By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
  • Home
  • OPPORTUNITIES
  • Hacking
    • CRYPTO
    • AI
  • News
    • Cars & EVs
      • networking
    • Metaverse
  • Best Products
    • VPN
  • WEALTH CREATION
    • FINANCE EVENTS
    • Banking & Finance
      • WALL STREET
    • grants
    • ECONOMY
Reading: JustIn: Hacker Stole 1 million patients Health info Using censorious GoAnywhere vulnerability
Share
ElevenPostElevenPost
Aa
  • Best Products
  • How To’s
  • News
  • Technology
  • Science
  • GAMING
Search
  • Home
  • Categories
    • GAMING
    • Business
    • How To’s
    • Helpful Articles
    • Health
    • Blockchain & Crypto
    • Technology
  • Sitemap
  • Bookmarks
Have an existing account? Sign In
Follow US
ElevenPost > Blog > Hacking > JustIn: Hacker Stole 1 million patients Health info Using censorious GoAnywhere vulnerability
Hacking

JustIn: Hacker Stole 1 million patients Health info Using censorious GoAnywhere vulnerability

Hacker Stole 1 million patients Health info Using censorious GoAnywhere vulnerability

Mubarak bk  - Author Published February 16, 2023
Last updated: 2023/02/16 at 11:34 AM
Share
people hacking a computer system
Photo by Tima Miroshnichenko on Pexels.com
SHARE

One of the biggest hospital chains in the US said hackers obtained protected health information for 1 million patients after exploiting a vulnerability in an enterprise software product called GoAnywhere.

Contents
How The hacking occursFortra declined to comment beyond what was published in Monday’s SEC filing.

How The hacking occurs

Community Health Systems of Franklin, Tennessee, said in a filing with the Securities and Exchange Commission on Monday that the attack targeted GoAnywhere MFT, a managed file transfer product Fortra licenses to large organizations. The filing said that an ongoing investigation has so far revealed that the hack likely affected 1 million individuals. The compromised data included protected health information as defined by the Health Insurance Portability and Accountability Act, as well as patients’ personal information.

Two weeks ago, journalist Brian Krebs said on Mastodon that cybersecurity firm Fortra had issued a private advisory to customers warning that the company had recently learned of a “zero-day remote code injection exploit” targeting GoAnywhere. The vulnerability has since gained the designation CVE-2023-0669. Fortra patched the vulnerability on February 7 with the release of 7.1.2.

“The attack vector of this exploit requires access to the administrative console of the application, which in most cases is accessible only from within a private company network, through VPN, or by allow-listed IP addresses (when running in cloud environments, such as Azure or AWS),” the advisory quoted by Krebs said. It went on to say hacks were possible “if your administrative interface had been publicly exposed and/or appropriate access controls cannot be applied to this interface.”

Despite Fortra saying attacks were, in most cases, possible only on a customer’s private network, the Community Health Systems filing said Fortra was the entity that “had experienced a security incident” and learned of the “Fortra breach” directly from the company.

“As a result of the security breach experienced by Fortra, Protected Health Information (“PHI”) (as defined by the Health Insurance Portability and Accountability Act (“HIPAA”)) and “Personal Information” (“PI”) of certain patients of the Company’s affiliates were exposed by Fortra’s attacker,” the filing stated.

In an email seeking clarification on precisely which company’s network was breached, Fortra officials wrote: “On January 30, 2023, we were made aware of suspicious activity within certain instances of our GoAnywhere MFTaaS solution. We immediately took multiple steps to address this, including implementing a temporary outage of this service to prevent any further unauthorized activity, notifying all customers who may have been impacted, and sharing mitigation guidance, which includes instructions to our on-prem customers about applying our recently developed patch.” The statement didn’t elaborate.

Fortra declined to comment beyond what was published in Monday’s SEC filing.

Last week, security firm Huntress reported that a breach experienced by one of its customers was the result of an exploit of a GoAnywhere vulnerability that most likely was CVE-2023-0669. The breach occurred on February 2 at roughly the same time Krebs had posted the private advisory to Mastodon.

Huntress said that the malware used in the attack was an updated version of a family known as Truebot, which is used by a threat group known as Silence. Silence, in turn, has ties to a group tracked as TA505, and TA505 has ties to a ransomware group, Clop.

“Based on observed actions and previous reporting, we can conclude with moderate confidence that the activity Huntress observed was intended to deploy ransomware, with potentially additional opportunistic exploitation of GoAnywhere MFT taking place for the same purpose,” Huntress researcher Joe Slowick wrote.

More evidence Clop is responsible came from Bleeping Computer. Last week, the publication said Clop members took responsibility for using CVE-2023-0669 to hack 130 organizations but provided no evidence to support the claim.

In an analysis, researchers with security company Rapid7 described the vulnerability as a “pre-authentication deserialization issue” with “very high” ratings for exploitability and attacker value. To exploit the vulnerability, attackers need either network-level access to GoAnywhere MFT’s administration port (by default, port 8000) or the ability to target an internal user’s browser.

Given the ease of attacks and the effective release of proof-of-concept code that exploits the critical vulnerability, organizations that use GoAnywhere should take the threat seriously. Patching is, of course, the most effective way of preventing attacks. Stop-gap measures GoAnywhere users can take in the event they can’t patch immediately are to ensure that network-level access to the administrator port is restricted to the least number of users possible and to remove browser users’ access to the vulnerable endpoint in their web.xml file.

TAGGED: 2023, Featured
SOURCES: Hacking
Mubarak bk February 16, 2023
Share this Article
Facebook Twitter Pinterest Whatsapp Whatsapp LinkedIn Tumblr Reddit VKontakte Telegram Email
Share
1 Comment 1 Comment
  • lechenie_raka_pochek_pxSi says:
    February 16, 2023 at 11:24 pm

    Если у вас или у вашего близкого человека диагностирован рак почки, то вы, возможно, рассматриваете варианты лечения в Германии. Хорошая новость заключается в том, что Германия является домом для одних из лучших медицинских учреждений в мире и предлагает различные методы лечения рака почки https://doc-muenchen.de/lechenie/onkologiya/lechenie-raka-pochek/. Рак почки можно лечить с помощью хирургии, лучевой терапии, химиотерапии и иммунотерапии. Хирургия является наиболее распространенным методом лечения и обычно включает в себя удаление опухоли из почки. Лучевая терапия использует высокоэнергетическое излучение для уничтожения раковых клеток и уменьшения размеров опухоли. Химиотерапия использует лекарства для уничтожения раковых клеток, а иммунотерапия помогает усилить естественную защиту организма от раковых клеток.
    Независимо от того, какой способ лечения вы выберете, будьте уверены, что немецкие врачи обладают высокой квалификацией и опытом в лечении рака почки.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Home
  • Best Product
  • Our Latest
  • Opinions

Eleven Post is a multi niche website that focuses on publishing articles and news ranging all the way to 11 categories/niches. From Finance, Tech and Hacking to How to live healthy lives. Now Available in more than 100 Languages, Elevenpost.com is growing rapidly in daily users and visitors.

SUBSCRIBE TO OUR NEWSLETTER

Contact US

  • Contact Us
  • Advertise with us
  • Terms and Conditions
  • Privacy Policy
  • Copyrights

Quick Link

  • Work with us
  • About Us
  • Get In Touch
  • Our Authors
  • Shop

© Eleven Post Media Ltd – All Rights Reserved 

Follow US on Socials

Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

SUBSCRIBE TO OUR NEWSLETTER

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?