach via vishing attack

 | 

Exposed Without a Breach: The Cost of Data Blindness

 | 

SonicWall investigates possible zero-day amid Akira ransomware surge

 | 

Chaining NVIDIA's Triton Server flaws exposes AI systems to remote takeover

 | 

Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer

 | 

Northwest Radiologists data breach hits 350,000 in Washington

 | 

PlayPraetor Android RAT expands rapidly across Spanish and French-speaking regions

 | 

Lovense flaws expose emails and allow account takeover

 | 

Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024

 | 

Akira Ransomware targets SonicWall VPNs in likely zero-day attacks

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 56

 | 

Security Affairs newsletter Round 535 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber Crime
  • Hacking
  • Malware
  • Security
  • Malware attacks Georgia Hospital, have we learnt the lesson?

Malware attacks Georgia Hospital, have we learnt the lesson?

Pierluigi Paganini December 21, 2011

The medical industry is historically one of the sectors that has benefited more than others for the introduction of technology. Devices allow ever more complex operations every day to millions of patients and to medical equipments, from health conditions monitoring to remote surgery. Informations systems manage massive amounts of sensitive information, making them available to medical staff and users through computer networks of various kinds. The introduction of mobile devices has finally been received with great enthusiasm … patient data always at hand and with them the opportunity to interact for any need, from an examination booking to a medical record querying.

But what is the downside? To a such robust boost of technology not corrispond the same effort on security side. The most frequently used applications in this area are vulnerable to every kind of attack. Fully exposed to attacks of various kinds are on the agenda. We observe a completely lacks of awareness on how critical can be a cyber attack for medical structures. No matter if the weapon used is a virus, or DDOS attack conducted, needless to discuss the possibility of an intentional attack rather than an accident linked to human distraction, the result could be catastrophic, and there are lives at stake. Systems and technologies in health should be preserved like the military. Unthinkable to go into hospitals being able to connect an external devices to the main network operating undisturbed. This is a common scenarios in many Italian structures.

Consider also that recent incidents, including hacking of Sony’s PlayStation Network and the  RSA security breach have demonstrated that even well protected networks are vulnerable to external attacks of ever-increasing sophistication. To give an idea of the phenomenon let analyze official data related to incidents, in the last two years alone, personal medical information of over 7.8 million people have been exposed, an in a striking case have been stolen 1.7 million records from an unlocked van of a records management company.

Although the Health Insurance Portability and Accountability Act, or HIPAA by law, that medicla information must be held in private, but during the ordinary operations this data are managed in clear, that require every precaution to ensure that the information we come across is kept secure.

Same simple rule to follow to ensure minimul security requirements:

  • encrypting any files that might contain sensible information
  • accessing databases and servers over secure connections (i.e. using VPN)
  • extracting and locally storing only strictly anonymized data
  • ensuring the physical security of your computer and access to critical departments

Database exposed, patient information at risk of theft. In an extreme simplification we can summarize the types of accidents classified them based on the injured party:

  • attacks / incidents to the information systems that expose sensitive information of patients
  • attacks on computer, control systems and other medical equipments

Both occurrences are extremely dangerous. The disclosure of sensitive information could jeopardize the lives of an individual and his relationship to society. The knowledge of a disease could be used for different purposes ignoble and might lead to discrimination against individuals.

Damages, incidental and volunteers, to information systems and control systems could pose a serious risk the lives of patients. For example, the failure of the control system of medical gas inside a structure could cause death in patients undergoing surgery.
Similar incidents may be conducted as real military actions to undermine the enemy defense systems and rescue.
We can discuss for hours on this scenarios illustrating potential effects of an accident such as those mentioned, but what is really interesting to our discussion is to consider this sector critical in the strategies of cyber defense. We have not just consider medical structures like critical infrastructure to preserve but we must to exercise control and implement effective security measures. Personnel should be sufficiently prepared and inside the structures are indispensable new figures, prepared to deal with cyber threats. The costs of training will certainly be offset by the limitation of losses in case of accident.

It is news of the day that a Malware in a Georgia hospital’s computer system has forced it to turn away patients, highlighting the problems and vulnerabilities of computerized systems confirming all our worrysomes. The malware infection has occurred to the Gwinnett Medical Center last Wednesday, shorting out the main information system with obvious repercussions on the work of departments of the hospital soon rendered inoperative. Fortunately the ospital was out of control just for one day but it still isn’t in the clear, since the source of the outbreak isn’t known and the malware hasn’t been identified.

The problem was caused by a worm infection, which would have spread rapidly across the internal network and the problem may has been caused by something as simple as a USB drive brought into the facility by an employee.
The case discussed is not the first!

But as hackers continually penetrate computer systems in critical infrastructure like power facilities, water plants and government contractors, hospitals may also be vulnerable points of attack.

The actual situation include hospitals in those structure that are considered critical in each national cyber defence plan, however there is to much to do. Not prepared and vulnerables structures, personnel not trained are a common denominator for the healthcare sector. Hospitals are considered a soft target where a cyber attack can cause a lot of damage easily. The attack can be moved is silent way with devasting consequeces.

The message is clear, let’s hurry before it’s too late, before to mourn human lives, the victims of our negligence.

Pierluigi Paganini


facebook linkedin twitter

attack Botnets computer Critical infrastructures Cyber Crime cyber weapon duqu Hackers Hacking Hospital Incident malware Sabotage systems Trojan

you might also like

Pierluigi Paganini August 07, 2025
CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector
Read more
Pierluigi Paganini August 07, 2025
Over 100 Dell models exposed to critical ControlVault3 firmware bugs
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

    APT / August 07, 2025

    Over 100 Dell models exposed to critical ControlVault3 firmware bugs

    Hacking / August 07, 2025

    How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

    Security / August 07, 2025

    WhatsApp cracks down on 6.8M scam accounts in global takedown

    Cyber Crime / August 06, 2025

    Trend Micro fixes two actively exploited Apex One RCE flaws

    Hacking / August 06, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT