San Diego Union-Tribune

HACKERS POST STOLEN TRI-CITY RECORDS TO DARK WEB

Includes patient names, listed as ‘proof’ that a larger post is imminent

- BY PAUL SISSON

Though Tri-City Medical Center got its operations back up and running 17 days ago, ransomware extortion efforts appear to be ongoing against the Oceanside hospital.

Earlier this week, a cybersecur­ity expert noted in a message on X, formerly called Twitter, that “INC RANSOM,” a well-known group of cyber extortioni­sts, announced its possession of records stolen from the health care provider on the dark web, an anonymous corner of the Internet where such informatio­n is often bought and sold.

The post includes “proof” in the form of eight printed pages presumably taken from Tri-City during the digital attack that severely impacted the public hospital district’s operations starting on Nov. 9. On Nov. 27, the organizati­on reported that it had once again started accepting all ambulance traffic and was conducting elective surgeries postponed during the attack.

Posted records include two prior authorizat­ion forms, paperwork used to ask health insurance companies to OK specific procedures for specific patients whose names, phone numbers and other identifyin­g informatio­n are listed. Financial records are also included in the small batch of documents, though there is no indication of just how many records are in the attacker’s possession.

The announceme­nt is posted to a “mirror” site on the regular Internet site and, while The San Diego Union-Tribune found and visited the site to verify the presence of such records, it will not link to or otherwise share the site publicly to avoid disseminat­ing stolen informatio­n.

Asked for comment on the matter Thursday morning, TriCity, as of noon Friday, provided no response.

The documents posted by the ransomware group are not necessaril­y evidence that hackers gained access to Tri-City’s electronic medical records system

where super-sensitive data such as patient progress notes, test results and medical imaging reside.

It is possible for hackers to get a lot of personal informatio­n without accessing medical record repositori­es. Scripps Health, for example, was forced to notify nearly 150,000 of its patients in 2021 that some of their private informatio­n had been compromise­d during the monthlong ransomware attack that severely degraded its operations. While informatio­n said to include addressees, dates of birth, health insurance informatio­n, medical record numbers, patient account numbers and the names and dates of treatments were taken, Scripps said medical records remained private.

But it is clear that a notice popping up on a dark web site is a sign that hackers are still squeezing an organizati­on.

Such posts, said Jake Milstein, a cybersecur­ity adviser at Critical Insight, a Seattle-based informatio­n security consulting firm, are intended to put pressure on organizati­ons to pay a ransom to avoid a bigger and more damaging data dump. And even if an organizati­on pays an initial ransom request, that does not necessaril­y mean a second attempt will not be made.

And, he added, a new wrinkle has appeared in these types of attacks. In addition to threatenin­g to publish stolen private documents, ransomware groups have also started using the private informatio­n contained in those documents as leverage, sometimes calling the patients whose records they have taken and making very specific demands.

“The bad guys will start calling patients and saying, ‘hey, I see that you had plastic surgery, you had a colonoscop­y, you had heart surgery,’” Milstein said. “‘If you don’t want us to do something bad with your data, here’s the phone number for the CEO of the hospital, call them and tell them to pay the ransom.’”

That approach, he said, has surfaced in breaches across many organizati­ons from medical providers to K-12 schools, though another expert said that these scenarios are “extremely” unusual.

In all cases, he said, regular people who find themselves on the phone with a person asking them to call the organizati­on that has been attacked should be aware that doing so will not change the outcome. Even when a second ransom is paid, he said, sensitive data is still often sold to the highest bidder.

“They should remember that when they get on the phone, they’re talking to a terrorist,” Milstein said. “It’s best not to talk to the bad guy, nothing good will come of it, and it’s best to report it to the hospital and the local police.”

Given what has been posted online in relation to Tri-City, the consultant said that people who recently had care there should operate under the assumption that some of their personal informatio­n was caught up in the breach.

The key for anyone at risk of having medical informatio­n in the hands of cyber criminals is that such informatio­n, if eventually sold, is often used to fuel health care billing fraud. It may be used to impersonat­e a patient and bill health insurance companies or Medicare for services never provided.

“If you have a flexible spending account or a health savings account, you should check it and make sure that everything that is being charged there is legitimate,” Milstein said. “You can also request a copy of your medical record from your medical provider and make sure that everything in there is something that you did.

“You should repeat those checks in six months and again in a year.”

Credit cards are another significan­t area of potential concern. Stolen informatio­n can be used to apply for additional credit cards in a victim’s name, allowing criminals to run up large bills that come crashing down when collection­s agencies begin calling about purchases that the victim never made.

It is possible to contact credit agencies and “freeze” a person’s credit, indicating that no new credit cards should be issued under a person’s name without their explicit say so. While this can make certain activities, such as taking out a loan for a home or a car a bit more cumbersome, the benefits of locking things down in this way, Milstein said, can pay off big, especially for kids.

“If you have children who have visited that medical organizati­on, you should absolutely freeze their credit,” he said. “You know, if you have a 9-year-old, for example, they’re not going to need to apply for a credit card for several years, and that means, if something happens, you may not find out about it for years.

“The criminals count on that; they count on you not knowing what happens with your child’s credit, so they look for those minor accounts and try to use them.”

The San Diego Cyber Center of Excellence also reminds everyone that digital hygiene is paramount. The organizati­on emphasizes four practices that can significan­tly decrease the surface area available for attack:

• Turn on multifacto­r authentica­tion — opt into the extra step when trusted websites and applicatio­ns ask you to confirm you’re really who you say you are.

• Update your software — in fact, turn on automatic software updates if available. Bad actors exploit flaws in the system and network defenders are working hard to fix them, but their work relies on all of us updating our software with the latest fixes.

• Think before you click — if it looks phishy, it likely is and phishing schemes are only getting more sophistica­ted with AI.

• Use strong passwords and a password manager — using and reusing easy passwords (1234…) is like locking your door, but hanging the key on the doorknob.

“It’s best not to talk to the bad guy, nothing good will come of it.” Jake Milstein • cybersecur­ity adviser

Newspapers in English

Newspapers from United States