BreachExchange mailing list archives
Cyber Attacks Invite Follow-up Fraud Threats to Personal Data
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Thu, 10 Dec 2015 18:07:54 -0700
http://www.information-management.com/news/security/cyber-attacks-invite-follow-up-fraud-threats-to-personal-data-10027869-1.html As it continues to investigate a cyber attack and give initial public notification via the media, MaineGeneral is experiencing a recent phenomenon of such attacks—dealing with fraudsters after the attack has been acknowledged. The delivery system is warning patients, employees and donors who may be affected of organizations offering identity protection services for a fee. Like many providers that have been breached, MaineGeneral will be offering free credit monitoring services when it is ready to formally send breach notification to those thought to be affected. “Be aware of paid services and never give your personal information to people you don’t know,” MaineGeneral advises. For now, MaineGeneral continues to work with the FBI and breach remediation firm AllClearID to better understand the extent of the attack, and likely also has been in contact with the HHS Office for Civil Rights, which enforces the HIPAA privacy, security and breach notification rules but also offers guidance in recovering from the breach. Gerry Hinkley, a HIPAA attorney at the Pillsbury Winthrop Shaw Pittman law firm, notes that if an organization does not know how large the breach is, OCR suggests it provide an initial estimate that can always be updated later. “This appears likely to have been the result of an employee victimized by a phishing email,” Hinkley says. “Occurrence of this type of attack is on the dramatic rise and we have advised companies to undertake specific training regarding phishing and to test their employees’ gullibility by staging fake phishing exercises to see how many employees are likely to fall prey, then better target training.” Under a phishing scheme, an employee is fooled by a person believed to be trusted to reveal credentials such as username and password to access an information system. HIPAA attorney Daniel Gottlieb at McDermott Will & Emery notes that the HHS Office of Inspector General warns healthcare stakeholders that cyber criminals can attack just about any connected information system or medical device to get inside a network. This can include not just an electronic health records system but dialysis machines, radiology systems, medication dispensing systems, laptops and smartphones, among other devices. But the HHS OIG itself may be behind the times and needing to catch up to the cyber threat. In its 2016 work plan, the agency indicates it will examine if the Food and Drug Administration’s oversight of hospitals’ networked devices is sufficient to protect electronic protected health information. “Government regulation of this area has been slow,” notes Veleka Peeples-Dyer of McDermott Will & Emery. “The FDA guidelines finalized last October only recommended that medical device manufacturers consider cybersecurity risks in their design and development phases—they were not required to do anything. Moreover, as technologies evolve and the types of risk proliferate, it is simply not possible for the FDA to anticipate where the law will need to go in the future.” Natalie Lehr, co-founder and director of analytics at cybersecurity firm TSC Advantage, says that just because a breach may not expose a lot of protected health information does not mean there is little risk. “While the attack itself does not empower a host of credit abuses, it creates an opening if a patient or prospective donor is not educated on how to protect themselves. Experience shows us that these breaches lead to sophisticated follow-on attacks. Information from the breach might be used for targeted phishing with the intent to gather more sensitive user information.”
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Cyber Attacks Invite Follow-up Fraud Threats to Personal Data Audrey McNeil (Dec 11)