Newsflash dinsdag 14 mei 2019
Minder dan helft van Nederlanders deelt elektronisch patiëntendossier
(nu.nl)

Minder dan de helft van de volwassen Nederlandse bevolking heeft toestemming gegeven om de eigen medische gegevens via het Landelijk Schakelpunt (LSP) beschikbaar te stellen aan zorgverleners, zoals apotheken, huisartsen en ziekenhuizen, meldt het Centraal Bureau voor de Statistiek (CBS) dinsdag.

Een huisarts of apotheker kan zijn patiënt, nadat die daarvoor toestemming heeft gegeven, bij het LSP aanmelden. Vanaf dat moment kunnen andere zorgverleners inzicht krijgen in het elektronisch patiëntendossier. Mensen kunnen ook zichzelf online aanmelden.

Uit het onderzoek van het CBS blijkt dat 80 procent van de volwassen Nederlanders op de hoogte is van het bestaan van het LSP. Het koppelingsnetwerk, dat toegang geeft tot de databases, wordt beheerd door de Vereniging van Zorgaanbieders voor Zorgcommunicatie (VZVZ).

Minister trekt voorstel in dat verzekeraars medische dossiers liet inzien
(security.nl)

Minister Bruins voor Medische Zorg heeft het wetsvoorstel ingetrokken waardoor zorgverzekeraars inzage in medische dossiers konden krijgen om fraude op te sporen. Het voorstel zou ervoor zorgen dat zorgverzekeraars voor inzage geen toestemming aan de patiënt hoefden te vragen.

De Tweede Kamer was akkoord met het wetsvoorstel, maar de Eerste Kamer was tegen. Een eerdere stemming over het voorstel werd door Bruins dan ook op het laatste moment ingetrokken.

"Het lukt de minister namelijk maar niet om aan te tonen dat het zonder toestemming inzien van medische dossiers door zorgverzekeraars noodzakelijk en proportioneel is", aldus Privacy Barometer, een particulier initiatief dat zich inzet voor privacy.

Phishing outranks ransomware as top cyber-threat for 2019
(channelweb.co.uk)

UK IT decision makers regard phishing, rather than ransomware, as the biggest cyber-threat facing their organisations in 2019, according to exclusive CRN research that will be unveiled at tomorrow's CRN On event.

Research conducted for the event, which will take place at Prince Philip House in London, quizzed 156 IT decision makers from UK private and public sector organisations.

Lawrence Jones MBE to headline CRN MSP North conference
Asked about the biggest cyber-threat facing their organisation this year, some 23 per cent pinpointed phishing.

Incoming! Swiss CERT warns ransomware fiends are targeting local SMEs
(portswigger.net)

Swiss government agencies have warned over “severe” ransomware attacks targeting small businesses.

Internet-facing Remote Desktop Protocol (RDP) and Citrix servers with weak login credentials are under attack, the Swiss Computer Emergency Response Team (CERT) warns, adding that booby-trapped websites and email spam have also become a vector in ongoing assaults.

If intended targets either click on links or open infected attachments from an unpatched PC then they are likely to find themselves infected by a first-stage trojan, typically Emotet.

Security Think Tank: Is it true you can't manage what you don't measure?
(computerweekly.com)

What you don’t measure you cannot manage – or can you? Is this a controversial view? It has undoubtedly been branded untrue in the past.

I’m not sure there is a title “True Leader” as they come in all “shapes and sizes” and probably fit into the commonly defined categories such as “autocratic”, “democratic” and “laissez-faire”. In standard business practices, true leaders lead teams and companies by instinct and are influenced by previous experiences (both good and bad).

I wonder how risk-averse they really are, or do they rely on gut instinct where they feel comfortable because they have made decisions based on intuition successfully on many occasions. Is there a parallel to betting on red continually until the ball drops onto a black number?

Cisco patches IOS XE remote command injection flaw
(itnews.com.au)

Cisco has released patches for products that are vulnerable to a remotely exploitable command injection flaw. The vulnerability has been given the Common Exposures and Vulnerabilities index of CVE-2019-1649, and was discovered by security researchers Red Balloon.

It affects the Linux-based Cisco IOS XE operating system version 16.x, and allows remote command injection with root superuser privileges via the web user interface in the software.

