Cybersecurity

Cyber Threat Intelligence, Alerts and Reports
As part of the AHA鈥檚 commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.
You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.
Cybersecurity & Risk Advisory
Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA鈥檚 National Advisor for Cybersecurity and Risk.
In this edition of Hacking Healthcare, we give you an update on yet another case of cyber
insurance falling short of covering an expected cost. We then explore the possibility of Iran
creating a 鈥渨hite list鈥 for foreign websites. Finally, we discuss the potential impact of China
stepping up鈥
From October 2018 to July 2019, the FBI identified unknown cyber actors attempting to exploit multiple US cleared defense contractor (CDC) websites with two types of SQL injection attacks in an effort to steal database data. These methods of attack are likely indicative of鈥
The FBI has recently observed brute force attempts against Office 365 accounts of US cleared defense contractors (CDCs). If accounts are successfully compromised, actors can conduct activities such as monitoring traffic, creating other accounts, or moving laterally across a company鈥
The FBI has observed cyber actors circumventing multi-factor authentication through common social engineering and technical attacks. This PIN explains these methods and offers mitigation strategies for organizations and entities using multi-factor authentication in their security鈥
In This Issue:
A Word From the Task Group By: Lee Barrett, 405(d) Task Group Member
HICP in the Spotlight: Ransomware
Happening Around Us
HHS Ransomware Resources
405(d) Events and Announcements
Coming Soon: Social Media!
In this edition of Hacking Healthcare, we explore insider threats and the various ways they can
negatively impact organizations. First, we analyze how the convergence of geopolitics and
insider threats have led GitLab to consider banning individuals of certain nationalities from
critical positions鈥
Summary:
The FBI has observed cyber actors leveraging commercial databases to obtain victim targeting information to perpetuate Business Email Compromise (BEC) fraud against construction companies and their vendors.