Feeds

'Chinese crims' snatch 4.5 MILLION patient files from US hospitals

Don't worry, says Community Health Systems, we're insured

Secure remote control for conventional and virtual desktops

One of the largest healthcare providers in the US claims Chinese hackers ran riot through its systems between April and June this year – accessing names, addresses and social security numbers of millions of patients.

But Community Health Systems (CHS) insists no medical records nor any financial data were grabbed by the miscreants. The biz oversees 206 hospitals in 29 states across America.

"Unfortunately, we have joined numerous American companies and institutions who have been victimized by highly sophisticated, criminal cyber-attacks originating out of China," CHS spokesperson Tomi Galin told The Register in a statement today.

"We worked quickly to identify and eradicate the intruder and we are also working closely with federal law enforcement authorities as they pursue the criminals responsible. While we did have security measures in place to protect our computer network and electronically stored information, this attacker used very sophisticated methods to bypass security systems.

"Importantly, no patient medical or financial information was transferred as a result of this intrusion. The company carries cyber and privacy liability insurance. We do not believe this incident will have a material adverse effect on our business or financial results."

According to an 8K filing [PDF] to US financial watchdog the Securities and Exchange Commission, the attackers were trying to get hold of medical device and equipment development data, but were prevented from grabbing it by the security systems the Fortune 500 company had in place.

What the hackers did get hold of was 4.5 million records detailing the names, addresses, birth dates, telephone numbers and social security numbers of patients who have used the hospital chain during the past five years. According to the filed paperwork:

The company and its forensic expert, Mandiant (a FireEye Company), believe the attacker was an “Advanced Persistent Threat” group originating from China who used highly sophisticated malware and technology to attack the company’s systems. The attacker was able to bypass the company’s security measures and successfully copy and transfer certain data outside the company.

All affected citizens are now being contacted, the hospital group said, and identity theft protection will be offered to those who are targeted from the data swiped from its servers. Since the hospital is insured against such attacks, the financial effects should be minimal, the 8K filing states, but that hasn't impressed some in the security industry.

"The unfortunate reality is that most (but not all) of the healthcare providers have little concern for nor have they invested in IT security. There is no incentive for them to invest, nor is there any material consequence of their failure to protect their infrastructure," said Philip Lieberman, president of password and identity management biz Lieberman Software.

"The funny postscript to this article is that Community Health's stock was up 48 cents at $51.48 in late-morning trading on the New York Stock Exchange, which could be translated to say that a data breach is good for the shareholders. That is how sick IT security is at health care providers."

Last year the Office of National Counterintelligence warned Congress that Chinese hackers and other miscreants are targeting American healthcare companies to get intellectual property pertaining to new drugs and medical equipment. It now appears those warnings were more accurate than first thought. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.