US hospitals and healthcare facilities struggling to maintain normal operations during the COVID-19 emergency, were warned this week by the federal Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI) and the Department of Health and Human Services (HHS) of a “targeted and imminent cybercrime threat.” Specifically, CISA, FBI and HHS have credible information that malicious cyber actors are targeting hospitals and other health care providers with Trickbot malware, leading to ransomware attacks, data theft, and, significantly, the disruption of healthcare services during the pandemic.
Trickbot malware has been around since at least 2016 and cybercriminals have been working to develop new functionality increasing the ease, speed and profitability of attacks. The criminal enterprise behind Trickbot has created tools to help them evade network defense mechanisms and to blend in with legitimate system traffic so they can move throughout a provider’s IT infrastructure undetected.
A joint CICA, FBI and HHS Alert, Ransomware Activity Targeting the Healthcare and Public Health Sector, (the “Alert”) provides extensive detail regarding the mechanism and indicators of Trickbot malware. Trickbot is used to deploy Ryuk ransomware, which has reportedly forced multiple hospitals across the country off-line in a coordinated attack.
The Alert includes best practices for health care providers to minimize risk and mitigate harm, including the following familiar, yet critically important practices:
Administrative Best Practices
- Implement business continuity plans – or plans to continue essential functions through emergencies such as cyberattacks and to minimize service disruptions
Network Best Practices
- Patch system, software and firmware as new patches are released
- Require regular password changing
- Implement multi-factor authentication
Ransomware Best Practices
- Don’t pay ransom (it doesn’t guarantee that files will be recovered and it emboldens cyber criminals)
- Regularly back up data and secure backup copies offline
- Engage with CISA, FBI and HHS for information sharing, best practices and other resources
- Retain 3 copies of all critical data on at least two different types of media with at least one stored offline.
- Retain backup hardware to rebuild systems, if necessary
End User Best Practices
- Maintain formal and informal training and security awareness programs, covering ransomware and phishing scams
- Make sure that employees know who to contact to report suspicious activity