CynergisTek was recognized in the 2016 KLAS Security Advisory Services report for having the
highest overall client satisfaction, performance and impact on security preparedness in healthcare.
CynergisTek won the 2017 Best in KLAS Award for Cyber
Security Advisory Services
Hollywood’s Hype and Harsh Reality of a Ransomware Attack
Dave DillehuntVice President & CIO
FirstHealth of the Carolinas
Clyde HewittVice President, Security Strategy
CynergisTek
Agenda
• Hollywood’s Hype
• The attack
• The impacts
• The recovery
• The cleanup
• The post mortem
• Lessons learned
2
Hollywood’s Hype
3
4
Prologue
5
Prologue
• The focus of this presentation will be the attack on one multi-hospital health system
however
• There will be a comparison of other attacks as well as estimates of impacts and predictions of future trends
6
Setup
• FirstHealth of the Carolinas is an integrated delivery network, based in Pinehurst, NC, and serving a 15 county region
Four hospitals (600 Beds)
100 Ambulatory physician practices/locations
Implemented Epic enterprise-wide on 7/1/17
• Implemented several security tools
• Dedicated IT security staff consisting of:CISO/Supervisor
Network Security – 3 Engineers/Analysts
Information Security - 3 Engineers/Analysts (includes Surveillance)
7
The Attack
8
The Attack
• The entry point - a user workstation New variant of the WannaCry virus, coupled with the (NSA created) double pulsar virus
• The malware spread quickly, laterally, across the workstation environment10/17 at 12:30 pm – Received malware alert notificationso Network (FireEye and Cisco AMP)
o End User (FireAmp and TrendMicro)
• Attack identified by SIEM and AV based on abnormal network trafficNetwork connections to server farm and data farm were severed within 15 minutesNo automated quarantine possible - no “Zero Day” malware definition filesNot limited to traditional IT workstationso 30 PCs, 30 Laptops, over 1,000 thin clients, and potentially a few servers ( approx. 1,100 devices)
• Data was never accessed, and “ransomware” never actually executed
9
The Response
10
The Response
• Communicated with Administration, Network Vendor, AV vendor, Security Consultants, and the FBI
• Pulled team together to assess situation and begin to plan next steps
• Misjudged the scope – failed to initiate incident command center
• Realized magnitude – requested help from Vendors and Peer Organizations
• AV Vendor developed new definition file
• Meanwhile – over 100 locations put on total downtime – paper
11
The Response
• Developed plan to wipe all infected and potentially infected devices
• Developed plan to isolate/filter all network connections, individually
• Created teams working two 12-hour shifts to re-image devices, apply missing patches, add two AV solutions, test, scan, monitor, and re-establish full network access (device by device)
Communications issues – misunderstandings, inaccurate maps, changes in approach/process – caused a lot of rework
Insufficient large capacity USB (thumb) drives
Temporary “admin” ID/PW to other staff
Night shift prepared maps and documentation/lists for day shift staff
12
The Impact
13
Impact on Operations
• Two full weeks of downtime – enterprise-wide
• Opened Incident Command Center – 24/7
• Paper processing for nearly everything
• Younger staff was often clueless – “Thank God for older nurses!”
• Needed many “runners” to go everywhere (pick up lab orders, etc.)
• Confusion and inconsistency re: backloading of data/charges
• “Downtime Boxes” were designed for 2-3 daysRan out of forms and prescription padsUsed print shop for what we couldOld versions of paper order sets
14
Impact on Operations
• Phones initially impacted (on the same network)Lost ACD/Menu functionality for several days
• OR Schedule reviewed for “elective” or “postpone-able” proceduresNo PACS availability – Access to images a challenge
• BCA Devices – lost nearly all value after a couple of days
• IT had to focus on Payroll and Materials MgtYou have to pay your staff and order your supplies
• EMR was never actually infected – but limited workstation access made it virtually unusable
Focused on a few workstations in order to maintain up to date census
15
Impact on IT
• Staff burn-out, mistakes, stress, irritability
• Forced a few “stay home” days for some staff
• Stress/Worry that any negative patient outcome would be our fault
• Stress/Worry about missing something criticalAccess to servers/databases with critical cancer regimen data
Access to old clinical data/images
Access to allergy data, etc.
