U.S. Department of Health warns of attacks against IT help desks

[ad_1]

U.S. Department of Health warns of attacks against IT help desks

Pierluigi Paganini
April 08, 2024

The U.S. Department of Health and Human Services (HHS) warns of attacks against IT help desks across the Healthcare and Public Health (HPH) sector.

The U.S. Department of Health and Human Services (HHS) reported that threat actors are carrying out attacks against IT help desks across the Healthcare and Public Health (HPH) sector.

The Health Sector Cybersecurity Coordination Center (HC3) recently observed threat actors using sophisticated social engineering tactics to target IT help desks in the health sector. The attackers aim at gaining initial access to target organizations.

The attacker contacts the target organization’s IT help desk via phone calls from an area code local and claims to be an employee in a financial role. To demonstrate its identity, the threat actor provides the required sensitive information for identity verification, including the last four digits of the target employee’s social security number (SSN) and corporate ID number, along with other demographic details. The attackers likely obtained these details from professional networking sites and via OSINT activities. The threat actor claimed that could not log in or receive MFA tokens because their phone was broken.Then the attacker tricks the IT help desk into enrolling a new device in multi-factor authentication (MFA) to gain access to corporate resources.

Upon gaining initial access to the target organization, the threat actor focuses on obtaining login credentials for payer websites, allowing them to alter ACH details for paying accounts. Then they used compromised employee email accounts to hijack payments.

“After gaining access, the threat actor specifically targeted login information related to payer websites, where they then submitted a form to make ACH changes for payer accounts. Once access has been gained to employee email accounts, they sent instructions to payment processors to divert legitimate payments to attacker-controlled U.S. bank accounts.” reads the HC3 sector alert. “The funds were then transferred to overseas accounts. During the malicious campaign, the threat actor also registered a domain with a single letter variation of the target organization and created an account impersonating the target organization’s Chief Financial Officer (CFO).”

According to the alert, in some cases, threat actors attempted to leverage AI voice impersonation techniques as part of their social engineering tactics.

A global study mentioned in the alert revealed that 25% of individuals surveyed reported experiencing or knowing someone who fell victim to an AI voice cloning scam,

The alert states that the social engineering techniques described in the report are similar to the ones employed in attacks against an organization in the hospitality and entertainment industry in September 2023. The attacks were attributed to a threat actor known as Scattered Spider (also known as UNC3944).

The attack aimed at the infection of the target infrastructure with the ALPHV (also known as BlackCat) ransomware. However, UNC3944 has yet to claim attacks against the Health sector.

The alert includes mitigations that may be implemented by healthcare organizations to block attacks against IT help desks. Below are some of the actions recommended:

  • Require callbacks to the phone number on record for the employee requesting a password reset and enrollment of a new device.
  • Monitor for any suspicious ACH changes and revalidate all users accessing payer websites.
  • Implement policies that require the employee’s supervisor to be contacted to verify these requests.
  • Train help desk staff to identify and report social engineering techniques and spear-phishing attempts and instruct them of being suspicious of and verify callers’ identification.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, IT help desks)





[ad_2]

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top