In response to recent malicious activity identified in a federal civilian agency鈥檚 Microsoft 365 audit logs, the Cybersecurity and Infrastructure Security Agency and FBI July 12 released  to help health care and other critical infrastructure organizations detect similar malicious activity and secure their cloud environments. The agencies recommend implementing audit logging and other preventive measures, reporting suspicious activity to them and contacting Microsoft for mitigation actions due to the cloud-based infrastructure affected.

鈥淢icrosoft has linked this malicious activity to a China-based threat group tracked as 鈥楽torm-0558,鈥欌 said John Riggi, AHA鈥檚 national advisor for cybersecurity and risk. 鈥淭he revelation of this threat also coincides with the reported move by the Administration to limit Chinese companies鈥 access to U.S. cloud providers. This threat also demonstrates that once again no organization is immune from cyberthreats, including the federal government, and that cloud environments are not necessarily more secure than on-premises environments. It is essential that individual organizations configure cloud security controls as enumerated in the alert and closely monitor their cloud applications for anomalous behavior.鈥 

For more information on this or other cyber and risk issues, contact Riggi at . For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity

Related News Articles

Headline
The FBI, Cybersecurity and Infrastructure Security Agency and international agencies July 29 released a joint advisory on recent tactics by the Scattered鈥
Headline
Microsoft July 22 released an update on the ongoing cyberattacks to SharePoint servers used within organizations, attributing the incidents to China-based鈥
Headline
The FBI, Cybersecurity and Infrastructure Security Agency, Department of Health and Human Services, and Multi-State Information Sharing and Analysis Center鈥
Headline
Microsoft July 19 issued an alert about active attacks from vulnerabilities targeting SharePoint servers used within organizations. The incidents have not鈥
Headline
In his latest AHA Cyber and Risk Intel blog, Scott Gee, AHA deputy national advisor for cybersecurity and risk, explains how hospitals can prepare for and鈥
AHA Cyber Intel
In today鈥檚 heightened threat environment, driven by domestic and geopolitical issues, it is more critical than ever for hospitals to prepare for and mitigate鈥