• “Remediation Services” not what was expectedRequired obtaining extra staff from peer organizations and temp agencies
16
The Recovery
17
The Recovery
• 14 days of paper orders, charges, results, etc.
• 4+ months of matching patients with orders, charges, and results in the system
• Additional expense of $250K - $500K (overtime, special services, remediation assistance) not counting new security hardware or software
• No claims processing for 60+ days – No incoming cash flow
• Revenue reduction (lost revenue) of $2 million
• No progress on IT projects for several months
18
The Cleanup
19
The Cleanup
• Took a solid four months of enterprise-wide effort, but…
• It is still happening six months post event
• Confusion and inconsistency of cleanup process Some departments and clinics entered their own backload of dataOthers had ancillary departments enter their orders/chargesStill a few others did nothing, causing frustration and delayso “Lab gets the revenue, they should do the work”o “Who has the paperwork now?”o “Our staff doesn’t want the extra overtime or weekend work”o “We didn’t cause this, why should we have to fix it?”
• We still occasionally find a missing charge, order, or result
20
The Post Mortem
21
The Post Mortem
• Some devices deployed in a rush for “go-live” bypassed key work flow processes (some missed AV install or critical patches)
• A few servers were not fully patched (some unable to be patched, some scheduled, but not completed prior to the attack)
• Flaw in Microsoft SCCMJust because you push out a patch doesn’t mean it processed successfully
We now do routine scans to ensure all patches are in place
• Old, un-patchable systems removed from the network
• IT Security likely understaffed, and needs more tools
22
The Post POST Mortem
• Need to plan for more network (micro) segmentation
• Need to move telecom to a separate network
• Need to do more active scanning
• Need for more security training (IT and all Staff)
• Need to investigate segmenting imaging
• Need to improve overall change management processes
• Need to open command center within 24 hours of incident
23
The POST POST Mortem
• Need to reconsider “downtime” box contents, plan for longer outage
• Need to test all BCA devices and off-line printing capabilities
• Need to add more BCA devices, and downtime computer workstations
• Leadership, Department, and Physician contact lists were a) out of date, and b) hard to find (when network is down)
• Need to quickly establish mini-registration/census location(s) and distribute information often
• Need better access to standardized forms
• Need better access to paper-based order sets
• Need a formal plan for who will do what (backloading of orders, charges, results) and other scanning
24
Lessons Learned
25
Comparing Other Ransomware Events
• WHO?Small 200 bed hospital & Cloud hosted EHR
• OUTCOME?Correlation between attack success & security maturity
• LESSONS LEARNEDThe “minimum” level of security is never good enough
The threats are constantly improving – so should controls
26
Performing a Root Cause Analysis (RCA)
• Perform a RCA to determine why the event occurredUse the opportunity to conduct a thorough gap assessment and update the risk analysis
• Develop an action plan to remediate all risks, especially closing the gaps that allowed the event to happen
Bad example: Colorado DOT https://www.denverpost.com/2018/03/01/cdot-samsam-ransomware-attack/
• Rule of Thumb: If the RCA doesn’t end by documenting a management action, you are not done digging
27
Post Recovery: HIPAA Required Actions
• 45 CFR §164.308(a)(1)(ii)(D) Information system activity review (Required). Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports
• 45 CFR §164.308(a)(6)(ii)Implementation specification: Response and Reporting (Required). Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity; and document security incidents and their outcomes.
28
LoProCo
• If you determine the Ransomware is not a reportable breach, you must document the LoProCo and keep it for six years.
It was a key document requested by OCR during their audits
• Key elements of the HIPAA Breach AnalysisThorough discussion of the event, then:o The nature and extent of the protected health information involved, including the types
of identifiers and the likelihood of re- identification; o The unauthorized person who used the protected health information or to whom the
disclosure was made; o Whether the protected health information was actually acquired or viewed; and, o The extent to which the risk to the protected health information has been mitigated.
Recommendation based on the evidence.
