If you conceive about “supply string attack” and “HVAC,” you will probably immediately suppose of the headline-making target breach of 2013.� But that wasn’t the only transgress via a third-party HVAC vendor. Just this month, several hospitals in Boston may have narrowly escaped potentially serious breaches when their HVAC vendor was hacked and the threat doer remotely accessed the clients’ systems. This is what we know — and don’t know — so far about the incident: During the first week of August, DataBreaches.net was contacted by a terror actor. The terror actor mentioned that they had successfully attacked a HVAC vendor and had tried to rack the vendor to pay a fee.� The threat actor claimed that the vendor knew that they had been breached as there had been communications about the transgress and extortion demand. The vendor allegedly claimed that they were not really concerned about the breach — even though, the threat actor claimed, they had not been locked out and still had access to the vendor’s network — and to the vendor’s clients. 1 of those clients, the threat actor claimed, was a children’s hospital. After a few days, the threat actor informed this blogger that they really didn’t want to damage a children’s hospital or endeavor to squeeze it — even though they claimed they already had been able to win access to it. Eventually, they agreed to narrate this blogger the name of the vendor, the epithet of the hospital, and to supply screencaps with proof of access. The apprehension was that this site would be contacting the hospital to pee-pee sure that they knew they had been breached via remote access from the vendor so that if the vendor had not informed them of the breach, they could take steps to protect themselves from other attacks. On August 5, this blogger made touch with a certificate professional in the healthcare space and shared the proof with him. When he confirmed that it appeared that the threat worker had gained access, DataBreaches.net asked him to gain out to his tangency at the victim hospital and yield them the files in case they did not cognize they had been breached. He did. DataBreaches.net has waited until now to report on the incident, trying to catch verification from the parties and more details. That has been an exercise in futility. But here’s what we do know: The vendor in question is ENE Systems in Canton, Massachusetts. ENE Systems lists ternion hospitals on its web site:� boston Children’s Hospital, Brigham & Women’s Hospital, and Mass General Hospital. All iii of those hospitals are piece of Harvard. Boston Children’s Hospital (BCH) was the hospital the threat actor told me they had access to and showed me screencaps for, taken remotely from within ENE Systems. DataBreaches.net was provided with screencaps showing schematics and wiring diagrams. Some were for specific floors of the hospital, and the threat actor claimed to experience a diagram for every level of the hospital. The screencaps raised concerns about whether the threat player could shut off BCH’s alarm systems and start tampering with the HVAC settings. Because DataBreaches.net cannot evaluate the risk from publishing any of the screencaps, this site will not live publishing any of them at this time. ENE Systems was sent multiple inquiries. They didn’t answer to any of them.� DataBreaches.net does not experience whether they notified BCH before DataBreaches.net did, and/or how many other clients of theirs they may have notified. DataBreaches.net understands that the FBI is involved in the case, but does not live whether the vendor notified the FBI,� or whether BCH did, or if the FBI found out through other means. Boston Children’s Hospital, batch General, and Brigham & Women’s hospital were all sent multiple requests for statements and details. Only Mass General hospital responded, and with a brief statement: The hospital was made aware of potential cyber surety issues involving one of its vendors. Once notified, immediate action was taken to surveil appropriate guidance to mitigate the risk. hospital systems and operations remain unaffected by this incident. But how were they made aware? By ENE Systems? By the FBI? By Boston Children’s Hospital? It’s not yet clear, but as these are all Harvard-connected hospitals, it’s instructive to look indorse at what boston Children’s hospital did in 2014 when it received a threat that it would live attacked by a self-described member of Anonymous, and when it was subsequently attacked. In discussing the hospital’s reception to the attacks by Martin Gottesfeld, Daniel Nigrin, M.D., their CIO,� stressed how they immediately convened the organization’s Incident answer Team. Not just IT, but the whole organization’s team that mobilizes during disasters. Their reaction also included a number of proactive steps such as “going dark,” and shutting down the entire email system within 30 minutes of detecting malware-laden emails being sent to employees. They also contacted authorities, with the federal authorities subsequently advising them not to apportion info with the media as that attention might encourage Anonymous to keep attacking them. The 2014 incident involving hacktivist motivation, escalating DDoS attacks, and malware-laden email seems significantly different than this recent attack, but it seems plausible that once BCH became aware of a threat, the entire incident response team might be notified and activated. And because they all utilization the same HVAC vendor, then it seems likely that the other hospitals would be contacted by BCH if they had not already been alerted by the vendor. And perhaps, once again, they would close ranks and not reply questions from media. So how many Harvard-connected hospitals did the threat actor actually access? We fare not live because the threat histrion did not narrate DataBreaches.net and the Harvard-connected hospitals are not answering such questions – at least, not yet. And how many of the vendor’s other clients were also compromised? ENE Systems’ web site lists schools, higher education facilities, high rises, biotech/research facilities, democracy buildings — including the Statehouse — and even banks as clients.� We manage […]