CISA: Healthcare Organizations Should Be Wary of Increased Ransomware Attacks by ALPHV Blackcat



healthcare-data-breachA joint cybersecurity advisory published last week discusses ransomware attack impacts on healthcare, along with ALPHV’s attack techniques, indicators of compromise (IoCs) and proper response actions.

ALPHV is a big enough problem that Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Department of Health and Human Services (HHS) all are getting together to put healthcare organizations on notice. According to their advisory, from just December of last year until the end of February, ALPHV ransomware has hit 70 organizations.

“The healthcare sector has been the most commonly victimized. This is likely in response to the ALPHV Blackcat administrator’s post encouraging its affiliates to target hospitals after operational action against the group and its infrastructure in early December 2023.”

Attacks by this group and their affiliates most often begin with social engineering via email, phone and text – posing as members of IT to employees of the victim org — to obtain employee credentials.

CISA does provide some recommended mitigation actions:

  • Lockdown which applications can run on endpoints
  • Implement FIDO-based MFA
  • Use network monitoring to identify abnormal activity
  • Use email scanning to eliminate malicious content before it reaches an employee
  • Endpoint protection
  • And, of course — my favorite — implement security awareness training to specifically cover social engineering and phishing attacks

KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.


Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransomware-simulator



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews