Press America Inc Faces Lawsuit Over HIPAA Breach
Feb01

Press America Inc Faces Lawsuit Over HIPAA Breach

Press America, Inc, a mail service used by a pharmacy benefit manager CVS Pharmacy, is being sued for the occurrence of an accidental disclosure of 41 people’ protected health information. As a subcontractor to supply a mail-order pharmacy service for the health planCVS Pharmacy is a business associate of health plan CVS Pharmacy and, as such, both bodies must adhere with HIPAA Rules. CVS Pharmacy completed a business associate...

Read More
Medical Data from Closed Pennsylvania Obs/Gyn Clinic Found at Allentown Public Recycling Center
Dec08

Medical Data from Closed Pennsylvania Obs/Gyn Clinic Found at Allentown Public Recycling Center

Private Medical Data has been found at a recycling center in Allentown, Pennsylvania. Paper files containing names, Social Security numbers, and medical histories, including details of cancer diagnoses and sexually transmitted diseases were located that the center by a city worker. The medical files appear to have belonged to Women’s Health Consultants, an obstetrics and gynecology firm, that is no longer in business, but that had...

Read More
12,172 Individuals Impacted by ShopRite Data Breach
Dec07

12,172 Individuals Impacted by ShopRite Data Breach

Pharmacy customers of ShopRite Supermarkets, Inc. have been impacted by a security violation caused by the improper disposal of a device used to record the signatures of customers. The device was used at the ShopRite, Kingston, NY location during the time period from 2005-2015 and saved personal and medical details. Customers who went to the pharmacy to have prescriptions filled between 2005 and 2015 have potentially been affected by...

Read More
UAB Medicine Encounters PHI Breach Due to Missing Laptops
Dec06

UAB Medicine Encounters PHI Breach Due to Missing Laptops

The UAB Medicine Viral Hepatitis Clinic located in Birmingham, AL has encountered a violation of patients’ protected health information (PHI). UAB Medicine employs the use of flash drives to shift data from its Fibroscan machine to a computer device. Two flash drives were discovered to be missing on October 25, 2017. The portable storage devices stored a restricted amount of PHI of 652 patients. Information captured on the devices...

Read More
Extortion Attack on Private Information of Sports Medicine Clients
Dec06

Extortion Attack on Private Information of Sports Medicine Clients

7,000 patients of Sports Medicine & Rehabilitation Therapy (SMART) have been alerted of a possible breach of the private personal information. It is believed the breach, which involved an extortion attempt, may have impacted anyone whose information was taken during a visit to a SMART center before the last day of 2016. The extortion attempt occurred in September 2017 when hackers gained access to SMART systems, allegedly stole...

Read More
PHI of 932 Texas Children’s Health Plan Members’ in Email Breach
Nov09

PHI of 932 Texas Children’s Health Plan Members’ in Email Breach

An email to the personal email account of a former employee of the Texas Children’s Health Plan has been discovered to have exposed the protected health information (PHI) of 932 members. The incident was identified on September 21, 2017, although the former member of staff sent the data via email late last year in November and December 2016. The emails were seen during a routine audit process. Texas Children’s Health Plan reacted to...

Read More

Iliana Peters Now Acting Deputy at the OCR

OCR’s Iliana Peters has stepped in to replace Deven McGraw, Deputy Director for Health Information Privacy at the Department of Health and Human Services’ Office for Civil Rights (OCR), in an interim role. Peters will serve as Acting Deputy Director until a suitable replacement for McGraw can be identified. Peters has departed her role as senior advisor for HIPAA Compliance and Enforcement at OCR. There are no plans in place to bring...

Read More
Survey finds US and UK Companies Slow to Prepare for GDPR Compliance
Nov05

Survey finds US and UK Companies Slow to Prepare for GDPR Compliance

A recent survey, conducted by Dimensional Research, has revealed that the levels of unpreparedness for both US and UK firms for compliance with the EU’s General Data Protection Regulation (GDPR) are high. Results seen in both the UK and US studies confirm the clients’ fears about the difficulty of privacy management. It also backs up the claims that technology investment will play a massive role in complying with GDPR and...

