SC Media October 7, 2022
Jessica Davis

A new white paper from the Department of Health and Human Services Cybersecurity Coordination Center reminds healthcare providers that some of the legitimate security tools they rely on are also commonly abused by threat actors to deploy attacks or worsen the impact of an exploit.

The resource names a number of commonly used security tools, like Cobalt Strike, PowerShell, Mimikatz, Sysinternals, Anydesk, and Brute Ratel, as examples.

“The same tools used to operate, maintain and secure healthcare systems and networks can also be turned against their own infrastructure,” HC3 warned.

HC3 is not endorsing or criticizing the legitimate tools detailed in the report, “nor is it a call for healthcare organizations to avoid them.” Rather, it’s a call for...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Cybersecurity, Govt Agencies, Health IT, Health System / Hospital, HHS, Provider, Technology
Preventing The Next Raptor Train: Why CISOs And CIOs Should Take IoT Security More Seriously
As Supply Chains Go Digital, Cybersecurity Must be Strongest Link
5 things to know about new healthcare cybersecurity bill
What DDoS Attacks Can Teach Security Leaders About AI-Powered Defense
Medical Device Cybersecurity And The Threat Of Data Breaches

Share This Article