Breach of healthcare debt collection firm exposes 1.9M patients – cyber experts weigh in

    2288

    More than 1.9 million patients have been exposed to a ransomware infection after a Colorado-based debt collection firm serving hundreds of medical facilities and hospitals across America was breached.

    The Professional Finance Company, PFC, suffered a ransomware attack on February 26 and on July 1 confirmed that over 650 healthcare providers were affected by the breach. According to a notice from PFC, attackers stole confidential patient information including patient names, addresses, and outstanding account balances. PFC said in some cases, SSNs and information about health insurance and medical treatment were also stolen.

    This attack was a result of an unauthorized third party using sophisticated ransomware to gain access and disable internal computer systems to retrieve personal data. PFC said that after the attack, they immediately hired third-party forensic specialists and alerted federal law enforcement. PFC also said they found no substantial evidence that personal information has been misused, however, it is possible the data can be used to launch future attacks.

    As ransomware attacks continue to affect all types of organizations, it’s important to learn from the mistakes of other companies and protect your information. We’ve spoken with several cybersecurity experts to hear their insights about this breach.

    Arti Raman (She/Her), CEO and Founder, Titaniam

    “In the recent data breach confirmed by PFC, an unauthorized third party accessed and disabled some of PFC’s computer systems. While the company’s statement said that none of the personal data had been misused, the data is now in the hands of cybercriminals. As hacks and extortion become more and more frequent, to truly minimize the risk of potential extortion and lost clear text data, a data security platform, specifically data-in-use encryption, also referred to as encryption-in-use, is the only option for complete protection and peace of mind.

    In the last 18 months, companies have been misled into believing that investing in backup and recovery solutions is the answer to their ransomware woes. However, the State of Data Exfiltration & Extortion Report 2022 recently revealed that traditionally used tools are ineffective 60% of the time.

    If companies want to stand up to data-related extortion then data-in-use encryption is the technology of choice for unmatched immunity. Should adversaries gain access to data, by any means, data-in-use encryption keeps the sensitive data encrypted and protected even when it is being actively utilized. This helps neutralize all possible data-related leverage and limits the need for breach disclosure.”

    Neil Jones, director of cybersecurity evangelism, Egnyte

    “The recent data breach at Professional Finance Company is especially concerning because healthcare debt collection information inherently includes PII (Personally Identifiable Information) and PHI (Protected Health Information), which are treasure troves for cyber-attackers.

    In this case, the breach involved the sensitive data of nearly 2 million patients. Although there’s no current evidence that the breached information has been used maliciously, it is not uncommon for attackers to wait for just the right moment to post their breached data to the Web.

    There are several key lessons that can be learned from this incident: 1) Organizations need to combine ransomware detection solutions with effective data recovery programs. 2) Companies need to have incident response plans in place, to effectively notify their customers, employees, business partners and the news media of potential breaches. 3) During these dynamic times, routine technological audits need to occur on a more frequent basis than they did before, to prevent vulnerabilities from being exploited.”

    Aaron Sandeen, CEO and co-founder, Cyber Security Works 

    “As ransomware attacks continue to devastate the healthcare industry, leaders must increase their cybersecurity visibility of known and unknown assets. To fully safeguard their firm from potential assaults, cybersecurity professionals must enhance the frequency with which they validate and seek early warning capabilities.

    Patching the vulnerabilities that threat groups and attackers exploit is one of the actions that businesses can take to avoid disaster. Especially as new ransomware organizations develop, knowing how exposed you are to ransomware attacks and monitoring your security posture through ongoing vulnerability management and proactive penetration testing is vital to bolster your defenses. Security and executives in the healthcare field must invest in the protection of their assets.”

    Tim Prendergrast, CEO, strongDM

    “The PFC incident highlights how crucial strong access management and infrastructure are to maintain strong security. Right now, attackers are increasingly looking for improperly stored or secured valid credentials because they’re essentially VIP passes into databases, and servers – everything companies don’t want to be leaked publicly. Once attackers get those valid credentials, they can wreak havoc internally. As a result, we’re now seeing maybe one of the worst healthcare security breaches in 2022 that’s impacting over one million people and whole hospitals, and it’s because of a third-party access breach. Rather than point fingers, because in truth this could have happened to anyone, it is important for CISOs to re-evaluate the visibility and control of access across both applications and infrastructure.”

    Ad

    No posts to display