Credit: https://www.managedhealthcareexecutive.com |
During class this week, the topic of the Health Insurance Portability and Accountability Act of 1996, commonly referred to simply as HIPAA, came up. The primary topic of the discussion was about the vulnerabilities to organizations using HIPAA information and the penalties for violating the Act. I have had discussions about HIPAA in previous cybersecurity classes, but I never really delved into the "why factor" surrounding patient records until now. It is quite intriguing to know why an individual's records are so important to a hacker.
In the article, "Research Reveals Why Hacked Patient Records Are So Valuable," by Marianne McGee, she discusses this very topic. This article introduced new terms for me: fullz and identity kits. A fullz, slang in the dark web world, is a term used to describe an individual's full health history. This can be intricate records of health issues and also include such things as the pharmacy a person utilizes. These can be purchased on the dark web for as little as $20 and then turned into identity kits.
Credit: https://www.freepik.com/ |
An identity kit is a combination of lots of information farmed about an individual off of various venues and then combined with health data. These venues can be from websites, phone calls, and any other method an attacker can use to get information. A key part of completing these kits is social engineering. Perhaps an attacker has your medical data and contact information but needs just a few more details to put everything together. You might start seeing emails or receiving phone calls asking you to verify data that the attacker needs to put the pieces of the puzzle together. Once complete, attackers can then sell the identity kits on the dark web for thousands of dollars to other entities who can then use those kits to still the individual's identity. Scary thought, right?
An even scarier thought is that, according to Carol Amick, 70% of organizations are not compliant with HIPAA. Now, this does not necessarily mean that 70% of organizations are vulnerable to attacks, but that is a large number of organizations handling patient medical information who do not meet compliance to safeguard such information. An even scarier thought: it may only take one organization to cause havoc for millions of people.
In 2014 and 2015, Anthem Health was the target of a spear-fishing campaign. This attack resulted in the compromise of personal information for 80 million individuals. An attack of this magnitude as the result of a spear-fishing campaign shows that organizations, especially those with highly valuable personal information, must do more to combat vulnerabilities. These types of attacks will only get more sophisticated and look more authentic, so organizations must step up their defenses and train employees to be cognizant of organizational policies in place to prevent such compromises.
The Anthem Health case was considered a sophisticated attack. The attackers appeared to have full access to systems they should not have. The likely culprits, in this case, could have been malware or a response to login credentials. They were able to gain access to the organization's databases and run queries from some time in December 2014 until January 29, 2015, when the last noted query was performed. In reality, the Anthem Health breach was not actually a HIPAA violation since no actual medical records were stolen. Rather, full names, birthdates, social security numbers, and employment information, among others, were the target of the attackers; some of the needs for identification kits.
Anthem Health is just one case of an organization being compromised through malicious activities. As we move forward storing and transmitting more and more personal information across the Internet, it is imperative that organizations take stronger initiatives to safeguard this highly valuable data from falling into the hands of dark web constituents. Leadership at all levels of an organization dealing with such information must do everything in its power to protect individuals who have entrusted them to safely handle their personal information. This could be accomplished through stricter adherence to HIPAA standards, revamped training initiative for employees, and, where Anthem failed, encrypting such data to further protect it. Furthermore, IT departments can leverage strict spam and traffic filters to prevent malicious links from entering the organization and, if they do, prevent any damage by highly limiting traffic to suspected websites.
Will we ever eradicate malicious attacks? It is highly unlikely. However, through proper education of employees and strict enforcement of acceptable use policies within organizations, we can certainly make it harder. Organizations that work with highly sensitive information, regardless of who it might affect, must take steps to prevent breaches like the massive Anthem Health example from occurring. They only way they can is to make it harder for employees to unknowingly open the door to attackers and constantly monitor their systems for any sign of malicious activity. Anthem Health went for nearly a month before employees noticed something strange. That was nearly a month too long for something like this to have been occurring.