Paubox blog: HIPAA compliant email made easy

Learning from the Boston Children’s Health Physicians' ransomware attack

Written by Tshedimoso Makhene | October 29, 2024

Ransomware gang BianLian recently targeted Boston Children’s Health Physicians (BCHP), a pediatric group operating in New York and Connecticut, by listing them on the dark web. BianLian claims to possess sensitive data, including patient information, financial records, health insurance details, and personally identifiable information.

 

The scope of the breach

On September 6, BCHP was alerted by an IT vendor about unusual activity within its systems. Four days later, on September 10, the pediatric group detected unauthorized access to limited parts of its network. Following the incident, BCHP secured its network, shut down impacted systems, and launched an investigation. The data compromised reportedly includes names, Social Security numbers, health insurance information, and limited treatment details of patients and staff, though BCHP’s electronic medical record systems were unaffected as they operate on a separate network.

BianLian’s listing of BCHP on the dark web reminds organizations of the current cyber threat landscape for healthcare entities. BCHP's response, including the engagement of cybersecurity experts and law enforcement notification, demonstrates how a quick reaction mitigates immediate threats; however, the impact of such incidents often lingers due to the nature of data theft and potential long-term harm to affected individuals.

Read more: Boston Children's Health Physicians | Cybersecurity Announcement

 

Regulatory perspectives

Ransomware attacks in healthcare have surged dramatically, with reports from the U.S. Department of Health and Human Services (HHS) citing a 102% increase in ransomware breaches from 2019 to 2023. Nicholas Heesters, senior advisor for cybersecurity at HHS, stresses that healthcare organizations are prime targets due to the value of the protected health information (PHI) they store. The HIPAA Security Rule, which mandates stringent security protocols, serves as a "blueprint" for preventing and mitigating ransomware attacks, but non-compliance with HIPAA provisions often exacerbates the impact of attacks.

Read also:

 

Lessons from the BCHP attack

The BCHP incident presents several takeaways for healthcare organizations and associated IT vendors on mitigating ransomware risks and protecting patient data:

  • Strengthen vendor security: The incident at BCHP stresses vetting IT vendors and third-party associates for cybersecurity practices. Given that one compromised vendor can expose all its clients to risk, healthcare providers must prioritize third-party risk management, including regular security audits and clear cybersecurity requirements for their partners.
  • Implement incident response plans: BCHP’s immediate response, shutting down systems and engaging cybersecurity experts, demonstrates the value of a well-coordinated incident response plan. Every healthcare organization should have a comprehensive and well-tested incident response plan that includes steps for isolating compromised systems, communicating with law enforcement, and notifying affected individuals.
  • Invest in cybersecurity beyond compliance: While HIPAA compliance is essential, it may not be sufficient. Organizations should consider additional cybersecurity frameworks and controls, such as multi-factor authentication (MFA), advanced threat detection, and regular employee training on cybersecurity hygiene.
  • Focus on resiliency and recovery: Recovery from ransomware is often more complex than initial containment. Continuous data backup, separate storage for electronic medical records, and secure recovery protocols can help organizations restore operations more quickly and prevent prolonged service disruptions.
  • Educate on the long-term risks of data breaches: Data theft, particularly involving minors' personal and medical information, can have long-lasting repercussions. Providing resources, such as credit monitoring and identity theft protection, for affected individuals helps to mitigate potential harm.
  • Regular security assessments and training: Ongoing staff training on identifying phishing attempts, using secure passwords, and maintaining general cybersecurity awareness can be instrumental in preventing attacks. Similarly, conducting regular security assessments to identify vulnerabilities before they can be exploited is essential for a proactive defense.

See also: Cybersecurity insights and trends for 2024

 

Building a stronger cyber defense in healthcare

Ransomware remains one of the healthcare sector’s most significant threats. The BCHP incident illustrates the potential harm to patient and employee privacy and the operational disruptions that arise from a ransomware attack. Healthcare providers must continue to evolve their cybersecurity practices, incorporating lessons from incidents like these to create a safer environment for sensitive health data and the patients who rely on them.

See also: HIPAA Compliant Email: The Definitive Guide

 

FAQs

How do third-party attacks commonly occur?

These attacks usually happen through phishing emails, weak or reused passwords, unpatched software, or misconfigurations within a third-party vendor's systems. Attackers can also exploit shared network connections or insecure APIs between organizations and their vendors.

 

How can organizations protect themselves from third-party cyberattacks?

Key steps include implementing a third-party risk management program, conducting security assessments, requiring vendors to meet specific security standards, and limiting data and network access to third parties. Regular audits and contract clauses for incident response can also help.

 

What are the long-term consequences of a ransomware attack on personal data?

Long-term consequences include the risk of identity theft, fraud, and damage to an individual’s or organization’s credit and reputation. Affected individuals may experience data misuse for years, underscoring the importance of secure data management.