Community Health Systems (CHS), the US operator of hospital healthcare who lost 4.5 million patient records in a recent data breach, is believed to have fallen victim to the much-lamented Heartbleed vulnerability in OpenSSL encryption.
According to David Kennedy, CEO of TrustedSec and former employee of the US National Security Agency (NSA), hackers got into the patient database using the unpatched bug in equipment made by Juniper Networks.
This would make the incident the biggest data breach to exploit Heartbleed to date. CHS previously said the digital forensics work conducted by the law enforcement agencies and security specialist Mandiant, a subsidiary of FireEye, leads it to believe that the attack originated from China.
OpenSSL issued a patch in April, several days after Heartbleed was disclosed, while the data breach occurred between April and June. This would suggest that attackers used the fresh vulnerability to hit the systems that weren’t updated – something that’s bound to cause discomfort at the CHS.
Heartbleed (official designation CVE-2014-0160), was discovered by researchers from Finnish security firm Codenomicon and Neel Mehta from Google Security. It allows the attacker to obtain the encryption keys used by a website, decrypt any past and future traffic to the protected services and to impersonate those services at will.
TrustedSec says that according to its sources, Heartbleed was left unpatched in the equipment used by CHS to provide remote access to employees via Virtual Private Networks (VPNs). Attackers were able to glean user credentials from memory on a piece of Juniper hardware, which were then used to log into VPN and eventually led to the patient database.
Data stolen in the breach included names, addresses, birth dates, telephone numbers and Social Security numbers of people who received medical services from CHS in the past five years. No financial data or medical information was compromised.
“This is the first confirmed breach of its kind where the Heartbleed bug is the known initial attack vector that was used,” said TrustedSec in a statement.
“What we can learn here is that when something as large as Heartbleed occurs (rare) that we need to focus on addressing the security concerns immediately and without delay. Fixing it as soon as possible or having compensating controls in place days before could have saved this entire breach from occurring in the first place.”
What do you know about crime and punishment in the digital age? Take our quiz!
Bad news for London's FTSE? Japanese owner of British chip designer ARM reiterates that Nasdaq…
Italian company's hacking tools have been used to spy on Apple, Android smartphones in Italy…
Chip maker warns new factory in Columbus, Ohio could be delayed or scaled back, over…
How do sustainable businesses use technology to innovate? And as businesses want to connect sustainability…
Samsung rapped over the knuckles by Australian regulator because of 'misleading' Galaxy smartphone water-resistance claims…
Bereavement aid for those in mourning? Amazon's Alexa voice assistant could be programmed to sound…