Understanding Supply Chain Attacks in Healthcare – White Paper
The Domino Effect: Understanding Supply Chain Attacks in Healthcare
A Product of the Health-ISAC UCF Internship Program, spearheaded By: Taylor Porter, Gabriel Saavedra
Glean insights into the current state of supply chain risk management and its future. These insights can provide CISOs with questions to inform how their cybersecurity teams can best identify and mitigate risks in their environments.
The Domino Effect Understanding Supply Chain Attacks In Healthcare
Size : 3.6 MB Format : PDF
Executive Summary
The June 2023 cyberattack on Progress MOVEit demonstrated how threat actors can target an organization’s supply chain through third-party and partner connections to cause disruptions across multiple sectors. Other recent major cyberattacks include SolarWinds, Kaseya, NMP IconBurst, and Cyber Av3ngers Unitronics. These attacks demonstrate how threat actors with varying intents and capabilities can exploit vulnerabilities within a supply chain. By attacking a third-party entity to target an organization (or set of organizations), threat actors can circumvent a strong security infrastructure by exploiting the supply chain itself as a springboard by exploiting previously unknown vulnerabilities, or zero-days.
Examining these attacks can allow us to glean insights into the current state of supply chain risk management and its future. These insights can provide CISOs with questions to inform how their cybersecurity teams can best identify and mitigate risks in their environments. These questions can expose the range of possible attack vectors like security misconfigurations, such as leaving default passwords unchanged, or the use of open-source code in products, which can be sabotaged by threat actors. Answering these questions can also assist in maximizing an organization’s security infrastructure and understanding the security posture of a third party that may be operating a critical business function. Supply chains attacks will continue to be prevalent in critical infrastructure sectors moving forward as threat actors seek to prey on the reliance of their services. However, this can be mitigated by developing a strong security infrastructure, forward-thinking CISOs asking their teams the right questions, and promoting a culture of cyber resilience by engaging in information sharing and developing relationships with peers, partners and public sector agencies.
- Related Resources & News
- Leveraging ISO 81001-5-1 Amid Medical Device Procurement
- Mitigating risk as healthcare supply chain attacks prevail
- Enhancing Cybersecurity in Rural Hospitals
- Health-ISAC Hacking Healthcare 11-15-2024
- Cyber Incident Response: Playbook for Medical Product Makers
- Feds Warn of Godzilla Webshell Threats to Health Sector
- Trump’s Return: Impact on Health Sector Cyber, HIPAA Regs
- Health-ISAC Hacking Healthcare 11-7-2024
- Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks
- All hospitals should be concerned about cyberattacks. Here’s why