Read More
Danger of Using USB Drives to Store PHI Highlighted of Data Breach
Oct29

Danger of Using USB Drives to Store PHI Highlighted of Data Breach

Two USB drives holding the protected health information of almost 2,000 veterans at the Man-Grandstaff VA Medical Center in Spokane, WA have been discovered to be stolen. The two devices were storing data from a separate, external, non-networked server that was being switched off. One of the devices was the master drive used to transfer the medical center’s Anesthesia Record Keeper database to its virtual archive server. In a...

Read More
HIPAA Alliance Marketplace Matches Healthcare Organizations With HIPAA-Compliant Business
Oct25

HIPAA Alliance Marketplace Matches Healthcare Organizations With HIPAA-Compliant Business

This week has seen the launch of a new platform that streamlines the process of searching for HIPAA-compliant business associates. The HIPAA Alliance Marketplace has been developed to match HIPAA covered entities with trusted vendors that have been independently verified as HIPAA-compliant. Healthcare organizations are required to comply with Health Insurance Portability and Accountability Act Rules, and so too must their business...

Read More
HIPAA Compliant Business Associates Easier to Locate with New Tool
Oct23

HIPAA Compliant Business Associates Easier to Locate with New Tool

The challenge of finding HIPAA compliant business associates has been addressed with the introduction of a new tool to simplify this task. Healthcare organizations are only allowed to use business associates that comply with HIPAA Rules and sign a business associate agreement. Finding HIPAA compliant business associates is time consuming, although locating vendors willing to follow HIPAA Rules is only part of the steps that must be...

Read More
FinSpy Malware Installed Using Adobe Flash Player Uopdate Flaw
Oct23

FinSpy Malware Installed Using Adobe Flash Player Uopdate Flaw

Last week software giant Adobe issued a new patch for Flash Player to address an actively exploited weakness (CVE-2017-11292) that is being targeted by the hacking group Black Oasis to install FinSpy malware. Finspy is strictly not defined as malware, it is a legitimate software program developed by the German software company Gamma International. However, it can be used for many purposes including many malware-like functions. FinSpy...

Read More
New MyEtherWallet Phishing Attacks Witnessed
Oct22

New MyEtherWallet Phishing Attacks Witnessed

A new wave of MyEtherWallet phishing attacks has been witnessed which use a convincing domain and MyEtherWallet branding to trick MyEtherWallet users into sharing their credentials and providing criminals with access to their MyEtherWallet accounts. In the initial hours of the phishing campaign, the criminals responsible for the scam had obtained more than $15,000 of MyEtherWallet funds, including $13,000 from one MyEtherWallet user....

Read More
1300 People Impacted by RiverMend Health Breach
Oct22

1300 People Impacted by RiverMend Health Breach

An unauthorized person has been found to have obtained access to the email credentials of one the  employees at RiverMend Health, a provider of specialty behavioral health services including services for drug and alcohol addiction. The unauthorized access was discovered by the Augusta, GA-based group on August 10, 2017, when it was noticed that suspicious emails were being sent from the employee’s account. The suspicious email...

Read More
Attackers Decrypting WiFi Traffic Thanks to KRACK WiFi Security Weakness
Oct21

Attackers Decrypting WiFi Traffic Thanks to KRACK WiFi Security Weakness

A WiFi security flaw in WPA2 called KRACK has been discovered in an investigation at the University of Leuven in Belgium. The KRACK WiFi security weakness affects all modern WiFi networks and could be used for ill means with relative ease. While there have been no known attacks targeting this weakness, it is one of the most serious WiFi flaws discovered, with the potential to be used for obtaining the data millions of users. If the...

Read More
Improperly Configured Cloud Services in Over Half of Businesses
Oct20

Improperly Configured Cloud Services in Over Half of Businesses

The healthcare sector has made great waves recently in embracing cloud based technology. Most healthcare groups now implementing secure cloud storage services to host web applications or store data which contains electronic protected health information (ePHI) pertaining to subscribers. However, as the proliferation of secure cloud storage systems continues at pace, it does not mean data breaches will not be experienced, and neither...

Read More
Almost 500K Records Exposed in September Healthcare Data Breaches
Oct18

Almost 500K Records Exposed in September Healthcare Data Breaches

The Breach Barometer report from for September has been released and shows there was a significant increase in healthcare data breaches during that month. The report collates healthcare data violations reported to the Department of Health and Human Services’ Office for Civil Rights (OCR) and security breaches recorded by databreaches.net. The latter of which have yet to appear on the OCR ‘Wall of Shame.’ Overall,...

