Daixin ransomware poses critical threat to healthcare, says AHA cyber chief | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


The American Hospital Association’s senior advisor for cybersecurity said the Daixin ransomware poses a significant risk to the healthcare sector. (U.S. Air Force)


Reports consistently note the rising risk to patient safety after a ransomware attack. But the most pressing variant facing healthcare is Daixin, a technologically advanced, stealthy malware variant, according to American Hospital Association’s Senior Advisor for Cybersecurity and Risk John Riggi.


Riggi spoke to sector leaders during a University of California San Francisco Stanford Center of Excellence in Regulatory Science and Innovation discussion on Tuesday, outlining the risk areas providers should be working to address into the foreseeable future.


He also had a stern warning for provider organizations still dragging their feet on implementing multi-factor authentication across the enterprise, particularly as threat actors continue to target critical infrastructure and supply chain partners in force.


“If we’re not doing MFA at this point, it would be hard to defend both civilly and regulatory the actions against you as it is a very, very basic technique at this point,” said Riggi. “The White House has implored us to implement basic cybersecurity procedures, which alone at a very low costs could prevent a significant portion of ransomware attacks.”


MFA should be at the top of the list for securing all remote access points into the organization, as the threat of ransomware and other cyberattacks continue to plague the sector and cyber insurance becomes less and less of a guarantee, he added.


The use of MFA is crucial as Daixin actors typically prey on virtual private network (VPN) servers, then move laterally across the network through Secure Shell and Remote Desktop Protocol. The group has also used privileged accounts to gain access to VMware vCenter Server ..

Support the originator by clicking the read the rest link below.