Experts discover history of malware infections on network of Community Health Systems

Share this article:

Following a major breach at Community Health Systems, security experts analyzed the hospital operator's network and discovered it had been plagued by malware infections for months.

Of the 12,500 IP addresses associated with the CHS network, 10 were linked to malicious bots, such as Kelihos, AsproxGameover Zeus and Conficker, according to a blog post by Jason Lewis, chief intelligence and collections officer at Lookingglass.

The bots tied to the network have the ability to perform SQL injection attacks, data exfiltration, click fraud and banking credential theft. Lewis believes there's even a probability an attack could access a virtual private network connected to “CHS headquarters.”

Patches for Conficker were made available shortly after its discovery in 2008, indicating that CHS systems have gone unpatched for years.

The infections detected were as early as January 2014 and as recent as Thursday.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Information sharing requires breaking down barriers, White House cyber guru says

Information sharing requires breaking down barriers, White House ...

The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via ...

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft

Patch for Windows flaw can be bypassed, prompts ...

The Windows zero-day received a patch last week, but the fix can still be bypassed by crafty attackers.