Vulnerability Report

Sunshine Snag: Florida Department of Health Ransomware Attack

By

Matt Berns, Access Point Consulting

By

Access Point Consulting

The Florida Department of Health (DOH) is currently addressing a significant ransomware attack that has severely impacted its vital statistics system, which processes birth and death certificates. The cybercriminal group RansomHub has claimed responsibility for the attack, asserting that it stole over 100 gigabytes of data, including personally identifiable information (PII) and protected health information (PHI). RansomHub began leaking the stolen data after the DoH missed a July 1 payment of ransom deadline.

Florida's State Cybersecurity Act, which prohibits state entities from paying ransom demands, remains a critical factor in this incident. RansomHub has a history of attacking healthcare organizations and government departments, including recent attacks on Frontier Communications and Christie's.

The ransomware attack on the Florida Department of Health involved the exfiltration of a substantial amount of data, which RansomHub began leaking after the state agency missed the ransomware payment deadline. The attack was detected in late June 2024, disrupting numerous services within the department.

The organization's network was likely compromised through phishing or a vulnerable server. Initial signs of the incident included disruptions in their vital statistics system.

Impact

The attack has profoundly affected the Department's ability to process vital records, leading to delays and manual processing for funeral homes across the state.

The leaked data, including service-related files, employee records, health program applications, and sensitive personal and health information, suggests a significant breach. Potentially compromised information includes names, addresses, phone numbers, dates of birth, Social Security numbers, appointment details, health insurance information, medical record numbers, screening results, health policy numbers, and more.

In response to the ransomware attack, the Department of Health took immediate actions to isolate the affected systems and limit the spread of the malware. The department has an incident response plan, though its adequacy is under review.

Communication with stakeholders is ongoing, with no public comment on ransom negotiations due to the legal prohibition on ransom payments.

Efforts to restore affected systems and data are underway, although the expected downtime and impact on business operations remain uncertain. The disruption of multiple services within the department, including the online system for issuing birth and death certificates, highlights the critical need for a robust recovery plan.

Phishing attacks and system vulnerabilities remain two of the most prevalent and dangerous vectors for ransomware attacks and other cybersecurity threats. The Florida Department of Health's recent incident underscores the critical importance of protecting against these risks.

Recommendations

Phishing is a favored technique for attackers because it targets human vulnerabilities rather than technical flaws. In the context of the Florida Department of Health attack, a successful phishing attempt could have granted attackers the initial access needed to infiltrate the system.

To safeguard against phishing:

Employee Training: Regular and comprehensive training programs should be implemented to educate employees about the common signs of phishing attempts, such as suspicious links, unexpected attachments, and urgent requests for sensitive information. Employees should be encouraged to report any suspicious communications.

Email Security Solutions: Deploy advanced email filtering and security solutions that can detect and block phishing attempts before they reach employees' inboxes. These solutions can use machine learning and threat intelligence to identify malicious emails.

Multi-Factor Authentication (MFA): Enforcing MFA adds an additional layer of security, making it more difficult for attackers to gain access to systems even if they obtain valid login credentials through phishing.

Exploiting unpatched vulnerabilities in software and systems is another common method used by cybercriminals to gain unauthorized access. Vulnerabilities can exist in operating systems, applications, or even hardware.

To mitigate the risk from vulnerabilities:

Regular Patching: Establish a robust patch management process to ensure that all systems and software are regularly updated with the latest security patches. This reduces the window of opportunity for attackers to exploit known vulnerabilities.

Vulnerability Scanning: Conduct regular vulnerability scans and penetration testing to identify and remediate security weaknesses before they can be exploited by attackers. These scans should cover both internal and external systems.

Security Configuration Management: Ensure that systems are configured securely according to best practices and that any unnecessary services or features are disabled to reduce the attack surface.

By focusing on employee education, implementing advanced security technologies, and maintaining diligent patch and configuration management practices, organizations can significantly reduce their risk of falling victim to attacks similar to the one experienced by the Florida Department of Health.

Resources

Trending Articles & Security Reports

Resources

CyberWatch

November 22, 2024

Patch Updates, New Malware Threats, and the Ongoing Supply Chain Battle

On this episode of the CyberWatch podcast, there are updates to software across the application and OS spectrum. New malicious campaigns are threatening victims of all sizes, and researchers have performed dissections on malware to give defenders new clues about just what it is they're fighting. All this today, in CyberWatch.

Find out more
October 25, 2024

Ransomware, Supply Chain Attacks, and Nation-State Threats

CyberWatch, by Access Point Consulting, is your weekly source for emerging cybersecurity news, regulatory updates, and threat intelligence. Backed by experts in security consulting, regulatory compliance, and security operations, Access Point enables you to manage cyber risks, respond to incidents, and drive innovation in your company. Read here or on our website; listen on Spotify or Apple Podcasts; or watch on YouTube.website; listen on Spotify or Apple Podcasts; or watch on YouTube. .

Find out more
October 7, 2024

VINs and Losses: How Hackers Take Kias for a Ride

In the age of smart cars and connected devices, convenience often comes with hidden risks. A recently discovered critical vulnerability in Kia vehicles serves as a stark reminder of how our increasingly digital world is making cars new targets for cyberattacks. This vulnerability allowed hackers to remotely control various vehicle functions—using nothing more than a car's license plate number. It highlights the growing threat of cyberattacks on connected cars and the importance of cybersecurity in the automotive industry.

Find out more