The pro-Russian hacktivist group KillNet has continued with its attacks on healthcare organizations in the United States in retaliation for U.S. Congress’s support for Ukraine, and on January 28, 2023, the group launched its biggest wave of Distributed Denial of Service (DDoS) attacks to date – a coordinated attack on more than 90 healthcare organizations in 48 U.S. states. 55% of the targets were healthcare systems with at least one hospital and lone hospitals with Level I trauma centers.
The increase in activity has prompted the Health Sector Cybersecurity Coordination Center (HC3) to issue a new Analyst Note about the group, which describes its latest activities, the tactics, techniques, and procedures observed in the recent attacks on the healthcare and public health (HPH) sector, and provides recommended mitigations to defend against and reduce the severity of the group’s attacks.
The group has been active since at least January 2022 and has been actively targeting countries that have pledged support for Ukraine following the Russian invasion, especially NATO countries. In December 2022, KillNet embarked upon a campaign of DDoS attacks on organizations in the HPH sector. The group conducts DDOS attacks that last several hours to a few days causing service outages. While these attacks do not typically cause any major damage, the systems they target suffer outages that threaten critical day-to-day operations at HPH organizations.
While the DDoS attacks appear to have slowed in March, further attacks can be expected. Microsoft has also reported that the group has been targeting healthcare applications on Azure infrastructure for the past 3 months. 31% of the attacks were on pharmaceutical and life sciences firms, 26% on hospitals, 16% on health insurance providers, and 16% on health services and care. While DDOS attacks in 2022 mostly involved Transmission Control Protocol (TCP) as the main attack vector, 53% of the attacks on healthcare were User Datagram Protocol (UDP) floods, and 44% involved TCP.
The group recruits affiliates to assist with the attacks and sends open invitations to the cybercriminal community to help the group achieve its aims, and KillNet has attracted considerable support and respect from the cybercriminal community. While the group does not appear to have engaged in significant data theft to date, KillMilk, the founder and leader of the group, claimed to have stolen the credit card details of 2.5 million Americans and threatened to sell the data. In a recent post, KillMilk claims to have left KillNet to set up a new group called Black Skills, which is allegedly a highly organized military hacking company. The new KillNet leader operates under the name Blackside, and claims to have experience in ransomware, phishing, and crypto theft attacks.
It is currently unclear if the restructuring will see a change in tactics but what is clear is the group plans to continue with its hacktivist campaigns in countries that are considered to be anti-Russia or pro-Ukraine, and the group is considered to continue to pose a significant threat to the HPH sector.
The post KillNet Hacktivist Group Continues to Target U.S. Healthcare Organizations appeared first on HIPAA Journal.