EDITOR’S NOTE: Edward Roche, in association with RACmonitor, is writing a series on the need for U.S. healthcare facilities to protect themselves from cybercriminals demanding ransoms for patient records. This is the fifth installment in that series and comes on the heels of a reported cyberattack Tuesday at Heritage Valley Health System, based in Sewickley, Pa.

The U.S. House of Representatives’ Committee on Energy and Commerce held a hearing last week on cybersecurity in healthcare. In addition, the U.S. Department of Homeland Security (DHS) Cybersecurity Task Force recently released a report suggesting that current guidelines are not adequate to meet the threat posed by cyberattacks.

Of particular concern is risk associated with medical devices, especially when they are connected to networks.

If your devices become infected with malware, then it may start to alter their data, leading to incorrect diagnoses. This could result in deadly consequences in many cases. Hackers could connect to a device, break in, then change its function – for example, something like a heartbeat monitor might be changed into an eavesdropping device.

In the same way that websites sometimes are obstructed and made unreachable by a firestorm of robot-generated inquiries – a “distributed denial of service,” or DDoS, attack – so too would it be possible for devices and the networks that support them to be shut down or made unusable by a sudden and uncontrolled flood of information or requests.

It also is possible that medical devices could be converted into a portal from, through which sensitive patient data could be exfiltrated out of a health provider’s information system. In this case, the login and security credentials of the device itself would be harnessed in order to gain entry into the back-end information system containing patient information. 

Sale on the Dark Web

The prices for raw patient data are not terribly high. Reports from the Identity Theft Resource Center indicate that there were 355 breaches of patient information in 2016, constituting about 15 million records. Banner Health in Phoenix, Ariz. lost 3.7 million records; Newkirk Products in New York City lost 3.3 million; 21st Century Oncology in Fort Myers, Fla. lost data on 2.2 million individuals; and such examples go on and on.

The records have a fluctuating price on the dark web: a place where illegal transactions take place behind a wall of encryption and virtual IP addresses. On a per-record basis, patient medical records go for between 24 cents and $2 per patient.

There are relatively low prices because this information represents only preliminary raw material being used for fraud. After obtaining items such as birthdates, social security numbers, driver’s license information, insurance information, and other details, then the trained criminal can begin the process of impersonating the identity of patients.

New Audits on the Way

In 2017, we will see a wave of new audits of healthcare providers. These will not come from the Recovery Audit Contractors (RACs) but instead from the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR). Evidently, the Civil Rights Act has been broadened in its scope to allow the government to audit providers, because having one’s personal information kept securely is considered to be a “civil right.” The audits are not only targeting hospitals, but also business associates. What types of punishment are available? Both civil fines and criminal penalties are being leveraged by the government to encourage good practices.

We can expect much more audit risk from cyber in the future, and we will continue to discuss these new audits in future installments of this series in RACmonitor.

Share This Article