Experts discover history of malware infections on network of Community Health Systems

Share this article:

Following a major breach at Community Health Systems, security experts analyzed the hospital operator's network and discovered it had been plagued by malware infections for months.

Of the 12,500 IP addresses associated with the CHS network, 10 were linked to malicious bots, such as Kelihos, AsproxGameover Zeus and Conficker, according to a blog post by Jason Lewis, chief intelligence and collections officer at Lookingglass.

The bots tied to the network have the ability to perform SQL injection attacks, data exfiltration, click fraud and banking credential theft. Lewis believes there's even a probability an attack could access a virtual private network connected to “CHS headquarters.”

Patches for Conficker were made available shortly after its discovery in 2008, indicating that CHS systems have gone unpatched for years.

The infections detected were as early as January 2014 and as recent as Thursday.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in News

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.

Franchises to get assistance on cybersecurity strategy

The National Cyber Security Alliance has teamed up with the International Franchise Association to promote cybersecurity awareness among franchise businesses in the U.S.

Bulgarian national sentenced 30 months for role in ID theft ring

Aleksi Kolarov was a vendor on, an online cybercrime marketplace that sold stolen credit and bank cards and caused millions of dollars in damages.