News

Intel Security releases ‘McAfee Labs Health Warning’ report

raj-samani-intel-sec
Raj Samani, Intel Security

Intel Security has released its McAfee Labs Health Warning report, which assesses the marketplace for stolen medical records; compares it with the marketplace for stolen financial services data; identifies healthcare focused cybercrime-as-a-service trends; and profiles cybercrime targeting intellectual property in the pharmaceutical and biotechnology industries.

The Intel Security research asserts that the development of the market for stolen data and related hacking skills indicate that the ‘business of cybercrime’ in the healthcare sector is growing.

“In an industry in which the personal is paramount, the loss of trust could be catastrophic to its progress and prospects for success,” said Raj Samani, CTO, Intel Security, Europe, the Middle East, and Africa. “Given the growing threat to the industry, breach costs ought to be evaluated in the Second Economy terms of time, money, and trust—where lost trust can inflict as much damage upon individuals and organisations as lost funds.”

Intel Security found that the price per record for stolen patient medical records remains lower than financial account records and retail payment account information, despite the increasingly time-sensitive, or perishable, nature of data such as credit and debit card numbers.

In recent years, Intel Security has observed the cybercriminal community extend its data theft efforts beyond financial account data to medical records. Although credit and debit card numbers can be canceled and replaced quickly, this is not the case for protected health information (PHI) that does not change. This “nonperishable” PHI could include family names, mothers’ maiden names, social security or pension numbers, payment card and insurance data, and patient address histories. But, though this dynamic has led to industry speculation that the price per medical record could soon rise to rival or even eclipse that of financial account or payment card data, Intel Security’s 2016 research did not illustrate such price-point movement.

Intel Security’s research found the average health record price point to be greater than that of basic personally identifiable information, but still less than that of personal financial account data. The per record value of financial account data ranged from $14.00 to $25.00 per record, credit and debit cards drew around $4.00 to $5.00, but medical account data earned only from $0.03 to $2.42. The findings suggest financial account data continues to be easier to monetise than personal medical data, which could require an investment that financial payment data does not require. Upon stealing a cache of medical records, it is likely cybercriminals must analyse the data, and perhaps cross-reference it with data from other sources before lucrative fraud, theft, extortion, or blackmail opportunities can be identified. Financial data, therefore, still presents a faster, more attractive return-on-investment (ROI) opportunity for cybercriminals.

“Liquidity trumps longevity in the race to monetise stolen data,” said Samani. “If I steal a million credit or debit card numbers, I can quickly sell this digital merchandise before banks and retailers discover the theft and cancel these numbers. Alternatively, a million medical records contain a rich cache of permanent PHI and personal histories, but such data requires a greater investment of time and resources to exploit and monetise it.”

Intel Security’s research also investigated the targeting of biotechnology and pharmaceutical firms for their intellectual property and business confidential information. The researchers suggest that the economic value of such information is considerably higher than the cents-per-record data Intel Security’s researchers identified within patients’ health care accounts.

Intel Security researchers found evidence that formulas for next-generation drugs, drug trial results, and other business confidential information constitutes significant value. The stores of such data at biopharmaceutical companies, their partners, and even government regulators who are involved in bringing new drugs to market have become a premium target of cybercriminals.

“Corporate espionage has gone digital along with so many other things in our world,” Samani said. “When you consider that research and development is a tremendous expense for these industries, it should be no surprise that cybercriminals are attracted to the ROI of this category of healthcare data theft.”

Intel Security also identified cybercriminals leveraging the cybercrime-as-a-service market to execute their attacks on health care organisations. Researchers found evidence of the purchase and rental of exploits and exploit kits to enable the system compromises behind health care data breaches. In one case, a relatively non–technically proficient cyber thief purchased tools to exploit a vulnerable organisation, leveraged free technical support to orchestrate his attack, and then extracted more than 1,000 medical records that the service provider said could net him about $15,564.

The researchers also observed brazen efforts by cybercriminals, through online ads and social media, to recruit into their ranks health care industry insiders with access to valuable information.

“When a well-developed community of cybercriminals targets a less prepared industry such as health care, organisations within that industry tend to play catch-up to protect against yesterday’s threats, and not those of today or tomorrow,” Samani said. “Gaining the upper hand in cybersecurity requires a rejection of conventional paradigms in favor of radical new thinking. Where health care organisations have relied on old playbooks, they must be newly unpredictable. Where they have hoarded information, industry players must become more collaborative. Where they have undervalued cyber defense overall, they must prioritise it. In the Second Economy, if you win the ‘time’ contest with attackers, you are in a position to preserve money and trust.”

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines