a red gradientan orange gradient

Protect Your Business from Devastating Attacks: The Crucial Lesson from Ascension Health's Data Breach

Published on June 19, 2024

The Ascension Health ransomware attack highlights the crucial role of endpoint protection and application allowlisting. Learn how to protect your organization.

Don't Be the Next Big Headline

Cyber-attacks continue to make world headlines week after week. Every time a company is successfully targeted there are lessons to be learned. These lessons can help you take steps to better protect your organization so you can avoid becoming the next big headline. Let’s consider the recent ransomware attack on Ascension Health, one of the largest healthcare systems in the U.S. This attack, which resulted from a single employee inadvertently downloading a malicious file, compromised the network and disrupted essential services. In this blog post, we'll explore the details of the Ascension Health breach, and extract an important lesson about the role of endpoint protection, and how application allowlisting can help prevent such incidents.

Understanding the Ascension Health Data Breach

Details of the Breach

In May 2024, Ascension Health revealed that a ransomware attack was caused by an employee who mistakenly downloaded a malicious file, believing it to be legitimate. This attack impacted the MyChart electronic health records system, phones, and systems used to order tests, procedures, and medications. As a result, Ascension had to take some devices offline, forcing staff to revert to manual record-keeping and delaying non-emergent procedures.

Impact of the Breach

The attack had far-reaching consequences:

  • Ascension ImpactService Disruption: Employees had to revert to paper-based tracking of procedures and medications, causing delays in medical services and creating additional work for the staff. This disruption affected the efficiency of healthcare delivery and increased the risk of errors.
  • Patient Safety: Non-emergent procedures and tests were paused to focus on immediate patient care needs. Emergency services were diverted to other healthcare units to avoid triage delays, potentially impacting patient outcomes and causing stress for patients and families.
  • Data Compromise: While only seven out of 25,000 servers were compromised, these servers contained Protected Health Information (PHI) and Personally Identifiable Information (PII). The breach exposed sensitive data, risking patient privacy and potentially leading to identity theft and fraud.

Long-Reaching Effects

  • Ascension Longterm EffectsRegulatory Consequences: Ascension faces potential fines and sanctions for failing to protect patient data, as mandated by healthcare regulations like HIPAA.
  • Financial Impact: The costs associated with remediation, legal fees, and potential lawsuits are substantial. The financial burden can affect the organization's bottom line and its ability to invest in future growth.
  • Reputational Damage: The loss of trust among patients and partners can have long-term effects. Negative publicity and diminished confidence in the healthcare provider can lead to a decline in patient numbers and partnerships. 

Ransomware Attack Linked to Black Basta

The attack has been linked to the Black Basta ransomware gang, known for targeting high-profile victims and demanding large ransoms. This incident highlights the need for stringent cybersecurity measures to protect sensitive data and maintain service continuity.

Digital DisinfectantHow To Lower the Risk of a Successful Cyber-Attack

It’s easy to read about attacks like this one and feel helpless. But the fact is the risks can be significantly reduced by implementing some readily available safeguards. We might compare it to the use of hand-sanitizer. Printed on almost every bottle is “Kills 99% of Germs”. So with one action, potential for infection is drastically reduced. In a similar way, implementation of a few key policies and enforcement tools can impressively increase your cyber defense posture and reduce risk. Let’s look at an example – Application Allowlisting – a fundamental component of Endpoint Protection.

The Role of Application Allowlisting

What is Application Allowlisting?

Application Allowlisting (also known as whitelisting) is a security measure that only allows pre-approved applications to run on a network. By restricting the execution of unauthorized software, allowlisting prevents malicious programs from compromising system security.

Bouncer

Security Guard for Your Computer

We’ve all seen movies featuring an exclusive club with a big, intimidating bouncer at the door wearing a leather jacket and shades. He has a VIP list of celebrities and socialites and other invited guests. If someone not on the list tries to enter, they are “bounced” at the door. In a similar fashion, application allowlisting only permits pre-approved applications to run, blocking any unauthorized programs from executing. When an end-user requests an unknown program, it can be vetted for safety and authenticity by the company’s administration before being approved for installation.

Benefits of Application Allowlisting

  • Enhanced Security: Only pre-approved applications can run, reducing the risk of malware and unauthorized software.
  • Protection Against Zero-Day Threats: Prevents the execution of unknown or new malware not yet recognized by traditional antivirus software.
  • Data Protection: Controls access to applications that handle sensitive data, reducing the risk of data breaches.
  • Reduced Attack Surface: Limits the number of applications that can run, decreasing potential entry points for attackers.
  • Prevention of Shadow IT: Restricts the use of unauthorized software by employees.
  • Improved System Stability: Prevents unsanctioned software installations that could destabilize systems.
  • Control Over Software Updates: Ensures that only validated updates and patches are applied, preventing malicious updates.

How Allowlisting Could Have Prevented the Ascension Health Breach

Let's consider a fictional company, MedData Inc., to illustrate how allowlisting works.

MedData Inc., a mid-sized healthcare provider, decided to implement application allowlisting after witnessing similar breaches in the industry. They created a list of approved applications that could run on their network and ensured all employees were trained on the new security measures.

One day, an employee received an email with an attachment claiming to be an updated patient report. Trusting the source, the employee attempted to download and open the file. This was no ordinary file. In actuality, it was designed to install a program once it was opened. However, because MedData Inc. had allowlisting in place, the system immediately prevented the application from installing. An alert was sent to the IT department, and upon investigation, they found it was a malicious file designed to install ransomware. Disaster averted!

By preventing the file from running, MedData Inc. avoided a potential data breach and the significant disruption that could have followed. This proactive approach ensured their systems remained secure, and patient data was protected.

Allow Listing BenefitsThe Big Takeaway

The Ascension Health ransomware attack teaches a critical lesson: the need for robust endpoint protection and application allowlisting. It only takes one team member to mistakenly open one file or click on one link to affect an entire company. Well-chosen endpoint protection can significantly enhance your cybersecurity posture, protect sensitive data, and ensure business continuity. For expert guidance on endpoint protection and application allow-listing, contact allCare IT today. Our team is dedicated to helping you safeguard your network and data from evolving cyber threats.

Don't wait for a security breach to take action. Schedule a consultation with allCare IT now to fortify your defenses and protect your business from critical vulnerabilities. Stay ahead of threats and ensure your data and networks are secure.