HomeLatest NewsFederal NewsHC3 issues alert on vulnerabilities in certaOracle products; Microsoft warns of Russian...

HC3 issues alert on vulnerabilities in certaOracle products; Microsoft warns of Russian spear-phishing campaign

The Health Sector Cybersecurity Coordination Center (HC3) on Oct. 28 released a report on the “Miracle Exploit,” a set of critical vulnerabilities affecting Oracle applications. “These vulnerabilities give an attacker the ability to execute remote code on victim systems without authentication or detection,” said Scott Gee, AHA deputy national advisor of cybersecurity and risk. “Organizations using affected Oracle products are advised to apply patches urgently to avoid exploitation.”
The health sector and others Oct. 29 were also alerted to an unrelated threat from a Russian cyber actor called “Midnight Blizzard,” who has been observed conducting a spear phishing campaign delivering phishing emails to targets in various sectors. According to Microsoft, the campaign is likely used to gather information from targets. The alert includes additional information, mitigations, hunting queries and indicators of compromise.
Midnight Blizzard was observed impersonating Microsoft employees and sending emails with social engineering lures related to Microsoft, Amazon Web Services and the concept of Zero Trust. Successful attacks provide the threat actor with sensitive information from the compromised device as the threat actor-controlled server maps the victims’ local device resources to their server.
“These phishing emails are well-crafted and targeted to the recipient,” said Gee. “From a cybersecurity perspective, some best practices can help to mitigate both of these dangerous attacks. Effective patch management prevents the Oracle vulnerability and training allows users to recognize phishing emails and — more importantly — not click on unknown links in emails, preventing the phishing attack. Both of these preventative measures are listed in the essential Cybersecurity Performance Goals. The AHA strongly recommends that all health care organizations, including third party suppliers, implement the voluntary CPGs. These guidelines will help to harden your defenses against cyberattacks.”

For more information on this or other cyber and risk issues contact Gee at sgee@aha.org. For the latest threat information and other cyber and risk resources visit www.aha.org/cybersecurity.

Stay Connected

Unified Voice Newsletter

Events This Month

Current Month

December

10dec11:00 am12:30 pmManaging Challenging Hospice Dilemmas (member only)SDAHO Webinar

10dec12:00 pm1:00 pmHospital Price Transparency from the Beginning and BeyondSDAHO Webinar

10dec3:30 pm4:30 pmBRIEFING: America’s Readiness to Meet the Needs of People with Serious Illness: The 2024 Serious Illness ScorecardCAPC Webinar

11dec12:00 pm1:00 pmHospice Use Disparities in American Indian Persons with End-Stage Kidney Disease (LifeCircle education)SDAHO Webinar

12dec9:00 am2:00 pmSepsis Alliance Symposium: Healthcare Associated Infections 2024Sepsis Alliance