MENU

Cybercriminals target pharmaceutical organisations

April 17, 2018 • Security, Top Stories

Cybercriminals target pharmaceutical organisations

Cybercriminals target pharmaceutical organisations. (Image Source: http://www.sizedoesntmatter.com).

Kaspersky Lab’s researchers have discovered evidence of an emerging and alarming trend: more advanced cyber threat actors are turning their attention to attacks against the healthcare sector. The infamous PlugX malware has been detected in pharmaceutical organisations in Vietnam, aimed at stealing precious drug formulas and business information.

PlugX malware is a well-known remote access tool (RAT). It is usually spread via spear phishing and has previously been detected in targeted attacks against the military, government and political organisations. The RAT has been used by a number of Chinese-speaking cyber threat actors, including Deep Panda, NetTraveler or Winnti. In 2013, it was discovered that the latter – responsible for attacking companies in the online gaming industry – had been using PlugX since May 2012.

PlugX RAT allows attackers to perform various malicious operations on a system without the user’s permission or authorisation, including – but not limited to – copying and modifying files, logging keystrokes, stealing passwords and capturing screenshots of user activity. PlugX, as with other RATs, is used by cybercriminals to discreetly steal and collect sensitive or profitable information for malicious purposes.

“Private and confidential healthcare data is steadily migrating from paper to digital form within medical organisations. While the security of the network infrastructure of this sector is sometimes neglected, the hunt by APTs for information on advancements in drug and equipment innovation is truly worrying. Detections of PlugX malware in pharmaceutical organisations demonstrate yet another battle that we need to fight – and win – with cybercriminals,” said Yury Namestnikov Makrushin, security researcher at Kaspersky Lab.

Other key findings for 2017 in the research include:

  • More than 60% of medical organisations had malware on their servers or computers;

  • Philippines, Venezuela and Thailand topped the list of countries with attacked devices in medical organisations.

In order to stay protected, Kaspersky Lab experts advise businesses to take the following measures:

  • Remove all nodes that process medical data from public and secure public web portals;

  • Automatically update installed software using patch management systems on all nodes, including servers.

  • Perform network segmentation: refrain from connecting expensive equipment to the main LAN of your organisation

  • Use a proven corporate-grade security solution in combination with anti-targeted attack technologies and threat intelligence, such as Kaspersky Threat Management and Defense solution. These are capable of spotting and catching advanced targeted attacks by analysing network anomalies and giving cybersecurity teams full visibility over the network and response automation

Edited by: Daniëlle Kruger
Follow IT News Africa on Twitter


Comments are closed.

« »

Read previous post:
BLV provides venture capital to early growth stage start-ups that create next generation disruptive solutions
Security a top trend for the future of IIoT

The effects of the Internet of Things (IoT) is something we experience in our everyday lives, with the proliferation of...

Close