Hackers attack Indian healthcare website, steal 68 lakh records

Agencies
August 22, 2019

In a startling revelation, US-based cyber security firm FireEye said on Thursday that hackers broke into a leading India-based healthcare website, stealing 68 lakh records containing patient and doctor information.

Without naming the website, FireEye said cyber criminals -- mostly China-based -- are directly selling data stolen from healthcare organisations and web portals globally including in India in the underground markets.

"In February, a bad actor that goes by the name "fallensky519" stole 6,800,000 records associated with an India-based healthcare website that contains patient information and personally identifiable information (PII), doctor information and PII and credentials," FireEye said in its report shared with media.

Between October 1, 2018 and March 31, 2019, FireEye Threat Intelligence observed multiple healthcare-associated databases for sale on underground forums, many for under $2,000.

FireEye said it continues to witness a concerted focus on acquiring healthcare research by multiple Chinese advanced persistent threat (APT) groups.

"In particular, it is likely that an area of unique interest is cancer-related research, reflective of China's growing concern over increasing cancer and mortality rates, and the accompanying national health care costs," the cyber security agency noted.

Open source reports indicate that cancer mortality rates have increased dramatically in recent decades, making cancer China's leading cause of death.

As the People's Republic of China (PRC) continues to pursue universal healthcare by 2020, controlling costs and domestic industry will surely affect the PRC's strategy to maintain political stability," said the FireEye report.

Another probable motivation for APT activity is financial: the PRC has one of the world's fastest growing pharmaceutical markets, creating lucrative opportunities for domestic firms, especially those that provide oncology treatments or services.

"Targetting medical research and data from studies may enable Chinese corporations to bring new drugs to market faster than Western competitors," the report claimed.

In early April this year, suspected Chinese cyber espionage actors targeted a US-based health center-with a strong focus on cancer research - with "EVILNUGGET" malware.

APT22 - a Chinese group that has focused on biomedical, pharmaceutical, and healthcare organizations in the past, and continues to be active - also targeted this same organization in prior years.

In the same month, several researchers at the MD Anderson Cancer Research were dismissed following concerns over theft of medical research on behalf of the Chinese government.

One theme FireEye has observed among Chinese cyber espionage actors targeting the healthcare sector is the theft of large sets of personally identifiable information (PII) and Protected Health Information (PHI).

Beyond Chinese-nexus groups, FireEye Intelligence has observed a wide variety of other cyber espionage and nation state actors involved in targeting the healthcare sector, including Russia-nexus APT28.

"The valuable research being conducted within some of these institutions continues to be an attractive target for nation-states seeking to leapfrog their domestic industries," the report emphasised.

As biomedical devices increase in usage, the potential for them to become an attractive target for disruptive or destructive cyber attacks - especially by actors willing to assume greater risk - may present a more contested attack surface than today," said the report.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 28,2020

Los Angeles, Apr 28: People who experience loss of smell as one of the COVID-19 symptoms are likely to have a mild to moderate clinical course of the disease, according to a study which may help health care providers determine which patients require hospitalisation.

The findings, published in the journal International Forum of Allergy & Rhinology, follows an earlier study that validated the loss of smell and taste as indicators of infection with the novel coronavirus, SARS-CoV-2.

According to the scientists from the University of California (UC) San Diego Health in the US, patients who reported loss of smell were 10 times less likely to be hospitalised for COVID-19 compared to those without the symptom.

"One of the immediate challenges for health care providers is to determine how to best treat persons infected by the novel coronavirus," said Carol Yan, first author of the current study and rhinologist from the UC San Diego Health.

"If they display no or mild symptoms, can they return home to self-quarantine or will they likely require hospitalisation? These are crucial questions for hospitals trying to efficiently and effectively allocate finite medical resources," Yan said.

The findings, according to the researchers, suggest that loss of smell may be predictive of a milder clinical course of COVID-19.

"What's notable in the new findings is that it appears that loss of smell may be a predictor that a SARS-CoV-2 infection will not be as severe, and less likely to require hospitalisation," Yan said.

"If an infected person loses that sense, it seems more likely they will experience milder symptoms, barring other underlying risk factors," she added.

Risk factors for COVID-19 previously reported by other studies include age, and underlying medical conditions, such as chronic lung disease, serious heart conditions, diabetes, and obesity.

In the current study, the scientists made a retrospective analysis between March 3 and April 8 including 169 patients who tested positive for COVID-19 at UC San Diego Health.

They assessed olfactory and gustatory data for 128 of the 169 patients, 26 of whom required hospitalisation.

According to the researchers, patients who were hospitalised for COVID-19 treatment were significantly less likely to report anosmia or loss of smell -- 26.9 per cent compared to 66.7 per cent for COVID-19-infected persons treated as outpatients.

Similar percentages were found for loss of taste, known as dysgeusia, they said.

"Patients who reported loss of smell were 10 times less likely to be admitted for COVID-19 compared to those without loss of smell," said study co-author Adam S. DeConde.

"Moreover, anosmia was not associated with any other measures typically related to the decision to admit, suggesting that it's truly an independent factor and may serve as a marker for milder manifestations of Covid-19," DeConde said.

The researchers suspect that the findings hint at some of the physiological characteristics of the infection.

"The site and dosage of the initial viral burden, along with the effectiveness of the host immune response, are all potentially important variables in determining the spread of the virus within a person and, ultimately, the clinical course of the infection," DeConde said.

If the SARS-CoV-2 virus initially concentrates in the nose and upper airway, where it impacts olfactory function, that may result in an infection that is less severe and sudden in onset, decreasing the risk of overwhelming the host immune response, respiratory failure, and hospitalisation, the scientists added.

"This is a hypothesis, but it's also similar to the concept underlying live vaccinations," DeConde explained.

"At low dosage and at a distant site of inoculation, the host can generate an immune response without severe infection," he added.

Loss of smell, according to the study, might also indicate a robust immune response which has been localised to the nasal passages, limiting effects elsewhere in the body.

Citing the limitations of the study, the scientists said they relied upon self-reporting of anosmia from participants, which posed a greater chance of recall bias among patients once they had been diagnosed with COVID-19.

They added that patients with more severe respiratory disease requiring hospitalisation may not be as likely to recognise or recall the loss of smell.

So the researchers said more expansive studies are needed for validating the results.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 14,2020

New Delhi, Mar 14: Excise duty on petrol and diesel was on Saturday hiked by ₹3 per litre as the government looked to mop up gains arising from fall in international oil prices.

Special excise duty on petrol was hiked by ₹2 to ₹8 per litre incase of petrol and to Rs 4 incase of diesel, an official notification said.

Additionally, road cess on petrol was raised by ₹1 per litre each on petrol and diesel to ₹10.

The increase in excise duty would in normal course result in a hike in petrol and diesel prices but most of it would be adjusted against the fall in rates that would have necessitated because of slump in international oil prices.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.