The FBI and Cybersecurity and Infrastructure Security Agency today recommended all organizations take action to prevent Russian state-sponsored actors from exploiting vulnerabilities in multifactor authentication (MFA) protocols and Windows print spooler. 
 
John Riggi, AHA’s national advisor for cybersecurity and risk, said, “Russian state-sponsored cyber criminals and spies are conducting ‘vulnerability chaining’ — linking multiple known vulnerabilities together to gain access to networks and data. This pattern highlights the need to ensure MFA is properly configured to detect and prohibit unknown devices from enrolling in the service, and prioritizing patching of all vulnerabilities that allow unauthorized remote access and code execution. Reports of the Russian military deploying destructive malware in Ukraine continue to add urgency to acting on all alerts related to cyber threats posed by the Russian government." 
 
For more on this or other cyber and risk issues, email Riggi at jriggi@aha.org.
 

Related News Articles

Headline
The FBI, along with the National Security Agency and other international cybersecurity agencies, this week released a joint agency advisory on cyber operations…
Headline
The FBI's Internet Crime Complaint Center released an alert May 7 warning of cyber actors exploiting vulnerabilities in end-of-life routers. Routers dated 2010…
Headline
The FBI’s Internet Criminal Complaint Center May 15 released an alert warning of a malicious text and voice messaging campaign involving impersonators…
Headline
In his latest AHA Cyber Intel blog, John Riggi, AHA national advisor for cybersecurity and risk, examines the state of cyber and physical threats in 2025 as…
Headline
Health care had more cyberthreats last year than any other critical infrastructure industry, according to the FBI's 2024 Internet Crime Report released April…
Headline
The National Security Agency April 23 released a report on operational technology systems that includes recommendations for security policies and technical…