November2019CTNTREPORTCYBERCRIMETACTICSANDTECHNIQUES:the2019stateofhealthcareCybercrimetacticsandtechniques:the2019stateofhealthcare2TableofcontentsExecutivesummary..........................................3Keytakeaways..............................................................4Globalhealthcarethreats..............................................5USregionalhealthcarethreats......................................11Topattackvectorsforhealthcare.................................20Whyishealthcareatarget?..........................................22Securitychallengesinhealthcare.................................27Consequencesofabreach............................................32Futureconcerns...........................................................33Conclusion....................................................36Cybercrimetacticsandtechniques:the2019stateofhealthcare3ExecutivesummaryInthisspecialCTNTreportonhealthcare,wefocusonthetopthreatcategoriesandfamiliesthatplaguedthemedicalindustryoverthelastyear,aswellasthemostcommonattackmethodsusedbycybercriminalstopenetratehealthcaredefenses.Inaddition,wehighlightthesecuritychallengesinherenttoorganizations,fromsmallprivatepracticestoenterprisehealthmaintenanceorganizations(HMOs),aswellasthereasonswhyhackerslooktoinfiltratetheirdefenses.Finally,welookaheadtofuturebiotechinnovationsandtheneedtoconsidersecurityintheirdesignandimplementation.Disruptionstohealthcaredata,operations,productivity,andefficiencyresultinsevere,life-threateningconsequences.Yetcybercriminalsshownosignsofremorse.Infact,theglobaldataMalwarebytesLabscollectedfromourproducttelemetry,honeypots,threatintelligence,andreportingeffortsfromOctober2018throughSeptember2019showstheyareonlyrampingupefforts.Therefore,weaimtoeducatethoseinhealthcareITandsecuritytogetaheadofthecurvewithanounceofprevention…beforetheyneedapoundofbreachremediation.In2019,cybercriminalsstoleheadlinesforincessantattacksagainstsomeoftheworld’smostimportantsectors.Threatactorsmadenobonesa...