Federal Authorities Warn of Attacks on Healthcare Sector Firms Using ConnectWise’s ScreenConnect

Federal authorities have issued a warning regarding potential attacks on healthcare sector firms that utilize ConnectWise’s remote access tool, ScreenConnect. The Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HSCCC) recently released an alert urging pharmacies and other healthcare organizations to immediately assess their systems and networks for any indicators of compromise associated with ScreenConnect.

Background on ScreenConnect and Its Use in Healthcare Organizations

ScreenConnect, developed by ConnectWise, is a widely utilized remote access tool within the healthcare sector. Recently, there has been an incident involving ScreenConnect that has garnered significant attention. The incident revolves around Transaction Data Systems, a pharmacy supply chain and managed services firm, which recently merged with Outcomes. Outcomes provides services supporting over 48,000 community, chain, and grocery pharmacies.

Identified Attacks on Healthcare Organizations using ScreenConnect

Cybersecurity company Huntress has provided crucial insights into the incident involving ScreenConnect. Huntress reported that it has identified attacks on endpoints from two distinct healthcare organizations – a pharmaceutical firm and a medical care provider, both affiliated with Outcomes. Additionally, Huntress uncovered activities indicating network reconnaissance, suggesting that the attackers were preparing for further escalation of their attacks.

The role of unmanaged installations and outdated systems

On November 14, ConnectWise confirmed that the threat actors gained access through an unmanaged on-premises installation of ScreenConnect. It was discovered that the unmanaged installation had not been updated since 2019, leaving it vulnerable to exploitation. The incident highlights the critical importance of keeping software installations up to date to minimize the risk of compromise.

The challenge of attribution and awareness of attack methods

Despite ongoing investigations, Huntress has been unable to identify the hackers responsible for the attacks. However, the incident underscores the level of awareness that malicious groups possess when it comes to the tradecraft necessary to execute such attacks on a large scale. This demonstrates that there are organized entities that possess the knowledge and resources to effectively target healthcare organizations.

Defense Measures against ScreenConnect Exploits

In light of the ScreenConnect incident, organizations utilizing the software are strongly advised to take immediate steps to safeguard their infrastructure. The compromised endpoints in this scenario operated on an unmanaged instance of Windows Server 2019, which emphasizes the importance of proper management and security practices within an organization.

The Department of Health and Human Services warns that healthcare sector firms must remain vigilant and implement robust security measures to prevent exploitation. It advises organizations to ensure their software is regularly updated, and their systems are appropriately secured against potential compromises.

The recent warnings issued by federal authorities regarding potential attacks on healthcare sector firms using ConnectWise’s ScreenConnect highlight the ongoing threats faced by organizations within the healthcare industry. The incident involving Transaction Data Systems and Outcomes serves as a stark reminder that even the most robust systems can be vulnerable if not properly managed and updated.

As investigations continue, it is crucial for healthcare organizations to be proactive in their cybersecurity measures and to remain vigilant against potential attacks. By implementing stringent security protocols and staying abreast of the latest threats, healthcare sector firms can better protect themselves and the sensitive data they manage. Ongoing collaboration between government entities, cybersecurity firms, and healthcare organizations will play a crucial role in mitigating the risks and ensuring the resilience of the healthcare sector’s cybersecurity defenses.

Explore more

Can You Spot a Deepfake During a Job Interview?

The Ghost in the Machine: When Your Top Candidate Is a Digital Mask The screen displays a perfectly polished professional who answers every complex technical question with surgical precision, yet a subtle, unnatural flicker near the jawline suggests something is deeply wrong. This unsettling scenario became reality at Pindrop Security during an interview with a candidate named “Ivan,” whose digital

Data Science vs. Artificial Intelligence: Choosing Your Path

The modern job market operates within a high-stakes environment where digital transformation has accelerated to a point that leaves even seasoned professionals questioning their specialized trajectory. Job boards are currently flooded with titles that seem to shift shape by the hour, creating a confusing landscape for those entering the technology sector. One listing calls for a data scientist with deep

How AI Is Transforming Global Hiring for HR Professionals?

The landscape of international recruitment has undergone a staggering metamorphosis that effectively erased the traditional borders once separating regional labor markets from the global economy. Half a decade ago, establishing a presence in a foreign market required exhaustive legal frameworks, exorbitant capital investment, and months of administrative negotiations. Today, the operational reality is entirely different; even nascent organizations can engage

Who Is Winning the Agentic AI Race in DevOps?

The relentless pressure to deliver software at breakneck speeds has pushed traditional CI/CD pipelines to a breaking point where manual intervention is no longer a sustainable strategy for modern engineering teams. As organizations navigate the complexities of distributed cloud systems, the transition from rigid automation to fluid, autonomous operations has become the defining challenge for the current technological landscape. This

How Email Verification Protects Your Sender Reputation?

Maintaining a flawless digital communication channel requires more than just compelling copy; it demands a rigorous defense against the invisible erosion of subscriber data that threatens every modern marketing department. Verification acts as a critical shield for the digital infrastructure of an organization, ensuring that marketing efforts actually reach the intended recipients instead of vanishing into the ether. This process