Social Icons

Tuesday, August 27, 2019

Why Chinese hackers seek to steal medical data
Data theft is increasing in the health sector, probably to accelerate research and development of new products.
Hospitals and medical research centers are currently among the favorite targets of ransomware writers. Highly publicized, these attacks unfortunately hide a reality no less brutal, that of the looting of health data. According to a recent report by the company FireEye, the main experts in this field are Chinese groups who apparently have been pounding the health sector with diligence and method since at least 2013.

Among the last sites targeted is a US center in April 2019. The attack was made through documentary traps. The same organization had already been in sight in 2018 and in previous years, and this by several groups of different Chinese hackers, including APT41 and APT22. Between July 2014 and 2016, APT41 malwares were detected in the systems of a subsidiary of a medical device manufacturer and a biotech company. Those of ATP10 and APT18 were seen in various organizations between 2013 and 2017.

A special attraction for cancer
According to FireEye, the purpose of these operations would be twofold: to spy on foreign laboratories and manufacturers to better compete in the international market, but also to strengthen the Chinese health system. In terms of data and targeted systems, the fight against cancer appears to be one of the priorities of this vast data theft.

However, the Chinese cyberespions are not the only ones interested in this information. In the past, FireEye has also identified attacks from groups of Russian or Vietnamese origin. Moreover, purely criminal hackers are also quite active. Between October 2018 and March 2019, FireEye's bloodhounds detected a dozen health databases, put on sale in underground forums for a price ranging from $ 200 to $ 5,500. Remote access to computers owned by health organizations is also available for sale at rates of up to $ 10,000.

Source: https://content.fireeye.com/cyber-security-for-healthcare/rpt-beyond-compliance-cyber-threats-and-healthcare

No comments:

Post a Comment

Category Of Mobile Courses

Actualités (644) Adsense (1) Affiliation (1) Algebraic Topology (1) Algorithmic (1) all-news (30) Android (5) Android App (8) Android app without code (4) Android Apps (169) Android Development (4) Android download (2) Android OS (3) AngularJS (1) Automata theory and formal language (5) C programming (5) Category and Functor (8) CMS (3) Computer Glossary (18) Create Mobile App With Ionic Framework (2) CSS (2) CSS-Cascading-Style-Sheets (4) Developpement Java (13) Differential Geometry (1) Django-Python-Framework (8) dropshiping (26) Earn Money by Internet (4) Emplois (23) Framework php (2) Fraud (2) HTML (7) Java For Beginners (10) Javascript (12) Kotlin Programming Language (8) Kotlin For Mobile Android (1) Linux Download (2) Marketing (5) Mobile (3) Mobile Courses (4) Mobile Marketing (4) MoneyGram (1) News (721) Node.js (5) Open Source (1) Photoshop (1) Protect Computer (1) Python (33) Python BeautifulSoup (1) Python For Data Science (2) Python-Books (6) Python-DVD-Training (1) Python-Exercises (140) Python-Framework (1) Python-IDE (1) Python-Modules (1) Python-pdf (2) Python-pyQt (1) Référencement (2) Script PHP (2) Security (6) SEO (1) Snipping Tool: Faq (1) Social Networks (1) Source Code (1) Statistics With SPSS (2) Surveillance Software (1) Travail à domicile (6) Tutoriels php en vidéos (2) Tutoriels-MySql (6) tutoriels-php (19) Utilitaires (1) VPS (1) Web Hosting (1) Webcam (1) Webmarketing (11) Western Union (1) Windows 10 (1) Windows 7 (4) Windows 7 Faq (2) Windows 8 (1) Windows Accessories (1) Windows Download (8) Windows Drivers (1) Windows Fonts (1) Windows Power Shell (2) Windows Registry (2) Windows Security (18) Windows Software (2) Windows Spyware (2) Windows utilities (3) Windows Virus (2) Windows Vista (3) Windows Wireless (1) Windows xp (1) Wordpress (1)
 

Sample text

Sample Text

 
Blogger Templates