The Health Information Sharing and Analysis Center last week announced that Veeam, a software company that provides data protection, backup and disaster recovery solutions, issued a security bulletin addressing 18 flaws within its Veeam Backup and Replication software, five of them being critical. The vulnerabilities were previously exploited by a range of financially motivated cyber actors, H-ISAC said, increasing the chances of new exploitation attempts. H-ISAC urged users to update their Veeam products as soon as possible, among other recommendations. Veeam released patches addressing the flaws in the bulletin.  
 
“This criticality and potential impact of this vulnerability warrants focused attention by the sector,” said John Riggi, AHA national advisor for cybersecurity and risk. “It has been reported that this vulnerability will allow unauthenticated remote code execution, which could allow hackers access to network and data backups and the possible deployment of malicious code such as ransomware. As part of the first phase of their attacks, ransomware gangs routinely seek to locate and encrypt the backups of targeted organizations to prevent independent restoration and increase the likelihood of ransom payments. Once again, this situation demonstrates that a vast majority of the cyber risk exposure the health care sector faces originates from vulnerabilities in third-party, widely used technology, which cyber adversaries are quick to exploit for maximum effect. It is recommended that hospitals and health systems incorporate ‘secure by design and secure by demand’ principles into their technology acquisition and third-party risk management programs.” 

For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity.
 

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency Dec. 11 released an update to its voluntary Cybersecurity Performance Goals, which includes measurable…
Headline
U.S. and international agencies are warning of potential cyberattacks on health care and other critical infrastructure from state-sponsored cyber actors in…
Headline
A critical, unauthenticated remote code execution vulnerability known as React2Shell has been added to the Cybersecurity and Infrastructure Security Agency’s…
Headline
The FBI has public resources available to help prevent exploitation by cybercriminals, who use artificial intelligence for deception. An infographic by the FBI…
Headline
A critical vulnerability has been identified in 7-Zip, a free software program used for archiving data, according to the National Institute of Standards and…
Headline
U.S. and international agencies Nov. 19 released a guide on mitigating potential cybercrimes from bulletproof hosting providers. A BPH provider is an internet…