The Department of Health and Human Services Sept. 18 alerted the health care sector to a critical vulnerability in ManageEngine products that allows an attacker to perform remote code execution and which a North Korean state-sponsored actor is reportedly using to target health care entities in Europe and the United States. HHS’ Health Sector Cybersecurity Coordination Center (HC3) strongly encourages organizations to apply the recommended update as soon as possible to avoid potential compromise.

“ManageEngine is a third-party strategic network technology that helps organizations monitor, manage and secure their IT infrastructure, including active directory management,” said John Riggi, AHA’s national advisor for cybersecurity and risk. “As such, a compromise of ManageEngine technology could represent a strategic cyber risk to organizations and provide broad access to the sophisticated and dangerous Lazarus hacking group. How dangerous are they? In 2018 the FBI indicted a member of the group for his involvement in the 2014 destructive cyberattack against Sony, an $81 million theft from the Society for Worldwide Interbank Financial Telecommunications, and the 2017 global WannaCry ransomware attacks that struck multiple U.S. hospitals. We must closely monitor and secure third-party network management tools present in our environments, which like the SolarWinds compromise, represent a high-value strategic target for the ‘bad guys.’ We also must continue to demand that our mission-critical third-party technology providers adhere to the principles of ‘secure by design, secure by default.’” 

For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity.

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency Dec. 11 released an update to its voluntary Cybersecurity Performance Goals, which includes measurable…
Headline
U.S. and international agencies are warning of potential cyberattacks on health care and other critical infrastructure from state-sponsored cyber actors in…
Headline
A critical, unauthenticated remote code execution vulnerability known as React2Shell has been added to the Cybersecurity and Infrastructure Security Agency’s…
Headline
The FBI has public resources available to help prevent exploitation by cybercriminals, who use artificial intelligence for deception. An infographic by the FBI…
Headline
A critical vulnerability has been identified in 7-Zip, a free software program used for archiving data, according to the National Institute of Standards and…
Headline
U.S. and international agencies Nov. 19 released a guide on mitigating potential cybercrimes from bulletproof hosting providers. A BPH provider is an internet…