29
The Adverse Impacts Last A Long Time
• The financial recovery following a ransomware event takes a minimum of six months, and even then, the unrecoverable costs are measurable in the millions. A Ransomware Post Mortem, Clyde Hewitt, Health Management Technology, March-April 2018
• 25% of patients have changed their provider following a data breach Accenture, 2017 Consumer Survey on Cybersecurity and Digital Trust.
• U.S. organizations that paid the ransoms were targeted and attacked again with ransomware 73 percent of the time. Business Wire March 27, 2018
• Forty five percent of U.S. companies hit with a ransomware attack last year paid at least one ransom; but only 26 percent of these companies had their files unlocked. Business Wire March 27, 2018
30
Action Plan
1. Perform a comprehensive gap assessment & risk analysis
2. Implement a security management policy and procedures
3. Remediate the highest risk
4. Go to step one
31
The Problem Is Not Going Away
32
Why Incident Response Matters
33
We Are a TargetHealthcare is a target and attackers are increasingly focusing on healthcare for information and data.
All SidesAttacks are coming at healthcare organizations from all sides and more attackers are jumping on the bandwagon.
PreparationPreparing for breaches, ensuring that the right people know what to do and that everyone is in the know.
Breaches WILL HappenEventually, every organization will have an incident. Odds are that this will lead to a breach too. Be ready.
DefenseDefense alone is a losing battle. We have to be proactive, expect intruders and attacks and be prepared to go on the offense.
Healthcare is a Target
Cybercrime damage costs will hit $6 trillion annually by 2021. – Cybersecurity Ventures
Employee negligence was the root cause for 81 percent of healthcare cybersecurity incidents. - CSO Online
The healthcare industry was the victim of 88 percent of all ransomware attacks in U.S. industries in 2016. – Becker’s Hospital Review
70 percent of businesses that experienced a ransomware attack paid to have their stolen data returned –IBM Survey
34
Attacks Come From All Sides
More than 4,000 ransomware attacks occurred every day in 2016. - Computer Crime and Intellectual Property Section (CCIPS)
The estimated cost for cybercriminals to infect 1,000 vulnerable computers in 2016 with Malvertisementswas only $5. - 2017 Trustwave Global Security Report
IT security practitioners are nearly split - 51% to 49% - over who poses the greatest threat: external adversaries versus trusted insiders. - 2017 Security Pressures Report
The amount of phishing emails containing a form of ransomware grew to 97.25% during Q3 2016, up from 92% in Q1 2016 - PhishMe 2016 Q3 Malware Review
35
Defense Alone is Not Enough
99.7% of web application scanning services tested in 2016 included at least one vulnerability. - 2017 Trustwave Global Security Report
78% of people claim to be aware of the risks of unknown links in emails. And yet they click anyway. - Friedrich-Alexander University (FAU)
19% of organizations have not conducted security testing in the past six months. -Security Testing Practices and Priorities: An Osterman Research Survey Report
36
Breaches Will Happen
65% of respondents feel pressure to roll out IT projects before they undergo the necessary security checks and repairs. - 2017 Security Pressures Report
52% of organizations that suffered successful cyber attacks in 2016 aren't making any changes to their security in 2017 - Barkly, December 2016, Security Confidence Headed Into 2017
59% of organizations have experienced a malware infiltration in the past six months. - Security Testing Practices and Priorities: An Osterman Research Survey Report
30% of organizations experienced a successful ransomware attack over the past year. - Best Practices For Dealing With Phishing and Ransomware
37
Incident Response is Preparation
The median number of days from an intrusion to containment of a breach was 62 days in 2016, virtually equal to 2015. – 2017 Trustwave Global Security Report
The healthcare industry invests less than 6% of its budget to cybersecurity. – Security Scorecard
In the past two years, an estimated 89% of healthcare organizations were breached. – Ponemon Institute
38
We Are Not Good At Managing Security
• “More people are killed every year by pigs than by sharks, which shows you how good we are at evaluating risk.”Schneier, Bruce. Interview with Doug Kaye. IT Conversations: Bruce Scheier. 2004-04-16.
39
40
Thank You!
Questions?
Clyde HewittVP of Security Strategy
CynergisTek
Dave DillehuntVP & CIO
FirstHealth of the Carolinas
Top Related