Hacking group targets healthcare industry worldwide

Cybersecurity firm Symantec announced this week that a hacking group called Orangeworm appears to have been targeting the healthcare industry in the United States, Europe, and Asia. Of all the companies hacked by the group, 39% have been related to health somehow, the company reports.

Orangeworm has been observed installing a custom backdoor called Trojan.Kwampirs.  This malware was found on machines which had software installed for the use and control of high-tech imaging devices such as X-Ray and MRI machines.

First identified in January 2015, Orangeworm has also conducted targeted attacks against organizations in related industries as part of a larger supply-chain attack in order to reach their intended victims, Symantec researchers report. Based on the list of known victims, Orangeworm does not select its targets randomly or conduct opportunistic hacking. Rather, the group appears to choose its targets carefully and deliberately, conducting a good amount of planning before launching an attack.

The Symantec report states: “We believe that these industries have also been targeted as part of a larger supply-chain attack in order for Orangeworm to get access to their intended victims related to healthcare. Orangeworm’s secondary targets include Manufacturing, Information Technology, Agriculture, and Logistics.”

Kwampirs uses a fairly aggressive means to propagate itself once inside a victim’s network by copying itself over network shares. While this method is considered somewhat old, it may still be viable for environments that run older operating systems such as Windows XP. This method has likely proved effective within the healthcare industry, which may run legacy systems on older platforms designed for the medical community. Researchers went on to say that older systems like Windows XP are much more likely to be prevalent within this industry.

With news of this latest hack, don’t put off checking your specific anti-virus vendor’s protections and updates to make sure they are protecting you from this specific threat.  Do not assume they are up-to-date.

Contact the experts at PrivaPlan at info@privaplan.com for more information about this report and to let us know how we can be of help to you.

Related Posts

Access PrivaPlan Toolkit

Access CMA-PrivaPlan Toolkit

Sign up for updates

Sign up. Learn about Compliance

Subscribe now for up-to-date information about privacy & security compliance! You’ll receive emails regarding news about compliance & alerts for new blog posts.