The FBI and Cybersecurity and Infrastructure Security Agency Nov. 16 recommended health care and other critical infrastructure take steps to protect their networks from the Scattered Spider group, which uses social engineering techniques and legitimate remote access tools to compromise victim networks, extort ransom and steal data. 
 
鈥淪cattered Spider鈥檚 sophisticated technical cyberattacks begin with sophisticated psychological attacks,鈥� said John Riggi, AHA鈥檚 national advisor for cybersecurity and risk. 鈥淪cattered Spider employs social engineering techniques to deceive end users into providing their credentials, authentication codes or downloading 鈥榟elp desk鈥� tools on their computers that allow the adversary to gain and maintain persistent access to computer networks. Staff should be advised of help desk verification protocols and that help desk personnel should not be asking staff to divulge their credentials or multi-factor authentication codes. Conversely, the help desk should enhance its verification protocols and challenge questions to ensure they do not improperly reset staff credentials and to help staff distinguish valid help desk interaction from social engineering attempts.鈥�
 
For more information on this or other cyber and risk issues, contact Riggi at鈥�. For the latest cyber and risk resources and threat intelligence, visit鈥�aha.org/cybersecurity

Related News Articles

Headline
The FBI, Cybersecurity and Infrastructure Security Agency and international agencies July 29 released a joint advisory on recent tactics by the Scattered鈥�
Headline
Microsoft July 22 released an update on the ongoing cyberattacks to SharePoint servers used within organizations, attributing the incidents to China-based鈥�
Headline
The FBI, Cybersecurity and Infrastructure Security Agency, Department of Health and Human Services, and Multi-State Information Sharing and Analysis Center鈥�
Headline
Microsoft July 19 issued an alert about active attacks from vulnerabilities targeting SharePoint servers used within organizations. The incidents have not鈥�
Headline
In his latest AHA Cyber and Risk Intel blog, Scott Gee, AHA deputy national advisor for cybersecurity and risk, explains how hospitals can prepare for and鈥�
AHA Cyber Intel
In today鈥檚 heightened threat environment, driven by domestic and geopolitical issues, it is more critical than ever for hospitals to prepare for and mitigate鈥