Federal Authorities Warn of Attacks on Healthcare Sector Firms Using ConnectWise’s ScreenConnect

Federal authorities have issued a warning regarding potential attacks on healthcare sector firms that utilize ConnectWise’s remote access tool, ScreenConnect. The Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HSCCC) recently released an alert urging pharmacies and other healthcare organizations to immediately assess their systems and networks for any indicators of compromise associated with ScreenConnect.

Background on ScreenConnect and Its Use in Healthcare Organizations

ScreenConnect, developed by ConnectWise, is a widely utilized remote access tool within the healthcare sector. Recently, there has been an incident involving ScreenConnect that has garnered significant attention. The incident revolves around Transaction Data Systems, a pharmacy supply chain and managed services firm, which recently merged with Outcomes. Outcomes provides services supporting over 48,000 community, chain, and grocery pharmacies.

Identified Attacks on Healthcare Organizations using ScreenConnect

Cybersecurity company Huntress has provided crucial insights into the incident involving ScreenConnect. Huntress reported that it has identified attacks on endpoints from two distinct healthcare organizations – a pharmaceutical firm and a medical care provider, both affiliated with Outcomes. Additionally, Huntress uncovered activities indicating network reconnaissance, suggesting that the attackers were preparing for further escalation of their attacks.

The role of unmanaged installations and outdated systems

On November 14, ConnectWise confirmed that the threat actors gained access through an unmanaged on-premises installation of ScreenConnect. It was discovered that the unmanaged installation had not been updated since 2019, leaving it vulnerable to exploitation. The incident highlights the critical importance of keeping software installations up to date to minimize the risk of compromise.

The challenge of attribution and awareness of attack methods

Despite ongoing investigations, Huntress has been unable to identify the hackers responsible for the attacks. However, the incident underscores the level of awareness that malicious groups possess when it comes to the tradecraft necessary to execute such attacks on a large scale. This demonstrates that there are organized entities that possess the knowledge and resources to effectively target healthcare organizations.

Defense Measures against ScreenConnect Exploits

In light of the ScreenConnect incident, organizations utilizing the software are strongly advised to take immediate steps to safeguard their infrastructure. The compromised endpoints in this scenario operated on an unmanaged instance of Windows Server 2019, which emphasizes the importance of proper management and security practices within an organization.

The Department of Health and Human Services warns that healthcare sector firms must remain vigilant and implement robust security measures to prevent exploitation. It advises organizations to ensure their software is regularly updated, and their systems are appropriately secured against potential compromises.

The recent warnings issued by federal authorities regarding potential attacks on healthcare sector firms using ConnectWise’s ScreenConnect highlight the ongoing threats faced by organizations within the healthcare industry. The incident involving Transaction Data Systems and Outcomes serves as a stark reminder that even the most robust systems can be vulnerable if not properly managed and updated.

As investigations continue, it is crucial for healthcare organizations to be proactive in their cybersecurity measures and to remain vigilant against potential attacks. By implementing stringent security protocols and staying abreast of the latest threats, healthcare sector firms can better protect themselves and the sensitive data they manage. Ongoing collaboration between government entities, cybersecurity firms, and healthcare organizations will play a crucial role in mitigating the risks and ensuring the resilience of the healthcare sector’s cybersecurity defenses.

Explore more

How Is AI Transforming Real-Time Marketing Strategy?

Marketing executives today are navigating an environment where consumer intentions transform at the speed of light, making the once-revered quarterly planning cycle appear like a relic from a slower, analog century. The traditional marketing roadmap, once etched in stone months in advance, has been rendered obsolete by a digital environment that moves faster than human planners can iterate. In an

What Is the Future of DevOps on AWS in 2026?

The high-stakes adrenaline rush of a manual midnight hotfix has officially transitioned from a badge of engineering honor to a glaring indicator of organizational systemic failure. In the current cloud landscape, elite engineering teams no longer view frantic, hand-typed commands as heroic; instead, they see them as a breakdown of the automated sanctity that governs modern infrastructure. The Amazon Web

How Is AI Reshaping Modern DevOps and DevSecOps?

The software engineering landscape has reached a pivotal juncture where the integration of artificial intelligence is no longer an optional luxury but a core operational requirement. Recent industry projections suggest that between 2026 and 2028, the percentage of enterprise software engineers utilizing AI code assistants will continue its rapid ascent toward seventy-five percent. This momentum indicates a fundamental departure from

Which Agencies Lead Global Enterprise Content Marketing?

The modern corporate landscape has effectively abandoned the notion that digital marketing is a series of independent creative bursts, replacing it with the requirement for a relentless, industrialized engine of communication. Large organizations now face the daunting task of maintaining a singular brand voice across dozens of territories, languages, and product categories, all while navigating increasingly complex buyer journeys. This

The 6G Readiness Checklist and the Future of Mobile Development

Mobile engineering stands at a historical crossroads where the boundary between physical sensation and digital transmission finally begins to dissolve into a single, unified reality. The transition from 4G to 5G was largely celebrated as a revolution in raw throughput, yet for many end users, the experience remained a series of modest improvements in video resolution and download speeds. In