A new advisory from the Cybersecurity and Infrastructure Security Agency and Australian Cyber Security Centre details the top malware strains observed last year and immediate actions organizations should take to protect themselves from these remote access Trojans, information stealers and ransomware threats.

鈥淭his report confirms that the most prolific malware users are cyber criminals who use malware to deliver ransomware,鈥 said John Riggi, AHA鈥檚 national advisor for cybersecurity and risk. 鈥淎 particular threat interest to hospitals and health systems cited in the report is the botnet TrickBot, which was leveraged by the notorious Russian-speaking ransomware gang known as Conti to conduct at least 450 attacks globally, including at least 16 high-impact ransomware attacks against U.S. health care organizations. Along with prioritizing patching of known vulnerabilities and enforcing multi-factor authorization, the report recommends utilizing , which include continuous scanning of an organization鈥檚 public IP addresses and weekly vulnerability reports. This is a very good service for hospitals and health systems to add, especially those with limited resources, as part of a layered, defense-in-depth cybersecurity strategy.鈥

For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org.
 

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency April 17 released guidance to reduce risks associated with a reported breach of Oracle cloud services.鈥
Headline
The National Counterintelligence and Security Center, the FBI, and the Defense Counterintelligence and Security Center yesterday released guidance on鈥
AHA Cyber Intel
While the rate of cyberattacks on hospitals has risen dramatically, the severity of the impacts has also grown exponentially. Let鈥檚 look at the state of cyber鈥
Headline
The House Energy and Commerce Oversight and Investigations Subcommittee April 1 discussed cybersecurity threats in legacy medical devices during a hearing. The鈥
Headline
The Trump Administration March 28 announced that it renewed for one year the public emergency for ongoing malicious cyber-enabled activities against the U.S.鈥
Headline
The FBI March 26 advised that, after extensive investigation and intelligence review, they have not identified any specific credible threat targeted against鈥