HHS warns hospitals to safeguard against LockBit 2.0 ransomware

The ransomware application Lockbit 2.0 poses a significant cyberthreat to hospitals and other healthcare organizations, according to an alert issued by the HHS Office of Information Security.

In a Feb. 7 report, HHS revealed that there are “indicators of compromise associated" with LockBit 2.0 ransomware.”

“Although the LockBit 2.0 cybercrime gang claims to not attack healthcare organizations, all ransomware continues to act as a major cyberthreat against the U.S. Healthcare and Public Health (HPH) Sector. It is extremely important to both know and apply the information included in this Flash (alert),” HHS said in the notification.

The alert comes in the wake of a similar warning by the FBI published Feb. 4.

“LockBit 2.0 ransomware compromises victim networks through a variety of techniques, including, but not limited to, purchased access, unpatched vulnerabilities, insider access, and zero-day exploits,” according to the FBI alert.

HHS recommends that organizations reduce their attack surface as much as possible by taking the following steps:

  • Utilize the included indicators of compromise in your threat hunting and detection programs.
  • Use multi-factor authentication and strong passwords.
  • Establish a robust data backup program.
  • Consider signing up for CISA’s cyber hygiene services.

Around the web

Compensation for heart specialists continues to climb. What does this say about cardiology as a whole? Could private equity's rising influence bring about change? We spoke to MedAxiom CEO Jerry Blackwell, MD, MBA, a veteran cardiologist himself, to learn more.

The American College of Cardiology has shared its perspective on new CMS payment policies, highlighting revenue concerns while providing key details for cardiologists and other cardiology professionals. 

As debate simmers over how best to regulate AI, experts continue to offer guidance on where to start, how to proceed and what to emphasize. A new resource models its recommendations on what its authors call the “SETO Loop.”