An attacker would have to be authenticated as administrator on the target system, however, to take advantage of the vulnerability.

Thrangrycat flaw lets attackers plant persistent backdoors on Cisco gear
(zdnet.com)

A vulnerability disclosed today allows hackers to plant persistent backdoors on Cisco gear, even over the Internet, with no physical access to vulnerable devices.

Named Thrangrycat, the vulnerability impacts the Trust Anchor module (TAm), a proprietary hardware security chip part of Cisco gear since 2013.

This module is the Intel SGX equivalent for Cisco devices. The TAm runs from an external, hardware-isolated component that cryptographically verifies that the bootloader that loads and executes on Cisco gear is authentic.

Korean APT Adds Rare Bluetooth Device-Harvester Tool
(darkreading.com)

ScarCruft, an advanced persistent threat group known for attacking organizations with links to the Korean peninsula, has become more dangerous.

An analysis of recent data associated with the group shows that it has acquired new tools and is testing new exploits in preparation for future campaigns, Kaspersky Lab said Monday.

Telemetry associated with ScarCruft shows that the threat actor has also developed an interest in attacking mobile devices and has increasingly begun adapting legitimate tools and services in its espionage campaigns.

5 Most Vulnerable Industries for Data Breaches in 2018
(hackernoon.com)

In February 2018, the Under Armour hack turned out to be one of the biggest data breaches in history, affecting over 150,000,000 users. The sheer number of victims made it, at the time, a record-breaking data theft, but what’s really disturbing about this incident?

The type of private data was compromised as a result of that breach: private fitness records that include user’s health, performance, and location. It seems that the famous expression “information wants to be free” is taken by hackers too literally.

It’s hard to imagine that hacking a personal fitness company would make it into the hall of fame. But even if a user’s heart rate becomes vulnerable to a data breach, what about the more serious personal information that clients provide to various organizations?

How Can Health Care Innovate With Cybersecurity in Mind?
(govtech.com)

What does great customer service look like in the health-care industry? How is technology reshaping patient outcomes for the better? Where is secure innovation in health care going next?

There are many answers to these question, but perhaps the best response is to point to leaders and organizations that are recognized by their peers as top models to follow – right now.

I know of no one better to address these questions than Patrick (Pat) Hale, who is the executive vice president and CIO at VITAS Healthcare in Miami.

Most health IT-related safety events aren't ever resolved, study finds
(beckershospitalreview.com)

Researchers from MedStar Health's National Center for Human Factors in Healthcare analyzed a database of more than 1.7 million patient safety event reports. Of those related to health IT, 64 percent listed no resolution at all.

More than half of those that did suggest a solution proposed further education or training, despite what the researchers describe as "the recognized limitations of training and education in resolving these events." Furthermore, only 6 percent of the reports included more than one suggested resolution.

In conclusion, according to the study, "Ensuring health information technology-related events are resolved and incorporate effective solutions should be a continued focus area for healthcare systems."

American Medical Collection Agency breach impacted 200,000 patients – Gemini Advisory
(databreaches.net)

A data breach involving a medical collection agency affected more than 200,000 patients who had used the firm’s online payment portal between September, 2018 and the beginning of March, 2019.

At the end of February, Gemini Advisory analysts identified a Card Not Present (CNP) database that had been posted for sale in a dark web market.

The offering had been described as “USA|DOB|SSN,” and because CNP data is rarely sold with associated date of birth and Social Security numbers, their analysts suspected a compromise in an online portal that would collect these types of data as part of a transaction.

Independent Health mistakenly emailed information on 7,600 members
(bizjournals.com)

Protected health information on more than 7,600 Independent Health members was accidentally emailed to a member in March, a breach that violates federal privacy laws.

The Amherst-based health plan told members that an employee inadvertently emailed documents containing their information on March 19 to an unauthorized recipient who happened to be an Independent Health member.

Within an hour of the receiving the email, the recipient notified Independent Health and confirmed to the plan the email had been deleted, said Frank Sava, spokesman for the company.

Over 10 million people hit in single Australian data breach: OAIC
(zdnet.com)

The latest quarterly data breach report from the Office of the Australian Information Commissioner (OAIC) has revealed over 10 million individuals had their information compromised in one single incident. The current population of Australia is around 25.4 million.

