Incident Report

Sneaky ScreenConnect Scheme Targets Healthcare

By

By

Access Point Consulting

Overview

A targeted cyber-attack involving the abuse of the ScreenConnect remote access tool has been identified, impacting multiple healthcare organizations in the U.S. Notably, the threat actors exploited local ScreenConnect instances affiliated with Transaction Data Systems (TDS), a comprehensive pharmacy supply chain and management systems provider. The attacks were detected between October 28 and November 8, 2023, with ongoing activity raising concerns. The assailants, identified by Huntress, a managed security research organization, demonstrated advanced tactics, installing additional tools like AnyDesk to maintain persistent access.

The attackers first downloaded a payload named text.xml, indicative of a unified modus operandi. This payload, laden with C# code, discreetly loaded the Metasploit attack payload Meterpreter into system memory, evading detection using non-PowerShell techniques. Further, processes were launched through the Printer Spooler service, with compromised endpoints operating on Windows Server 2019.

The common thread among the affected organizations was the presence of a ScreenConnect instance tied to the 'rs.tdsclinical[.]com' domain associated with TDS. The remote access tool facilitated the installation of additional payloads, command execution, file transfers, and attempted creation of new user accounts for sustained access.

Response and Recovery

Huntress observed the installation of additional tools and attempts to create user accounts. TDS, now 'Outcomes,' after a recent merger, has been notified but has not responded. Clarity on the effectiveness of TDS's incident response plan is pending, as they’ve made no effort to contact the Huntress research team regarding this incident. It is unknown if stakeholders have been informed about this incident, which may cause reputational damage and compromise the trust of customers.

Recommendations

There is an ever-present need for the Healthcare industry to be proactive about cybersecurity measures, collaborative threat intelligence sharing, and swift incident response. Healthcare and pharmaceutical executives must prioritize a comprehensive review of their organization's security posture to prevent future incidents of a similar nature.

Specifically, immediate actions to enhance the security of ScreenConnect instances must be taken. Scrutinizing and securing remote access tools, conducting thorough reviews of security protocols and incident response plans, enhancing employee training to recognize and report potential security threats, and utilizing a team of experts that proactively hunt for threats within an organization’s systems.

Resources

Trending Articles & Security Reports

Resources

CyberWatch

October 25, 2024

Ransomware, Supply Chain Attacks, and Nation-State Threats

CyberWatch, by Access Point Consulting, is your weekly source for emerging cybersecurity news, regulatory updates, and threat intelligence. Backed by experts in security consulting, regulatory compliance, and security operations, Access Point enables you to manage cyber risks, respond to incidents, and drive innovation in your company. Read here or on our website; listen on Spotify or Apple Podcasts; or watch on YouTube.website; listen on Spotify or Apple Podcasts; or watch on YouTube. .

Find out more
October 7, 2024

VINs and Losses: How Hackers Take Kias for a Ride

In the age of smart cars and connected devices, convenience often comes with hidden risks. A recently discovered critical vulnerability in Kia vehicles serves as a stark reminder of how our increasingly digital world is making cars new targets for cyberattacks. This vulnerability allowed hackers to remotely control various vehicle functions—using nothing more than a car's license plate number. It highlights the growing threat of cyberattacks on connected cars and the importance of cybersecurity in the automotive industry.

Find out more
October 3, 2024

Vulnerability in SolarWinds Managed File Transfer Server Actively Exploited

CVE-2024-28995 SolarWinds has issued a critical update for a zero-day vulnerability in its Serv-U MFT Server, allowing attackers to bypass security and access restricted files without authentication. Actively exploited, this flaw poses a significant risk for businesses that delay applying the fix.

Find out more