Change Healthcare, a provider of revenue and payment cycle management for healthcare, suffered a cyberattack on Feb. 21. The party behind this attack has been identified as the ALPHV Blackcat ransomware group, according to The HIPAA Journal.
While this attack did not specifically target hospitals and other healthcare facilities, Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Department of Health and Human Services (HHS) have sounded the alarm that other healthcare organizations could soon find themselves caught in the crosshairs.
The organizations released a joint Cybersecurity Advisory (CSA) concerning the APLHV Blackcat ransomware.
The advisory urges critical infrastructure organizations to implement mitigation measures to reduce the risk of ALPHV Blackcat ransomware incidents. It also mentions a significant update to the ransomware in February 2023, known as the ALPHV Blackcat Ransomware 2.0 Sphynx, that enhances defense evasion capabilities and expands compatibility to encrypt Windows and Linux systems, including VMWare instances.
CISA recommends taking the following actions to mitigate against ransomware threats:
- Routinely take inventory of assets and data to identify authorized and unauthorized devices and software.
- Prioritize remediation of known exploited vulnerabilities.
- Enable and enforce multifactor authentication with strong passwords.
- Close unused ports and remove applications not deemed necessary for day-to-day operations.
Jeff Wardon, Jr. Is the assistant editor for the facilities market.