Heartbleed bug linked to US hospital group hack

IT security

Heartbleed bug linked to US hospital group hack

Warwick Ashford

The cyber breach at US hospital group Community Health Systems that exposed 4.5 million patient records exploited the Heartbleed OpenSSL encryption vulnerability, a security firm has claimed.

Community Health Systems, which runs 206 hospitals in 29 states, said intruders had bypassed security measures to steal personal data of patients, including names, social security numbers and addresses.

140807_cs0893.jpg

But the company emphasised that no medical records or credit card records are believed to have been accessed.

This is the first time Heartbleed has been linked to a cyber attack of this size and type, prompting renewed calls for businesses to check open-source components of the software they use.  

Until now, attacks on the UK's parenting website Mumsnet and the Canada Revenue Agency were the biggest reported intrusions linked to exploitation of the Heartbleed bug.

Heartbleed was exposed when Google and Finnish security firm Codenomicon reported vulnerabilities in some versions of OpenSSL.

The open-source cryptographic library is widely used to encrypt sensitive data in operating systems, email, instant messaging apps and other software products.

Security firm Mandiant, owned by FireEye, was called in by Community Health Systems to investigate the breach, and initially linked the attack to a Chinese hacking group.

But another security firm, TrustedSec, has claimed in a blog post that the attack exploited the Heartbleed OpenSSL vulnerability to get a foothold on the hospital group’s network.

The blog post cited an anonymous source close to the breach investigation, and in an interview with Bloomberg, founder David Kennedy said he was told of the connection by three unnamed sources.

He said the hackers took advantage of the fact that the hospital group used products made by networking firm Juniper.

In April, a pair of Juniper advisories listed various products as vulnerable, including those based on Junos OS 13.3R1 and the Odyssey client 5.6r5 and later.

Like many of its competitors, Juniper took several weeks after the Heartbleed bug was discovered to patch all of its affected products.

“The time between 0-day (the day Heartbleed was released) and patch day (when Juniper issued its patch) is the most critical time for an organisation where monitoring and detection become essential elements of its security program,” the TrustedSec blog post said.

According to the security firm, the ability to detect and respond to an attack when it happens is key to enacting incident response and mitigating the threat quickly.

“What we can learn here is that when something as large as Heartbleed occurs (rare) that we need to focus on addressing the security concerns immediately and without delay,” said TrustedSec. “Fixing it as soon as possible or having compensating controls in place days before could have saved this entire breach from occurring in the first place.” 

According to Mandiant, the intrusion at Community Health Systems was initiated in April, the same month that news of the Heartbleed bug became public.

Chris Wysopal, co-founder and CTO of application security company Veracode, said technology suppliers need a way to understand quickly where they have built products with open-source components. 

“All products should use software composition analysis with an alerting mechanism for rapid response when a new vulnerability is made public in an open-source component,” he said.

Wysopal said linking software component analysis tools with static application security testing systems will enable vulnerable components in previously scanned code to be located instantly.

Since news of Heartbleed became public, several security researchers have warned that the OpenSSL vulnerability persists in hundreds of thousands of servers because of an inconsistent response by suppliers.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy