HealthInfoSecurity.com reported about an alert issued by “…the U.S. Division of Well being and Human Providers’ [HHS] Well being Sector Cybersecurity Coordination Heart warned that Clop claims to have hit greater than 130 organizations, together with healthcare business entities, with assaults involving the GoAnyWhere MFT flaw.” The February 24, 2023 entitled “Authorities Warn Healthcare Sector of Ongoing Clop Threats” (https://tinyurl.com/yd2y42hj) included these feedback:
Hackers can exploit the flaw, which is current within the software program’s administrator console, with out having to authenticate or in any other case log into the console. Fortra first issued a safety alert on Feb. 1 and launched an replace that features a patch (see: Clop Ransomware Claims Widespread GoAnyWhere MFT Exploits).
Clop has been energetic since February 2019. Not like different ransomware-as-a-service teams, “Clop unabashedly and nearly solely targets the healthcare sector,” HHS writes. Regulation enforcement dealt the group a blow when Ukrainian authorities arrested six suspected members. “Continued and profitable assaults, nevertheless, exhibit that this prolific group continues to be a viable risk to the healthcare sector,” HHS writes.
Additionally the “American Hospital Affiliation issued an alert for its members on Thursday based mostly on HHS HC3’s warning”:
“Healthcare organizations ought to instantly apply the safety patches really helpful..”
Is anybody shocked by this alert?
First printed at https://www.vogelitlaw.com/blog/ransomware-as-a-service-continues-to-target-healthcare