Cybersecurity

Huge Heartbleed data theft logged

Heartbleed Logo

The FBI has warned health care providers and health IT device makers that they have been targeted in what appears to be one of the largest disclosed cyberattacks based on the Heartbleed Open SSL vulnerability that was uncovered last spring.

The FBI issued an unclassified but restricted warning to health care providers in mid-August in response to an intrusion into Community Health Systems Professional Services Corp.'s (CHSPSC) network. In an Aug. 19 statement, the company said that it had determined in July that its computer network was targeted by an external criminal cyberattack between April and June. The Tennessee-based company provides management, consulting, and IT services to clinics and hospital-based physicians.

Reports in mid-August indicated the attack was based on the OpenSSL Heartbleed vulnerability on a network device that hadn't been patched. The FBI's warning, issued in late August and posted on the Public Intelligence open-source website Sept. 2, seems to confirm those reports but does not explicitly say the Heartbleed vulnerability was exploited.

According to the FBI, the attack on CHSPSC began with a spear phishing email message that contains a malicious link that may connect unwary users to a new virtual private network site, service or client or a webmail site. The network is subsequently compromised via ports 80, 443 and possibly others. Those ports are vulnerable to OpenSSL Heartbleed exploits.

A company filing at the Securities and Exchange Commission said records for 4.5 million individuals were stolen, including nonmedical data related to the company's physician practice operations. The company said the attackers stole patients' names, addresses, birth dates, Social Security numbers and, in some cases, telephone numbers, along with the names of employers or guarantors. However, the company said that to the best of its knowledge, no credit card, medical or clinical information was taken.

The company said a Chinese group that "used highly sophisticated malware technology to attack CHSPSC's systems" was behind the attack. The intruders bypassed security measures and copied and transferred data from its systems, according to a statement from Andi Bosshart, CHSPSC's corporate compliance and privacy officer.

Beyond seeking to gather personal data, the FBI warned that the group has also been targeting companies in the health care industry to steal valuable intellectual property, such as information related to the development of medical devices and equipment.

About the Author

Mark Rockwell is a staff writer at FCW.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

Featured

  • FCW @ 30 GPS

    FCW @ 30

    Since 1986, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group