Change Healthcare, a provider of revenue and payment cycle management for healthcare, suffered a cyberattack on Feb. 21. The party behind this attack has been identified as the ALPHV Blackcat ransomware group, according to The HIPAA Journal.
While this attack did not specifically target hospitals and other healthcare facilities, Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Department of Health and Human Services (HHS) have sounded the alarm that other healthcare organizations could soon find themselves caught in the crosshairs.
The organizations released a joint Cybersecurity Advisory (CSA) concerning the APLHV Blackcat ransomware.
The advisory urges critical infrastructure organizations to implement mitigation measures to reduce the risk of ALPHV Blackcat ransomware incidents. It also mentions a significant update to the ransomware in February 2023, known as the ALPHV Blackcat Ransomware 2.0 Sphynx, that enhances defense evasion capabilities and expands compatibility to encrypt Windows and Linux systems, including VMWare instances.
CISA recommends taking the following actions to mitigate against ransomware threats:
- Routinely take inventory of assets and data to identify authorized and unauthorized devices and software.
- Prioritize remediation of known exploited vulnerabilities.
- Enable and enforce multifactor authentication with strong passwords.
- Close unused ports and remove applications not deemed necessary for day-to-day operations.
Jeff Wardon, Jr. Is the assistant editor for the facilities market.
Making the Energy Efficiency Case to the C-Suite
How to Avoid HAIs This Flu Season
Design Phase Set to Begin for Hospital Annex at SUNY Upstate Medical
Building Hospital Resilience in an Era of Extreme Weather
Ennoble Care Falls Victim to Data Breach