Tagged: #social engineering
- This topic has 4 replies, 5 voices, and was last updated 1 year, 7 months ago by Saranath.
-
AuthorPosts
-
-
2022-09-18 at 9:26 pm #38147PREUT ASSAWAWORRARITParticipant
1. Provide a brief description of the story
Lehigh Valley Health Network (LVHN), a Pennsylvania-based healthcare system, has been the victim of a third-party data breach since early 2021. LVHN has business consulting services provided by Guidehouse which has been a victim of cyber-attack earlier. Breach data from LVHN included patients’ medical record number, account number(s), date(s) of service, diagnosis and procedure name, billing/payer information and provider names. After investigation, there was no unauthorized access to the system. Accellion FTA, which was used for secure file transfer for Guidehouse clients, may result in this third-party data breach. In addition, Guidehouse also provided services to Community Memorial Health System in California, which was impacted by the third-party data breach.
2. What is/are the impact of this data breach? Consequences of data breach.
The most concerned impact from this data breach is loss of patients’ privacy. Their health information was stolen from the system. Moreover, the security system employed by the third-party company was suspected to be compromised and untrusted by the hospitals.
3. How did the data breach occur?
In my opinion, there was no unauthorized access in this case study. So, the information was stolen by the authorized access. There are many possibilities leading to this data breach. First, the username and password may be stolen and used by thefts. The stealing method can be physical access to the computer, electronic access by remembering username and password, eavesdropping, or using social engineering. Second, the information was provided to the thefts by the authorized officers who was paid after completing the malicious job.
4. What should be the main cause of data breach?
The main cause of data breach should be the weak security of the system.
5. How could you prevent this data breach attack?
To prevent from this data breach, system should be accessed by more than one type of authentication factors. For example, the system should ask for one time password (OTP) which is sent to user’s cell phone after entering username and password. -
2022-09-19 at 5:42 am #38152Kawin WongthamarinParticipant
Thank you for sharing such an interesting story.
I think this is quite difficult to come up with a definitive defense method.
I believe that a good system should have proper classified information so that even if someone with low authority gets hacked or makes a mistake, the data will be leaked to a minimum. Of course, this method does not protect against attacks but it will reduce the impact if it is successfully attacked. -
2022-09-19 at 4:32 pm #38164ABDILLAH FARKHANParticipant
Thank you for sharing such a very important story.
That data breach incident indicates that there was a weakness of management that cause misuse of information.
Any activity involving the third party should be carefully carried out. Selecting the credibility, experience, and the administration of third party may become very critical aspect to prevent such related incident.
Best
-
2022-09-20 at 1:16 pm #38191Zarni Lynn KyawParticipant
Great and clear summary.
In terms of other preventive measures to avoid the attack, you mentioned about two factor authentication system, in my experience it is not an be-all end-all solution. A lot of social engineering methods can be implemented to gain OTP. So, training of all personnel who have access to the systems will be needed to make sure the system is resilient to both physical and technical attacks.
-
2022-09-24 at 5:03 pm #38317SaranathKeymaster
I think this incident emphasized the important of third party vendor involvement.
-
-
AuthorPosts
You must be logged in to reply to this topic. Login here