Targeted cyberattacks and high-end telehealth vendors as well as surveillance, report finds

• If telemedicine uses the spread of COVID-19, how to access cyberattacks and telemedicine providers, according to a report by cybersecurity company SecurityScorecard and DarkOwl.

• Security analysts sent IT staff to 148 of the most popular telemedicine applications and found that they reached 30% for the period from March to April this year, compared to the pre-COVID period from September 2019 to February 2020.

In stark contrast, the healthcare sector as a whole saw a 77% discount on warnings for IP name protection caused by malware viruses, part of phishing attempts, or other successful attacks. The same happened with telemedicine retailers losing 117%, suggesting that cybercriminals are moving away from the health network protection that other retailers support.

Infectious diseases and policy changes have led to the use of mobile phones starting in March, where patients avoid medical and hospital offices for unhealthy health problems, worries about the transmission of the virus.

As a result, according to the latest report, telephony providers have become increasingly frustrated by deliberate cyber-attacks.

SecurityScorecard and DarkOwl record a significant increase in cybersecurity for telemedicine card administrators amid infectious diseases. Analysts used the amount of money in the two months of March and April, the peak of the disease, and the rate of the level in the first six months of September 2019 to February this year to predict the rapid and massive increase in cybersecurity concerns reflect. ,

“Although some time has passed, the short two months have seen a huge increase in weaknesses. Memory indicators in previous months are there, but they will be stronger compared to what has happened this time with the app. others, such as telemedicine applications, improve the overall health of any digital system, making the attack better, ”said Alex Heid, chief operating officer.

The 30% increase in overall cybersecurity research includes a number of different attack methods, including a 65% increase in patency detection, one of the largest security rules for data protection, and also a 56% increase in patency detection. detected. Runners use the inability to work on the storage end to steal data.

Full control of remote operations has also led to security guards acting for security. The statement found a 42% and 27% increase in problems with FTP and RDP, respectively. FTP is a network that enables the transmission of information between client and server and RDP is a protocol that enables connections between different users and environments. Both were used between shifts.

The report highlights the high number behind the scenes of an interest group for cybercriminals and health information stored by retailers and telemedicine’s that grew up during the COVID-19 era. Researchers found from January to April a significant increase in unexpected hacker calls from the top 20 telemedicine companies. The biggest peak was between the second and third week of March when DarkOwl analysts recorded a 144% increase.

The report examines 1 million organizations, including more than 30,000 in the healthcare sector, from September 2019 to April 2020 to assess the risk of cybersecurity. In a beautiful environment, despite large numbers in digital healthcare delivery and for major practical challenges under COVID-19, the healthcare sector will improve its security status through 2019, going to the ninth of 18 companies, since the 10th century. From last year.

Stronger, the health care sector has improved, it has used critical precautionary measures to prevent cyber attacks. The decline in malware indicates that healthcare companies are doing more to secure end-to-end networks within them than in previous years, SecurityScorecard and DarkOwl determined.

But many health care professionals suffer during this illness which can include diagnostic data such as diagnostic tests. In late June, for example, cybercriminals used the ransomware to gain access to networks of the University of California, San Francisco, including the Centers for Disease Control and Prevention and the departments associated with the COVID-19 investigation. UCSF eventually paid the hackers $ 1.14 in bitcoin to unlock the encrypted data.