Cyber actors linked to the People’s Republic of China are targeting router firmware in government and multinational organizations, which should review all subsidiary connections and consider implementing Zero Trust models to limit a potential compromise, U.S. and Japanese agencies advised Sept. 27. 
 
“As geopolitical tensions between the U.S. and China increase, we can expect to see a corresponding increase in sophisticated supply chain attacks by the PRC,” said John Riggi, AHA’s national advisor for cybersecurity and risk. “Although these attacks do not appear to be targeting health care specifically, if these compromised routers are present within our networks, we are equally exposed to the vulnerability. Among the many remediation techniques described in the alert, it is critical to block unauthorized outbound connections, white-list authorized IP addresses and monitor logs for anomalous behavior.”
 
For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity

Related News Articles

Headline
The FBI has public resources available to help prevent exploitation by cybercriminals, who use artificial intelligence for deception. An infographic by the FBI…
Headline
A critical vulnerability has been identified in 7-Zip, a free software program used for archiving data, according to the National Institute of Standards and…
Headline
U.S. and international agencies Nov. 19 released a guide on mitigating potential cybercrimes from bulletproof hosting providers. A BPH provider is an internet…
Headline
A joint advisory issued yesterday by U.S. and international agencies provides updated guidance to defend against the Akira ransomware group, which…
Headline
The National Security Agency, Cybersecurity and Infrastructure Security Agency and international partners released joint guidance Oct. 30 on best practices for…
Headline
Microsoft has released a security update to address a critical remote code execution vulnerability impacting multiple versions of Windows Server Update…