Read More
Advisory Issues by Department of Education Regarding Hacking and Extortion Threats
Oct17

Advisory Issues by Department of Education Regarding Hacking and Extortion Threats

TheDarkOverlord hacking group has, in recent time, been targeting K12 schools; obtaining access to networks, stealing data and trying to extort money. As a reaction to the hacking and extortion threats, the U.S. Department of Education has released an advisory to K12 schools and has issued guidance to help educational institutions mitigate danger and safeguard their networks from attack. The attacks on educational institute...

Read More
HIPAA Compliance and Skype: What You Need to Know
Oct16

HIPAA Compliance and Skype: What You Need to Know

Skype and other text messaging platforms are a useful way of broadcasting information, but there are some questions to be answered in relation to HIPAA compliance of the service. There has recently been a lot of discussions and debate regarding this. There are security measure implemented by Skype to prevent unauthorized access of information transmitted via the platform and messages are encrypted. However it might still be unclear if...

Read More
U.S. Organizations Targeted by FormBook Malware Campaign
Oct16

U.S. Organizations Targeted by FormBook Malware Campaign

Specific industry sectors in the United States and South Korea have been the main targets in the Formbook malware attacks. However there has been some worry that the malware will be used in more widespread cyberattacks around the world. So far, the Aerospace industry, defense contractors, and the manufacturing sector have been widely targeted; however, attacks have not been limited to these sectors. The financial services, energy and...

Read More
PHI Exposure May Have Happened Following Theft of Unencrypted Laptop
Oct15

PHI Exposure May Have Happened Following Theft of Unencrypted Laptop

Exposure of patients’ protected health information may have occurred after an unencrypted laptop computer was stolen from a car belonging to an employee of Bassett Family Practice in Virginia. The theft of the laptop is thought to have occurred during the weekend of 12/13 August. Patients were warned of the exposure of their private date on October 13, 2017. The delay in issuing notifications was justified as the time needed to...

Read More
Flash Player Flaw Used to Deliver FinSpy Malware Exploited by Adobe Patches
Oct15

Flash Player Flaw Used to Deliver FinSpy Malware Exploited by Adobe Patches

Adobe has issued a new update for Flash Player to tackle an actively exploited flaw (CVE-2017-11292) that is being used by the hacking group Black Oasis to send out FinSpy malware. Finspy is not malware as you would expect, it is a legitimate software program developed by the German software company Gamma International. However, its capabilities include a variety of malware-like functions. As the name implies, FinSpy is surveillance...

Read More
Zero Day Vulnerabilities Exploited by Microsoft Patches
Oct14

Zero Day Vulnerabilities Exploited by Microsoft Patches

This Patch Tuesday has seen Microsoft release several updates for serious vulnerabilities, some of which are being constantly exploited in the open. Microsoft is pleading with companies to apply the patches now to keep their systems safe. Some of the vulnerabilities are simple to exploit, requiring little experience or knowledge Overall, 62 vulnerabilities have been patched, including 33 that can lead to remote code execution. Out of...

Read More
Public Whois Registry Likely to be Affected by GDPR
Oct12

Public Whois Registry Likely to be Affected by GDPR

The EU GDPR Law will have a significant impact on the businesses that process and manage EU citizens’ data. WHOIS is a member of Domain Name sector that is likely to be affected by the new data protection legislation. The introduction of these new laws will be a delicate process for companies as they work to comply with the guidelines from the European Union and the ICANN. WHOIS supplies a database where internet users to find domain...

Read More
Proposed Rule for Certification of Compliance for Health Plans Withdrawn by HHS
Oct11

Proposed Rule for Certification of Compliance for Health Plans Withdrawn by HHS

The Department of Health and Human Services, at the start of 2014, completed a proposal for introducing a new rule to bring in an official certification of compliance for health plans. The proposed rule would have obligated all controlling health plans (CHPs) to complete a variety of documentation to HHS to confirm compliance with electronic transaction standards established by the HHS under HIPAA Rules. The main objective pf proposed...

