{"id":3840,"date":"2014-08-22T10:00:07","date_gmt":"2014-08-22T14:00:07","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3840"},"modified":"2020-02-26T18:58:57","modified_gmt":"2020-02-26T14:58:57","slug":"community_health_systems_breach","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/community_health_systems_breach\/3840\/","title":{"rendered":"What You Need to Know About the Community Health Systems Breach"},"content":{"rendered":"<p>A recent data breach at Community Health Systems illustrated the realistic, actual risk posed by connected medical devices when alleged Chinese hackers made off with the sensitive medical information of some 4.5 million people.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/08\/05111608\/healthcare-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5766\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/08\/05111608\/healthcare-1.png\" alt=\"healthcare\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><strong>Remember Heartbleed?<\/strong><\/p>\n<p>A <a href=\"https:\/\/www.kaspersky.com\/blog\/heartbleed-howto\/\" target=\"_blank\" rel=\"noopener nofollow\">vulnerability in OpenSSL<\/a>, dubbed Heartbleed, emerged earlier this year. It affected perhaps more than 60 percent of the Internet at one time, and could theoretically give an attacker the ability to steal a certain amount of information during a client-to-server connection. Well, this could be the first real-world, widely publicized instance of criminals or state actors exploiting the nearly Internet-wide vulnerability for personal gain. Specifically, the attackers developed an exploit that allowed them to <a href=\"https:\/\/threatpost.com\/heartbleed-exploit-linked-to-community-health-data-breach\/107844\" target=\"_blank\" rel=\"noopener nofollow\">use Heartbleed to steal login credentials to Community Health Systems<\/a>.<\/p>\n<p><strong>Who is Affected?<\/strong> <strong>How did this Happen?<\/strong><\/p>\n<p>In particular, <a href=\"https:\/\/threatpost.com\/apt-gang-branches-out-to-medical-espionage-in-community-health-breach\/107828\" target=\"_blank\" rel=\"noopener nofollow\">this breach exposed the non-medical and non-payment information of 4.5 million patients<\/a> who had been referred to or received services from physicians affiliated with Community Health Systems in the last five years. While no medical data was exposed, which is good, Social Security numbers (SSNs) were exposed, which is quite obviously bad. In addition to SSNs, attackers made off with patient names, addresses, dates of birth and in some cases, patient employers or guarantors and phone numbers.<\/p>\n<p>The silver lining here may actually be that the attackers in this case were advanced persistent threat actors. They probably weren\u2019t looking for consumer SSNs. In fact, various experts from the security firm Crowdstrike and elsewhere say the attackers probably sought intellectual property relating to medical systems that the People\u2019s Republic could put to use providing care for their aging population.<\/p>\n<p>In this effort, \u201cAPT 18\u201d (also known as \u201cDynamite Panda\u201d) failed. That said, it\u2019s hard to say what they\u2019ll do with this vast store of sensitive information.<\/p>\n<p><strong>A Larger Issue<\/strong><\/p>\n<p>However, the problem of healthcare data breaches has been one for years, and it isn\u2019t going to get any better any time soon. Here\u2019s why:<\/p>\n<p>When we talk about medical device security, we tend to talk about the fantastic and the grim; tales of remotely <a href=\"https:\/\/www.kaspersky.com\/blog\/hacking-humans\/\" target=\"_blank\" rel=\"noopener nofollow\">hacking insulin pumps and pacemakers<\/a>, maiming and murdering with laptops. Luckily for anyone with persistent medical condition treated by an embedded and\/or connected medical device, the likelihood of assassination by laptop \u2013 <a href=\"https:\/\/www.kaspersky.com\/blog\/black_hat_recap_2014\/\" target=\"_blank\" rel=\"noopener nofollow\">as I learned in a recent Black Hat briefing<\/a> \u2013 is effectively nonexistent. In fact, Rapid7 medical device security expert Jay Radcliffe said these <a href=\"https:\/\/threatpost.com\/connected-medical-devices-simultaneously-increase-risk-and-safety\/107663\" target=\"_blank\" rel=\"noopener nofollow\">connected medical devices do far more good than harm<\/a>.<\/p>\n<p>The problem, for the time being, appears to be more systemic and growing. It relates more to the way that doctors, hospitals and even medical devices store, share and make data accessible. As was pointed out in a discussion with Radcliffe, the most probable scenario through which a connected medical device could impact personal safety would be if a patient was treated improperly due medical records that had been tampered with or changed \u2013 whether by hacking or accident.