russian hackers
By Bradley Coulter / Hacking / 0 Comments

Wednesday 06 August 2014 10:00
Written by: Caroline Baldwin

A group of Russian cyber criminals attacked 500 million email addresses and stole 1.2 billion usernames and passwords.

According to US cyber security company Hold Security, the gang has the largest cache of stolen data in the history of cyber crime.

140415_0111.jpgDenys Rudyi – Fotolia

In a blog post written by Hold Security, the company said it took seven months of research to track down the data breach. The company nicknamed the Russian gang CyberVor (“vor” means “thief” in Russian).

The company claimed CyberVor hacked over 420,000 web and FTP sites to obtain over 4.5 billion records, 1.2 billion of which “appear to be unique”.

Of the 420,000 websites, the hackers didn’t target just large company websites. “Instead, they targeted every site their victims visited. With hundreds of thousands sites affected, the list includes many leaders in virtually all industries across the world, as well as a multitude of small or even personal websites,” said the blogpost.

Hold stated that the Russian hackers obtained databases of stolen credentials from other hackers on the black market. These were then used to attack e-mail providers, social media, and other websites to send spam to victims and install malicious redirections.

CyberVor also accessed data from botnet networks. Botnets allow a network of infected computers to be controlled by one system. They can track victims’ systems to identify weaknesses, which are then manipulated to steal data from websites’ databases.

Hold Security advises companies to check if websites are susceptible to SQL injection.

“It is hard to spot and it may be not on your main site but on one of your auxiliary sites instead. If your websites are vulnerable, this is not the last time you can be victimised,” said the company.

Russian blogger law

Earlier this week, Russia also came under the spotlight for implementing its controversial blogger law. The new information security law places restrictions on Russian bloggers and social media users. The law states Russian bloggers cannot be anonymous and that popular blogs must register with a regulator.

In March 2014, security experts warned that Ukraine and Russia were locked in a cyber stand-off amid diplomatic efforts to reduce political tensions between the two countries.

Ukraine accused Russia of disrupting mobile communications.

By Bradley Coulter / Hacking / 0 Comments



Approximately 1.3 million Patients have been victimized during a hacking incident in the State of Montana’s Department of Public Health and Human Services.

So far, there are no evidences that point to the stolen information being used inappropriately. Nevertheless, the state is providing identity protection insurances to possible victims. Families of deceased patients are also being notified by the state.

The breach was discovered after an independent forensic investigation that later on alerted the officials.  According to Jon Ebeit, DPHHS Officials noticed suspicious activities on May 15. What followed was the investigation conducted on May 22.

The Vice-president of cyber research at LightCyber, Eyal Firstenberg, says that, “The time gap between the initial breach and the detection, while outrageously long, is far from being a rare occurrence. In fact, once mission-driven attackers have established a stable beachhead they leverage legitimate existing network resources, like user credentials, for the next phases of the attack. They thus render traditional security controls, like AV, firewalls, and sandboxes useless. With no system in place to monitor the internal network in real-time, attackers are effectively allowed to explore, compromise, and exploit the network at their leisure.”

The attack has forced DPHHS to employ stronger preventive tools, including restoring the affected systems safely, adding more security software to protect existing sensitive information on servers, and effectively monitoring security practices. No specific detailing has been released by DPHHS regarding these expansions.

The Federal Bureau of Investigation and the Montana Attorney General have been notified by the DPHHS, despite there being no information about potential suspects.

Just some years ago, information breaches can be traced to human error; employees being careless in handling the network. Now, however, hackers have gained quite a momentum attacking the industry’s well of personal information. Health records are filled with useful information like Social Security numbers, credit card data, and addresses. In 2004, Verizon reported that 73% of healthcare breaches are results of physical theft and loss, insider misuse, and miscellaneous errors.

Michael Raggo, security evangelist at MobileIron openly expresses, “I will never say never, but the healthcare industry has seen a disproportionately low instance of cyberattacks, and rather a higher proportion of accidental data loss through well-intentioned but risky user behaviors on the device or lost devices. A major reason for a low instance of cyberattacks is because stringent HIPAA guidelines are a core part of the data security and compliance strategy of all healthcare organizations in the United States. That said, cyberattacks are increasing, as are the number of attack vectors organizations need to protect.”

The Office of Civil Rights reported 61 new breaches in mid-May. This affected more than 500 patients raising the 2014 tally to 992 victimized organizations, and 31,000 compromised patient information.

In April, another hacking occurred, this time targeting Dekalb Health’s website. Apparently, an overseas hacking group attacked the service provider operating the Indiana organization’s website. It was a case of phishing where hackers created a fraudulent page, resembling the legitimate site of the DeKalb Health Foundation. To make it more alarming, the real website was linked to the malicious fake one.

Another phishing scam in May affected Centura Health. This time, hackers targeted employees at the non-profit section of Mercy Regional Medical Center. About 1,000 patients have been notified.

It’s not wise to wait to be the next breach headline before reinforcing your security. Though monitoring your servers maybe a massive task to deal with, it is necessary if we want our clients to be at ease with whom they trust their sensitive personal information with.

Have questions about your healthcare IT security? UR Gadget Doctors is here to help. UR Gadget Doctors provides extensive coverage for healthcare agencies large and small. Please call us at (856) 787-8486 or email us at if you have any concerns about your healthcare IT security and support.