Read More
GDPR to be incorporated in new UK Data Protection Bill
Oct10

GDPR to be incorporated in new UK Data Protection Bill

The British Government has completeded the Data Protection Bill that aims to align the country’s data protection regime with the soon to be introduced European Union General Data Protection Regulation (GDPR). This will allow UK citizens to have more control over their private personal information and impose harsher penalties on the companies that breach the laws. The Bill is part of the multi-billion National Cyber Security Strategy....

Read More
DDoS Attacks Follow Increase in Flusihoc Botnet Activity Increases
Oct09

DDoS Attacks Follow Increase in Flusihoc Botnet Activity Increases

DDoS attacks are being implemented using the Flusihoc Botnet, some as recording speeds as quick as 45 Gbps according to investigators at Arbor networks. The Flusihoc botnet has been in action for a minimum two years, although activity has grown over the last few months, with more than 900 attacks initiated using the Flusihoc botnet over the past four months. The botnet has in excess of 48 active command and control servers, although...

Read More
Matrix Ransomware Campaign Detected by Security Researcher
Oct09

Matrix Ransomware Campaign Detected by Security Researcher

A new Matrix ransomware malvertising campaign has been detected by security researcher Jérôme Segura. The campaign employs malicious adverts to send users to a site hosting the Rig exploit kit. Flash and IE weaknesses are exploited to install the malicious file-encrypting payload. The Matrix ransomware is not a threat that hasn’t been seen before, having first been experienced in late 2016. The ransomware variant was used in...

Read More
Redlock Report: Cloud Storage Services are Misconfigured in over Half of Businesses
Oct09

Redlock Report: Cloud Storage Services are Misconfigured in over Half of Businesses

According to a recent study by cloud threat defense firm RedLock, more than half of businesses have made mistakes that have exposed sensitive data in the cloud. The report reveals that as muc as 53% of organizations are not following established security best practices, such as using multi-factor authentication for all privileged account holders. Worse again, many businesses are notmonitor their cloud environments constantly which...

Read More
PHI of 10,500 Patients Found Exposed in Basement Owned by Psychiatrist
Oct08

PHI of 10,500 Patients Found Exposed in Basement Owned by Psychiatrist

The medical details of over 10,000 patients of an Illinois-based psychiatrist – Dr. Riaz Baber, M.D. – have been found in the accessible basement of an Aurora property by the woman who was renting the accommodation from the psychiatrist. It is believed that the files had been left in the basement for a minimum of four years. Barbara Jarvis-Neavins, the family renting the accommodation, is believed to have been given a key to the...

Read More
Hackers Able to Gain Access Using New Rowhammer Exploit
Oct08

Hackers Able to Gain Access Using New Rowhammer Exploit

The Rowhammer exploit was first identified three years ago and was seen enabling hackers to access devices by using DRAM memory cells. Rowhammer attacks uses the close proximity of memory cells, making them leak their charge and change the make up of neighboring memory cells. The cyber attack involves sending constant read-write operations using carefully crafted memory access patterns to constantly activate the same memory rows,...

Read More

Yahoo Data Breach Saw 3 Billion Accounts Breached in 2013

After it was first discovered the 2013 Yahoo data violation was quickly found to have affected many of the company’s customers and in December 2016 it was announced that 1 billion accounts had been compromised. In September 2016, prior to that announcement, a separate breach was discovered that affected approximately half a billion email accounts. Now Verizon, which completed the purchase of Yahoo in Summer 2017, has found the 2013...

Read More
51,000 Plan Members Affect by Network Health Phishing Attack
Oct06

51,000 Plan Members Affect by Network Health Phishing Attack

Network Health, a Wisconsin-based insurer, has contact 51,232 of its plan members to advise them that some of their protected health information (PHI) hmay have been obtained by unauthorized persons. Last August,  a number of Network Health staff members received sophisticated phishing emails. Two of those members of staff replied to the scam correspondence and handed over their login credentials to the cyber attackers, who used those...

Read More
U.S. Organizations Targeted by FormBook Malware Attacks
Oct05

U.S. Organizations Targeted by FormBook Malware Attacks

The majority of Formbook malware cyber attacks have focused on specific industry sectors in the United States and South Korea, but there is some worry that the malware will be employed in more attacks worldwide. So far, the Aerospace industry, defense contractors and the manufacturing sector have been mainly targeted; however, attacks have not been restrcited to these sectors. The financial services, energy and utility companies,...

