• Our Partners
  • CarePolicy
  • HomeCareConsulting
  • Digit9X
  • Home
  • Assisted Living
  • Elderly
  • Home Care Agency
  • Home Care Worker
  • Home Nursing
Menu
  • Home
  • Assisted Living
  • Elderly
  • Home Care Agency
  • Home Care Worker
  • Home Nursing
Home » Cyfirma flag promotes ransomware risk in the health sector led by US for-profit companies
Elderly

Cyfirma flag promotes ransomware risk in the health sector led by US for-profit companies

adminBy adminJune 16, 2025No Comments6 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Cyfirma has released its latest industry report, highlighting the cybersecurity threats facing the global healthcare sector. Over the past 90 days, the company has identified 130 confirmed ransomware attacks, targeted the healthcare sector, placing the sixth targeted healthcare of 14 tracking sectors, accounting for 8.1% of 1,605 casualties across the industry. Pharmas and biotechnology, hospitals and clinics are the most frequent victims of ransomware in the industry, and primary and senior care are also frequently included.

Ransomware attacks in the healthcare sector are dominated by the US for-profit segment, with 70 of the 130 US-based victims based in the US, accounting for 54% of all cases. Australia and Canada each reported five casualties, while Italy and the UK each followed four. Despite the concentration in the US, geographical spread remains wide, with healthcare victims recorded in 33 countries in the past 90 days rising from the past 26.

This report provides original insights and data collateral analysis based on the company's unique threat telemetry, highlighting ransomware activity, phishing campaigns, and broader attack trends over the past three months. Packaged in visual infographic format, the report is part of a weekly series exploring one industry per quarter, aiming to arm organizations with timely sector-specific intelligence.

“In the last three months, Cyfirma Telemetry has identified 2,789 references from the healthcare industry out of a total of 57,633 industry references, from a total of 300K+ posts across various underground and dark web channels and forums.” In the same period, “The healthcare industry has not been significantly affected by advanced persistent threat (APT) campaigns. The healthcare industry is currently not a frequent goal for APT (advanced persistent threat) actors due to its relatively low strategic value in the state-sponsored cyber operations context.”

Also, unlike sectors such as defense, energy, and finance that hold sensitive geopolitical, economic, or technical data, healthcare organizations typically manage data with limited information or national security utilities. “Another factor is operational risk. Targeting the targets of health systems, particularly hospitals, can have reputational or diplomatic consequences, especially when life is at risk. Meanwhile, financially motivated actors like ransomware groups continue to exploit healthcare for fear tor. The focus around most APT campaigns.”

Monthly activities fluctuated over the past 180 days at elevation in March and February. The monthly breakdown of Cyfirma ransomware activities highlights what gangs have been consistently active and sporadically manifested. Qilin and Incransom maintained stable operation for three months, while groups like Everest surfaced only for a short time, recording victims in a month. Of the 76 tracked ransomware groups, they targeted 38 healthcare sectors in the last 90 days, marking a 50% participation rate. Qilin tops the list with 24 confirmed victims.

What stands out is the disproportionate share of the total victims of each gang that comes from the healthcare sector. Several groups have shown an emphasis on healthcare, suggesting that it may be a primary target rather than a secondary one.

Among the top five gangs, Qilin had 12.2% of attacks directed at healthcare, Incransom recorded 25.4%, and KillSec recorded 20%. Everest and Bianlian showed more sharp targeting in 57.1% and 60% of known victims in healthcare, respectively. Of the top 20 most active gangs, it recorded double-digit stocks of 12 total victims within the healthcare sector.

Earlier this month, Health-ISAC Heartbeat in the first quarter of 2025 revealed the ongoing patterns of cybersecurity incidents and data breaches affecting healthcare organizations over the past year. Ransomware activity temporarily declined in the third quarter of 2024, but rebounded in the fourth quarter and continued to rise in early 2025. VPN provider vulnerabilities and continued exposure to entitlement breach remained a persistent risk factor throughout the reporting period.

