The recent SolarWinds cyber attack that affected the California Department of State Hospitals among its victims offered healthcare IT managers a sobering reminder that attackers will continue to exploit gaps in cybersecurity, and the threat is evolving.
U.S. and U.K. cybersecurity-focused agencies warn that the Russian hacker group behind the historic SolarWinds intrusion that affected nine federal agencies keeps adjusting their tactics based on government advisories, according to NextGov.
A joint advisory by the U.K.’s National Cyber Security Centre, the Cybersecurity and Infrastructure Security Agency, the National Security Agency and the FBI specifically said Russia’s Foreign Intelligence Service (SVR) changed its behavior after the release of a July 2020 advisory on the group.
The hackers gain initial access using a variety of malware described in the advisory. They then use tools like Sliver, in addition to credential theft, to retain their presence. And they use painstaking measures to hide their activity.
Rethinking Strategies for Construction Success
From Touchless to Total Performance: Healthcare Restroom Design Redefined
New York State Approves $53M Construction Program at Niagara Falls Memorial Medical Center
How Health Systems Are Rethinking Facilities Amid Margin Pressure
Ground Broken on New Medical Office Building in Scottsdale, AZ