Experts discover history of malware infections on network of Community Health Systems

Share this article:

Following a major breach at Community Health Systems, security experts analyzed the hospital operator's network and discovered it had been plagued by malware infections for months.

Of the 12,500 IP addresses associated with the CHS network, 10 were linked to malicious bots, such as Kelihos, AsproxGameover Zeus and Conficker, according to a blog post by Jason Lewis, chief intelligence and collections officer at Lookingglass.

The bots tied to the network have the ability to perform SQL injection attacks, data exfiltration, click fraud and banking credential theft. Lewis believes there's even a probability an attack could access a virtual private network connected to “CHS headquarters.”

Patches for Conficker were made available shortly after its discovery in 2008, indicating that CHS systems have gone unpatched for years.

The infections detected were as early as January 2014 and as recent as Thursday.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Hackers grab email addresses of CurrentC pilot participants

Hackers grab email addresses of CurrentC pilot participants

Although the hack didn't breach the mobile payment app itself, consumer confidence may be shaken.

Operators disable firewall features to increase network performance, survey finds

Operators disable firewall features to increase network performance, ...

McAfee found that 60 percent of 504 surveyed IT professionals prioritize security as the primary driver of network design.

PCI publishes guidance on security awareness programs

PCI publishes guidance on security awareness programs

The guidance, developed by a PCI Special Interest Group, will help merchants educate staff on protecting cardholder data.