The recent SolarWinds cyber attack that affected the California Department of State Hospitals among its victims offered healthcare IT managers a sobering reminder that attackers will continue to exploit gaps in cybersecurity, and the threat is evolving.
U.S. and U.K. cybersecurity-focused agencies warn that the Russian hacker group behind the historic SolarWinds intrusion that affected nine federal agencies keeps adjusting their tactics based on government advisories, according to NextGov.
A joint advisory by the U.K.’s National Cyber Security Centre, the Cybersecurity and Infrastructure Security Agency, the National Security Agency and the FBI specifically said Russia’s Foreign Intelligence Service (SVR) changed its behavior after the release of a July 2020 advisory on the group.
The hackers gain initial access using a variety of malware described in the advisory. They then use tools like Sliver, in addition to credential theft, to retain their presence. And they use painstaking measures to hide their activity.
Preparing Healthcare Facilities for Severe Thunderstorms
University of South Carolina Opens New Brain Health Center
NLCS Strengthens Safety and Compliance with Comprehensive Electrical Program
Infrastructure Issues: Assisting Mobility-Challenged Visitors
Willis-Knighton Medical Center Upgrades Chilled Water Plant