Experts discover history of malware infections on network of Community Health Systems

Share this article:

Following a major breach at Community Health Systems, security experts analyzed the hospital operator's network and discovered it had been plagued by malware infections for months.

Of the 12,500 IP addresses associated with the CHS network, 10 were linked to malicious bots, such as Kelihos, AsproxGameover Zeus and Conficker, according to a blog post by Jason Lewis, chief intelligence and collections officer at Lookingglass.

The bots tied to the network have the ability to perform SQL injection attacks, data exfiltration, click fraud and banking credential theft. Lewis believes there's even a probability an attack could access a virtual private network connected to “CHS headquarters.”

Patches for Conficker were made available shortly after its discovery in 2008, indicating that CHS systems have gone unpatched for years.

The infections detected were as early as January 2014 and as recent as Thursday.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Apple implements two-factor authentication

The company followed through on its promise to up iCloud security by implementing two-factor authentication earlier this week.

C&K apologizes for unauthorized access that led to Goodwill breach

A web hosting service apologized for intermittent unauthorized access of its hosted environment over 18 months that led to the Goodwill breach.

Yelp and TinyCo settle with FTC over COPPA Rule violations

Yelp and TinyCo settle with FTC over COPPA ...

Yelp will pay $450,000, and TinyCo will pay $300,000 to settle charges that their mobile apps collected information from children under the age of 13.