<\/p>\n<div class=\"pullquote\">The problem of healthcare data breaches has been one for years, and it isn\u2019t going to get any better any time soon<\/div>\n<p>In an interview on <a href=\"http:\/\/www.npr.org\/blogs\/health\/2014\/08\/19\/341632184\/cardiologist-speaks-from-the-heart-about-americas-medical-system\" target=\"_blank\" rel=\"noopener nofollow\">NPR\u2019s Fresh Air with Terry Gross<\/a> earlier this week, Dr. Sandeep Jauhar, a cardiologist and author, suggested that a big part of the reason why U.S. healthcare lags behind others in the world is because of a lack of information sharing in the country. Thus, in order to improve the U.S. healthcare system \u2013 and come into compliance with the Affordable Care Act \u2014 there will need to be more connectivity between medical devices, more communications between healthcare providers, more remote access to data and, more likely than not, more exposure of sensitive health information. And this is just in the U.S. Juahar\u2019s statement implies that this sort of data sharing is already going on in countries with more advanced healthcare systems, only perpetuating the problem.<\/p>\n<p>This isn\u2019t to say all is hopeless. The Health Insurance Portability and Accountability Act (HIPAA) is designed in part to protect the security and privacy of consumer healthcare information. Hospitals and manufacturers have guidelines they are required to follow in order to be in compliance with HIPAA. Unfortunately, data breaches are all but inevitable and no security plan is perfect. Everyone \u2013 regardless of how hard they try \u2013 gets compromised eventually.<\/p>\n<p><strong>What if You Are Affected and How Would You Know?<\/strong><\/p>\n<p>Community Health Systems is in the process of sending notifications to anyone whose information was exposed in the attack. So what should you do if you receive one of these letters? We recommend you enroll immediately in credit monitoring services, which Community Health Systems will be offering for free to all of the victims. The breach notification letter will contain instructions on how to enroll.<\/p>\n<p>Beyond that, you will want to monitor your credit report on your own to make sure no one is using your SSN to take out lines of credit. <a href=\"http:\/\/www.chs.net\/media-notice-august-19-2014\/\" target=\"_blank\" rel=\"noopener nofollow\">Community Health Systems\u2019 breach notification page<\/a> has contact information, so you should reach out to them if you have any further questions.<\/p>\n<p>Lastly, the Federal Trade Commission has a website dedicated entirely toward <a href=\"http:\/\/www.consumer.ftc.gov\/features\/feature-0014-identity-theft\" target=\"_blank\" rel=\"noopener nofollow\">walking people through the identity theft reaction process<\/a>. If ever you are concerned about identity theft, that site is a great place to begin.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Community Health Systems #databreach exposes 4.5M SSNs. Were you a victim &amp; how should you react.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FE3Bt&amp;text=Community+Health+Systems+%23databreach+exposes+4.5M+SSNs.+Were+you+a+victim+%26amp%3B+how+should+you+react.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?<\/p>\n","protected":false},"author":42,"featured_media":3841,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[477,767,314,43,97,766],"class_list":{"0":"post-3840","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-apt","10":"tag-cyberattack","11":"tag-data-breach","12":"tag-privacy","13":"tag-security-2","14":"tag-sensitive-information"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/community_health_systems_breach\/3840\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/community_health_systems_breach\/3937\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/community_health_systems_breach\/4328\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/community_health_systems_breach\/4587\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/community_health_systems_breach\/5765\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/community_health_systems_breach\/4584\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/community_health_systems_breach\/5765\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/community_health_systems_breach\/5765\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3840"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3840\/revisions"}],"predecessor-version":[{"id":15898,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3840\/revisions\/15898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3841"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}