Read More
Multi-Function Printers Flaw Risks Password Security
Oct05

Multi-Function Printers Flaw Risks Password Security

Ruhr University Researchers have uncovered significant security flaws in multi-function printers which may be exploited remotely by hackers to shut down the printers, or more worryingly, modify documents or steal user passwords. Hackers might aslo exploit the flaws in order to physically damage printers. The security flaws have already been found in HP, Lexmark and Dell multi-function printers. Twenty such printers are now recognised...

Read More
Should Identity Theft Protection Services Be Offered to Data Breach Victims Under HIPAA?
Oct04

Should Identity Theft Protection Services Be Offered to Data Breach Victims Under HIPAA?

The HIPAA Breach Notification Rule stated that covered bodies must advise people once their ePHI has been compromised. It is less clear if it is a requirement that credit monitoring and identity theft protection services should be be offered to those affected. HIPAA does not stata outright whether credit monitoring and identity theft protection services should be given to people affected by a data violation. The decision whether or...

Read More
GDPR Leads Lloyds to Alter Marketing Campaigns
Oct03

GDPR Leads Lloyds to Alter Marketing Campaigns

Lloyds Banking Group has taken steps to introduce new marketing campaigns due to the coming introduction of the European Union’s GDPR legislation, a new set of guidelines on data privacy and security. Lloyds is moving from product-focused campaigns to the content-focused strategies in line with the GDPR legislation. Lloyds is one of the groups that has spent a considerable amount of money preparing for the new regulations....

Read More
OCR Issue Clarification on HIPAA Disclosure Rules
Oct02

OCR Issue Clarification on HIPAA Disclosure Rules

The Department of Health and Human Services’ Office for Civil Rights OCR, has, following the recent attacks in Las Vegas, moved to issue a clarification on HIPAA Rules regarding disclosures to family, friends and other people. In the aftermath of Hurricane Irma and Hurricane Maria, OCR issued a partial waiver of certain provisions of the HIPAA Privacy Rule in the regions where both hurricanes occurred. Such a waiver is often, but not...

Read More
Patch Issued for Actively Exploited Drupal Vulnerability
Sep20

Patch Issued for Actively Exploited Drupal Vulnerability

A patch for a vulnerability in Drupal (CVE-2017-6922) that has been activiley exploited for some months was released in June 2017. The flaw affects Drupal v 7.56 and 8.3.4. Drupal was aware of the flaw, an access bypass vulnerability, since October 2017. It is possible for the flaw to be exploited on misconfigured websites, permitting unidentified users to upload files which are then stored in a public file system. This means that...

Read More
Cybercriminals with Nation-State Support Responsible for Yahoo Attack
Sep20

Cybercriminals with Nation-State Support Responsible for Yahoo Attack

InfoArmor has claimed that data from the Yahoo breach of over one billion user accounts has already been purchased on the black market by multiple third parties on numerous occasions. Although Yahoo argues that a nation-state sponsored group was responsible for the hack, research carried out by InfoArmor’s indicates otherwise and a number security experts concur. Rather a nation-state sponsored group of hackers, InfoArmor suggest that...

Read More
Global Reports of WannaCry Ransomware Attacks
Sep18

Global Reports of WannaCry Ransomware Attacks

There has been a huge increase in WannaCry ransomware attacks around the globe, including a new campaign being launched on Friday the 13th of May 2017. Unlike previous WannaCry ransomware attacks, the present campaign takes advantage of a vulnerability that is found in Server Message Block 1.0 (SMBv1). Zero day exploits are often employed by cybercriminals, however this example would appear to have been originally developed by the...

Read More
US-Certs: SSL Inspection Tools Might Make Cybersecurity Weaker
Sep18

US-Certs: SSL Inspection Tools Might Make Cybersecurity Weaker

A recent warning issued by US-CERT has advised that SSL inspection tools may actually do the opposite of what they are intended for; i.e. they might serve to weaken the cyber defenses of healthcare organizations’ rather than strengthen them – by making their computer systems more at risk of man-in-the-middle attacks. It should be noted that what US-CERT has alleged does not necessarily mean that the SSL inspection tools...