The breach was disclosed to the OAIC under the Notifiable Data Breaches (NDB) scheme between January 1, 2019, and March 31, 2019 and reported in its Quarterly Statistics Report [PDF].

While the report did not detail the origin of the breach that affected over 10 million individuals, it did show that the most number of affected individuals from a single finance-related breach was less than 500,000 and the health sector's three heaviest impacting breaches affected less than 5,000 individuals each.

Poorly Configured Server Exposes Most Panama Citizens' Data
(darkreading.com)

Compromised information includes full names, birth dates, national ID numbers, medical insurance numbers, and other personal data.

An unprotected Elasticsearch server was found publicly exposing personally identifiable information belonging to nearly 90% of Panama citizens, a security researcher found last week.

Bob Diachenko, cyber threat intelligence director at Security Discovery, found the data sitting in a server, where it was publicly available and visible in any browser. The database held 3.4 million records containing detailed information on Panamanian citizens, labeled "patients," as well as 468,086 records labeled "test-patient." He reports the exposed information appears to be valid.

The lurking danger of hacked email reply chains
(helpnetsecurity.com)

Although phishing has been around in various forms since the 1990s, recent news has shown that it continues to evolve – and remains a major threat. These days, phishing tactics are so sophisticated it can be difficult to spot a scam – particularly in the case of hijacked email reply chains.

This approach sees a cybercriminal gain access to a colleague or supplier’s email. The criminal jumps into a legitimate email conversation adding a fake message pushing malware.

What factors create trust?
Believability is the key difference between a regular phishing attack and a hijacked email chain. The criminals behind these campaigns take their time breaking into email accounts, watching business conversations, negotiations, and transactions.

It's 2019 and a WhatsApp call can hack a phone: Zero-day exploit infects mobes with spyware
(theregister.co.uk)

A security flaw in WhatsApp can be, and has been, exploited to inject spyware into victims' smartphones: all a snoop needs to do is make a booby-trapped voice call to a target's number, and they're in. The victim doesn't need to do a thing other than leave their phone on.

The Facebook-owned software suffers from a classic buffer overflow weakness. This means a successful hacker can hijack the application to run malicious code that pores over encrypted chats, eavesdrops on calls, turns on the microphone and camera, accesses photos, contacts, and other information on a handheld, and potentially further compromises the device. Call logs can be altered, too, to hide the method of infection.

To pull this off this intrusion, the attacker has to carefully manipulate packets of data sent during the process of starting a voice call with a victim; when these packets are received by the target's smartphone, an internal buffer within WhatsApp is forced to overflow, overwriting other parts of the app's memory and leading to the snoop commandeering the chat application.

Thomas the wank engine: London rail passengers played pr0n grunts over PA system
(theregister.co.uk)

Commuters on London's Wandsworth-Clapham service last Friday morning had yet another reason to awkwardly avoid each others' gazes as grunts and groans from what sounded like a pornographic film oozed out of the train's Tannoy system.

Passenger Paul Brunton did what any self-respecting citizen would and uploaded footage of his journey to Twitter as the driver could be heard applying the handbrake a little too hard.

"Is that coming from the driver?" a fellow traveller can be heard asking. At least they wouldn't need to be relieved at the end of their shift.

Space stunner: Moon is shrinking, shocking study reveals
(foxnews.com)

According to a new research study, the Moon may be shrinking as it experiences lunar quakes, known as "moonquakes." Researchers analyzed 28 moonquakes from 1969 to 1977 and came up with the startling observation that eight of the quakes came from "true tectonic activity — the movement of crustal plates," as opposed to impacts from asteroids or rumblings inside the celestial satellite.

“We found that a number of the quakes recorded in the Apollo data happened very close to the faults seen in the [NASA’s Apollo and Lunar Reconnaissance Orbiter missions] LRO imagery,” Nicholas Schmerr, an assistant professor of geology at the University of Maryland, said in a statement.

“It’s quite likely that the faults are still active today. You don’t often get to see active tectonics anywhere but Earth, so it’s very exciting to think these faults may still be producing moonquakes.”