The AHA Feb. 26 issued a Cybersecurity Advisory highlighting updates on network connectivity issues and indicators of compromise related to the recent cyberattack on Change Healthcare. The Advisory contains information from a Feb. 26 Bulletin issued by the Health Information Sharing and Analysis Center (Health-ISAC), which the AHA works with closely. Change Healthcare, owned by UnitedHealth Group’s Optum unit, began experiencing a cybersecurity issue Feb. 21. 

“Members should prioritize this bulletin as it contains actionable indicators of compromise that should be loaded into network defenses as soon as possible,” said John Riggi, AHA’s national advisor for cybersecurity and risk. “The alert also contains network connectivity guidance based on statements provided by Change Healthcare. We must remember that Change Healthcare is a victim of a cyberattack from an apparent foreign-based cyber adversary. This attack is not only on Change Healthcare but is an attack on the entire health care sector that depends upon the availability of Change Healthcare’s services and technology. We must continue to unite as a sector in defense of our sector, because as we have seen, an attack against one of us is an attack on all of us. We appreciate the ongoing threat intelligence provided by Change Healthcare and the ongoing collaboration with the Health-ISAC and our government partners.” 

For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency Dec. 11 released an update to its voluntary Cybersecurity Performance Goals, which includes measurable…
Headline
U.S. and international agencies are warning of potential cyberattacks on health care and other critical infrastructure from state-sponsored cyber actors in…
Headline
A critical, unauthenticated remote code execution vulnerability known as React2Shell has been added to the Cybersecurity and Infrastructure Security Agency’s…
Headline
The FBI has public resources available to help prevent exploitation by cybercriminals, who use artificial intelligence for deception. An infographic by the FBI…
Headline
A critical vulnerability has been identified in 7-Zip, a free software program used for archiving data, according to the National Institute of Standards and…
Headline
U.S. and international agencies Nov. 19 released a guide on mitigating potential cybercrimes from bulletproof hosting providers. A BPH provider is an internet…