Cyber actors linked to the People’s Republic of China are targeting router firmware in government and multinational organizations, which should review all subsidiary connections and consider implementing Zero Trust models to limit a potential compromise, U.S. and Japanese agencies advised Sept. 27. 
 
“As geopolitical tensions between the U.S. and China increase, we can expect to see a corresponding increase in sophisticated supply chain attacks by the PRC,” said John Riggi, AHA’s national advisor for cybersecurity and risk. “Although these attacks do not appear to be targeting health care specifically, if these compromised routers are present within our networks, we are equally exposed to the vulnerability. Among the many remediation techniques described in the alert, it is critical to block unauthorized outbound connections, white-list authorized IP addresses and monitor logs for anomalous behavior.”
 
For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity

Headline
A joint advisory released April 23 from U.S. and international cybersecurity agencies, including the Cybersecurity and Infrastructure Security Agency, FBI,…
Headline
FBI Co-deputy Director Andrew Bailey discussed a rise in cyber and physical threats impacting health care. He discussed health care as the top critical…
Headline
Health care and public health was the top sector targeted for cyberthreats in 2025, according to the FBI’s latest annual report on internet crimes. There were…
Headline
The Cybersecurity and Infrastructure Security Agency released an alert March 27 on a vulnerability in F5 BIG-IP Access Policy Manager software that is being…
Headline
The FBI released an alert March 20 warning of a technique used by cyber actors working on behalf of the Iranian government to conduct malicious cyber activity…
Headline
The Cybersecurity and Infrastructure Security Agency March 18 released an alert urging U.S. organizations to harden their endpoint management systems following…