HHS Warns of New Ransomware Group Attacks on Healthcare Facilities

The Clop group was active throughout 2022.

By HFT Staff
January 12, 2023

The U.S. Department of Health and Human Services (HHS) recently sent out an alert to all hospitals and other healthcare facilities about The Clop ransomware group. The group has reportedly been sending healthcare facilities ransomware-infected medical files disguised as coming from legitimate doctors, then requesting a medical appointment in hopes recipients will open and review the documents.  

The Clop was first observed in 2019 and have seen payouts of up to $500 million. The group uses a double extortion model that targets Windows systems, allowing the threat actor to encrypt and exfiltrate sensitive information. Sensitive data will be released on their dark web leak site if payment is not made. The malware was active throughout 2022 despite six of its operators getting arrested in 2021.  

These are not the only cyber criminals still targeting hospitals and other healthcare facilities. HHS recently alerted facilities regarding the Royal group, which emerged in September 2022 and appears to not have affiliates. Royal appears to be financially motivated and has exfiltrated sensitive data, leaving healthcare facilities to be seen as vulnerable. The group uses Cobalt Strike tactics to harvest credentials from healthcare networks, according to the notice. 

Not all ransomware groups have their sights set on healthcare organizations, though. HHS warned of LockBit in early 2022, despite the group claiming it does not attack healthcare organizations. But the group was linked to the recent hacking of SickKids, a major pediatric hospital in Toronto. The group apologized on behalf of the affiliate who partially disabled SickKids’ website, phone lines and corporate function lines, saying it violated the group’s rules of engagement, Techardar reported.  

"We formally apologize for the attack on si[c]kkids.ca and give back the decryptor for free. The partner who attacked this hospital violated our rules, is blocked and is no longer in our affiliate program," the group said in a screenshot posted on Twitter. 

HHS suggests healthcare facilities take these steps to reduce attack surface areas to the greatest extent possible:  

  • Use the included indicators of compromise in threat hunting and detection programs.  
  • Use multi-factor authentication and strong passwords.  
  • Establish a robust data backup program.  
  • Consider signing up for CISA’s cyber hygiene services. 



See the latest posts on our homepage Share

Topic Area: Information Technology , Security


Recent Posts
Recent Posts

California Funds Security for Reproductive Health Facilities


Grants will fund physical and digital security enhancements at healthcare facilities and practitioner offices that might be the target of violence and vandalism.

2/3/2023

Methodist Hospital Emergency Department Doubles in Size


The three-year project saw the renovation and expansion of the Methodist Hospital Emergency Department completed.

2/3/2023

UCLA Health Alerts Patients of Compromised Data


An analytics tool may have captured and transmitted health data to the third-party service providers.

2/3/2023

Healthcare Facilities Embrace Modular Construction


Healthcare facilities have leaned on modular construction for quick builds with less waste.

2/2/2023

UPMC Western Behavioral Health Opens New Facility to Increase Community Access


The new facility will expand UPMC’s behavioral health services.

2/2/2023






FREE
NEWSLETTER

News & Updates • Webcast Alerts • Building Technologies

All fields are required.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.



You Might Like