Commentary On VPN AD Attacks On Hospitals

Under the pressure to deliver the best patient care, a cyberattack is the last thing hospitals should have to deal with. This week, CISA issued a warning to users urging them to patch Pulse Secure VPN after the government agency observed malicious attackers targeting the systems of U.S. hospitals and government entities with ransomware using stolen Active Directory credentials.

Experts Comments

April 21, 2020
Jason Crabtree
CTO and Founder
QOMPLX
CISA’s alert describes the modern attack playbook in action: step one, exploit an unpatched application to gain a foothold in a target organization—in this case, a VPN application—then, attack authentication infrastructure to elevate access and persist inside the environment. It reminds us that good cyber hygiene is necessary, but not sufficient. Hardening critical authentication infrastructure like Active Directory is crucial for keeping a bad breach from getting worse.
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.