CYBER CORNER
Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) issued a joint cybersecurity advisory providing information on Maui ransomware. Maui ransomware has been used by North Korean state- sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations. The advisory explains
that the
FBI has observed and responded to various Maui ransomware incidents at HPH Sector organizations and that North Korean state-sponsored cyber actors used this ransomware in these incidents to encrypt services that are responsible for healthcare services, including electronic health records, diagnostic services, imaging services, and intranet services. The advisory adds that in some cases the incidents disrupted services provided by the HPH Sector organizations for extended peri- ods and the initial access vector(s) for these incidents is not known at this time. In August we reported that the FBI
issued a press release warning those employed in the healthcare industry of scammers that are impersonating law enforcement or government officials in attempts to extort money or steal personally identifiable information (PII). The release states that “Scammers,
as part of a large criminal network, research background information of their intended targets through a medical practice’s website and/or social media and supplement this information with information found on common social media websites such as Facebook, Instagram, LinkedIn, etc.,
to make
themselves appear legitimate.” Further, “Scammers will often spoof
authentic phone numbers and names and use fake credentials of well-known gov- ernment and law enforcement agencies to notify the intended target they were subpoenaed to provide expert witness testimony in a criminal or civil court case. The healthcare professional is noti- fied since they did not appear in court, they are in violation of the subpoena,
Statement of Ownership, Management & Circulation for HEALTHCARE INNOVATION Magazine
Publication No. 2641-7502 | Filing Date: 9/26/22 | Issue Date for Circulation Data: Sep/Oct22
HEALTHCARE INNOVATION published bi-monthly in 2022, qualified request circulation. Complete Mailing Address of Known Office of Publication (Not Printer): Endeavor Business Media, LLC, 2477 Stickney Point Road, Suite 221B, Sarasota, FL 34231 Complete Mailing Address of Headquarters or General Business Office of Publisher (Not Printer): Endeavor Business Media, LLC,30 Burton Hills Blvd., Ste. 185., Nashville, TN 37215 Full Names and Complete Mailing Addresses of Publisher, Editor, and Managing Editor - Publisher: Matthew Raynor, 2477 Stickney Point Road, Suite 221B, Sarasota, FL 34231; Editor: Mark Hagland, 2477 Stickney Point Road, Suite 221B, Sarasota, FL 34231; Managing Editor: Janette Wider, 2477 Stickney Point Road, Suite 221B, Sarasota, FL 34231 Owner - Full name and complete mailing address: Endeavor Media Holdings I, LLC, 905 Tower Place, Nashville, TN 37205; Endeavor Media Holdings II, LLC, 905 Tower Place, Nashville, TN 37205;Resolute Capital partners Fund IV, LP, 20 Burton Hills Blvd, Suite 430, Nashville, TN 37215;RCP Endeavor, Inc, 20 Burton Hills Blvd, Suite 430, ,Nashville, TN 37215;Northcreek Mezzanine Fund II, LP,312 Walnut Street, Suite 2310,Cincinnati, OH 45202;Invegarry Holdings, LP,44235 Hillsboro Pike,Nashville, TN 37215;Everside Fund II, LP,155 East 44th St, Suite 2101 - 10 Grand Central,New York, NY 10017Everside Endeavor F1 Blocker, LLC, 155 East 44th St, Suite 2101 - 10 Grand Central, New York, NY 10017;Everside Endeavor International Blocker, LLC, 155 East 44th St, Suite 2101 - 10 Grand Central, New York, NY 10017;Everside Founders Fund, LP, 155 East 44th St, Suite 2101 - 10 Grand Central, New York, NY 10017;Suncap Endeavor Blocker, LLC,155 East 44th St, Suite 2101 - 10 Grand Central,New York, NY 10017; Known Bondholders, Mortgagees, and Other Security Holders Owning or Holding 1 Percent or More of Total Amount of Bonds, Mortgages or Other Securities: None
Extent and Nature of Circulation A. Total No. Copies
B. Paid and/or Requested Circulation 1. Paid/Requested Outside-County 2. Paid In-County Subscriptions Stated
3. Sales Through Dealers and Carriers Street Vendors, Counter Sales and Other Non-USPS Paid Distribution 4. Other Classes Mailed Through the USPS C. Total Paid and/or Requested Circulation
D. Non requested Distribution (By Mail and Outside the Mail) 1. Outside County Non requested Copies 2. In-County Non requested Copies
3. Non requested Copies Distributed Through the USPS by Other Classes of Mail 4. Non requested Copies Distributed Outside the Mail E. Total Non Requested Distribution F. Total Distribution
G. Copies Not Distributed H. Total
I. Percent Paid and/or Requested Circulation J. Electronic Copy Circulation
1. Requested and Paid Electronic Copies
2. Total Requested and Paid Print Copies Requested/Paid Electronic Copies 3. Total Requested Copy Distribution + Requested/Paid Electronic Copies 4. Percent Paid and/or Requested Circulation (Both Print & Electronic Copies)
Average No. Copies Each Issue During Preceding 12 Months
36,352
24,923 none 24
none 24,947
8,667 none none 2,100
10,767 35,714 638
36,352 69.85%
2,087
27,034 37,801 71.52%
Average # of Copies of the Single Issue Published Nearest to Filing Date
35,770
24,101 none 29
none 24,130
8,879 none none 2,094
10,973 35,103 667
35,770 68.74%
1,859
25,989 36,962 70.31%
Laura Moulton, Audience Development Manager 9/26/22. I certify that all information furnished on this form is true and complete. I understand that anyone who furnishes false or misleading information on this form or who omits material or information requested on the form may be subject to criminal sanctions (including fines and imprisonment) and/or civil sanctions (including civil penalties).
28
hcinnovationgroup.com | NOVEMBER/DECEMBER 2022
have been held in contempt, and an arrest warrant has been issued for them.” On Sept. 22, we reported that
the Health Sector Cybersecurity Coordination Center (HC3) published a threat brief on the Chinese state- sponsored threat actor APT41. Members of APT have been actively tracked since 2012, and APT has been tracked as two separate groups, depending on opera- tion. APT41 has a malicious history of targeting healthcare, as well as several other industries including high-tech and telecommunications, and uses methods like spear phishing, water holes, supply chain attacks, and backdoors. According to the brief, APT 41 has
been active in one or more of 14 coun- tries that includes the U.S. Specifically regarding healthcare, the years the industry was targeted beginning in 2014. In 2014 and 2016 APT 41 was inter- ested in IT and medical device software through supply chain attacks and tar- geting medical device information. In 2016, a biotech company was targeted
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32