Federal authorities have issued a warning regarding potential attacks on healthcare sector firms that utilize ConnectWise’s remote access tool, ScreenConnect. The Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HSCCC) recently released an alert urging pharmacies and other healthcare organizations to immediately assess their systems and networks for any indicators of compromise associated with ScreenConnect.
Background on ScreenConnect and Its Use in Healthcare Organizations
ScreenConnect, developed by ConnectWise, is a widely utilized remote access tool within the healthcare sector. Recently, there has been an incident involving ScreenConnect that has garnered significant attention. The incident revolves around Transaction Data Systems, a pharmacy supply chain and managed services firm, which recently merged with Outcomes. Outcomes provides services supporting over 48,000 community, chain, and grocery pharmacies.
Identified Attacks on Healthcare Organizations using ScreenConnect
Cybersecurity company Huntress has provided crucial insights into the incident involving ScreenConnect. Huntress reported that it has identified attacks on endpoints from two distinct healthcare organizations – a pharmaceutical firm and a medical care provider, both affiliated with Outcomes. Additionally, Huntress uncovered activities indicating network reconnaissance, suggesting that the attackers were preparing for further escalation of their attacks.
The role of unmanaged installations and outdated systems
On November 14, ConnectWise confirmed that the threat actors gained access through an unmanaged on-premises installation of ScreenConnect. It was discovered that the unmanaged installation had not been updated since 2019, leaving it vulnerable to exploitation. The incident highlights the critical importance of keeping software installations up to date to minimize the risk of compromise.
The challenge of attribution and awareness of attack methods
Despite ongoing investigations, Huntress has been unable to identify the hackers responsible for the attacks. However, the incident underscores the level of awareness that malicious groups possess when it comes to the tradecraft necessary to execute such attacks on a large scale. This demonstrates that there are organized entities that possess the knowledge and resources to effectively target healthcare organizations.
Defense Measures against ScreenConnect Exploits
In light of the ScreenConnect incident, organizations utilizing the software are strongly advised to take immediate steps to safeguard their infrastructure. The compromised endpoints in this scenario operated on an unmanaged instance of Windows Server 2019, which emphasizes the importance of proper management and security practices within an organization.
The Department of Health and Human Services warns that healthcare sector firms must remain vigilant and implement robust security measures to prevent exploitation. It advises organizations to ensure their software is regularly updated, and their systems are appropriately secured against potential compromises.
The recent warnings issued by federal authorities regarding potential attacks on healthcare sector firms using ConnectWise’s ScreenConnect highlight the ongoing threats faced by organizations within the healthcare industry. The incident involving Transaction Data Systems and Outcomes serves as a stark reminder that even the most robust systems can be vulnerable if not properly managed and updated.
As investigations continue, it is crucial for healthcare organizations to be proactive in their cybersecurity measures and to remain vigilant against potential attacks. By implementing stringent security protocols and staying abreast of the latest threats, healthcare sector firms can better protect themselves and the sensitive data they manage. Ongoing collaboration between government entities, cybersecurity firms, and healthcare organizations will play a crucial role in mitigating the risks and ensuring the resilience of the healthcare sector’s cybersecurity defenses.