Read More
Rapid Account Verification Being Offered by New Twitter Credit Card Phishing Scam
Sep18

Rapid Account Verification Being Offered by New Twitter Credit Card Phishing Scam

Proofpoint, the cybersecurity firm, has confirmed that is has discovered a new Twitter credit card phishing scam. Users of the social media platform Twitter are being offered verified account status via native Twitter ads; the catch being that signing up requires the provision of credit card details, which are then communicated to the attackers. Obtaining verified account status is normally a complicated and lengthy process. Public...

Read More
Windows Dialog Box Mimicked By Newly Discovered Trojan Downloader
Sep18

Windows Dialog Box Mimicked By Newly Discovered Trojan Downloader

Dr. Web, a Russian antivirus firm has recently discovered a new Trojan downloader. The malware uses a popup Windows ‘Save As’ dialog box to install malicious payloads, which have thus far all been adware. The malware, dubbed “Trojan.Ticno.1537”, installs variety of adware together with a malicious extension for Google Chrome. According to Dr. Web, the Ticno Trojan is downloaded via a separate malware and is then packaged in a single...

Read More
Wi-Fi Routers Infected by Switcher Trojan through Android Mobiles
Sep18

Wi-Fi Routers Infected by Switcher Trojan through Android Mobiles

Kaspersky Lab has identified a highly dangerous new Trojan which has been used to attack Wi-Fi routers through Android devices. The new form of malware, which has been dubbed the Switcher Trojan, is presently being employed to attack routers based in China. Nonetheless, Kaspersky Lab researchers have warned that the new malware could indicate a new and dangerous trend that could well become a world-wide concern. Ordinarily, attackers...

Read More
Erie County Medical Center Patients Put at Risk by Apparent Ransomware Attack
Sep18

Erie County Medical Center Patients Put at Risk by Apparent Ransomware Attack

Ashland Women’s Health confirmed in April 2017 that it had been the victim of a significant ransomware attack.19,272 Ashland patients were affected. This followed confirmation the previous week that ABCD pediatrics ransomware attack had put 55,447 patients at risk. On Sunday 9th April, a third healthcare provider became aware that it had received a ‘virus’ via email which had made its way onto the organisation’s network. In New...

Read More
SMB File Sharing Protocol Flaw Made Public Before Release of Patch
Sep17

SMB File Sharing Protocol Flaw Made Public Before Release of Patch

Details of a SMB file sharing protocol flaw in Windows have been made public some 12 days prior to the release of a patch by Microsoft. Laurent Gaffié, the researcher who published details of the flaw, has claimed that Microsoft had been aware of the issue for around 3 months beforehand yet failed to act to patch the vulnerability. An attacker who exploits the SMB file sharing protocol flaw would be able to crash Windows 10 and 8.1...

Read More

San Francisco Transport System Ransomware Attack Reported

A ransomware attack on the San Francisco Transport System in November 2016 resulted in the encryption of computers used by the city’s light rail system. The criminals responsible for the attack demanded ransom of 100 Bitcoin (approxiately $70,000) for the key to unlock the encryption. The San Francisco Municipal Transportation Agency (SFMTA) stated that although the attack put its computer systems out of action, transport remained...

Read More

Investigation into Ransomware Infection Affecting 19,000 People

One of Highmark Blue Cross Blue Shield’s (Delaware) subcontractors has fallen victim to a ransomware infection and cyberattack that may have put private information relating to almost ninetenn thousand beneficiaries of employer-paid health plans at risk. The attack happened on the 5th of August 2016 at Highmark BCBS subcontractor Summit Reinsurance Services, however affected individuals were only notified of the incident in...

Read More
Diagnostics Website Flaw at ‘True Health’ Reveals Private Patient Information
Aug18

Diagnostics Website Flaw at ‘True Health’ Reveals Private Patient Information

Patients of the True Health Group have had their health reports exposed online due to a law in the True Health Diagnostics website. Moreover, the reports appear to have been viewable by other patients for months if not years. Based in Frisco, Texas, True Health Diagnostics is a company that offers a broad range of testing services for genetic and other diseases. It operates an online portal that patients can access in order to consult...

Read More