Cyfirma has identified that the threat of APT campaigns remains low as the healthcare industry is a peripheral target for APT hackers. The APT campaigns over the past 90 days have not been explicitly targeted this sector. This trend reflects the lowland political and strategic information values ​​of the sector, particularly when compared to finance or defense. Additionally, targeting hospitals and critical health care systems involves reputation and diplomacy risks. This hinders state-sponsored operations unless it relates to specific research or pandemic surveillance.

With Healthcare ranked 8th in 4.84% of all dark web and underground chatterers over the past 90 days, Cyfirma recognizes moderate threat levels when it comes to dark web chattering in the underground. The mention of data breaches fell by 17%, but the chatter of data leaks has stabilized. Ransomware mentions remained consistently high and indicate a continuous threat. Hacktivism claimed it collapsed 82% and the hacking fell. DDOS activity was volatile but headed downwards. Web exploit mentions reduced by 73%, suggesting an improvement or change in the defensive attitude of attackers' priorities.

Similarly, we assessed moderate threat levels for vulnerabilities. Healthcare ranked 6th in detected CVEs, accounting for 6.39% of industry-related vulnerabilities. Injection attacks surged in March, possibly targeting the Electronic Health Record (EHR) system or patient portal. Remote Code Execution (RCE) remains a high-risk vector despite a slight reduction. Cross-site scripting (XSS) fell sharply, but memory/buffer defects probably increased due to aging infrastructure and medical device software. Denial of Service (DOS) vulnerability has also increased, and we collaborated with a modest DDOS threat profile.

Cyfirma rated the ransomware threat to healthcare as moderate. There have been 130 incidents in the last 90 days, and the sector ranked sixth in ransomware volume, down slightly from 132. Healthcare currently accounts for 8.1% of all recorded victims.

In April, Cyfirma delved into the manufacturing external threat landscape for the past three months, providing insights and data-driven statistics covering attack campaigns, phishing telemetry and ransomware incidents. The observed campaigns have been carried out by diverse threat actors, the most notable Chinese national state groups, and unidentified Vietnam, Thai, and English-speaking groups, suggesting that financial motivations are still prevalent in manufacturing.

Anna Ribeiro

Industrial Cyber ​​News Editor. Anna Ribeiro is a freelance journalist with over 14 years of experience in the areas of security, data storage, virtualization and IoT.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

AIA hosts Healthcare Finance Summit to promote intersectoral solutions for a sustainable future of healthcare in Hong Kong

July 4, 2025

How healthcare will remake the US economy

July 3, 2025

DOJ and HHS launch a new false claims law working group: What the healthcare industry should know | Husch Blackwell LLP

July 2, 2025
Leave A Reply Cancel Reply

Top Posts

Community nurses ‘must be central’ in new neighbourhood health service

July 4, 2025

Understand Latin health at Adelantando Healthcare Conference

January 1, 1970

Seton Hall's new university university program explores women's healthcare for future health leaders

January 1, 1970

North Texas medical chain faces possible $300 million fine for 20,000 fake Medicare claims

January 28, 2003
Don't Miss

Community nurses ‘must be central’ in new neighbourhood health service

By adminJuly 4, 2025

Community nurses must play a central role in the development of the government’s plans for…

Nurses call for delivery plan to achieve NHS prevention agenda

July 4, 2025

what it means for digital transformation| Nursing Times

July 4, 2025

Nursing livery company celebrates ‘red-letter day’ for profession

July 4, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to HomeCareNews.us, your trusted source for comprehensive information on home healthcare services. Our mission is to empower individuals and families by providing accurate, up-to-date, and insightful information about essential home care services in USA.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Community nurses ‘must be central’ in new neighbourhood health service

July 4, 2025

Nurses call for delivery plan to achieve NHS prevention agenda

July 4, 2025

what it means for digital transformation| Nursing Times

July 4, 2025
Most Popular

Community nurses ‘must be central’ in new neighbourhood health service

July 4, 2025

Understand Latin health at Adelantando Healthcare Conference

January 1, 1970

Seton Hall's new university university program explores women's healthcare for future health leaders

January 1, 1970
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 HomecareNews.US

Type above and press Enter to search. Press Esc to cancel.