The FBI and Cybersecurity and Infrastructure Security Agency today recommended all organizations take action to prevent Russian state-sponsored actors from exploiting vulnerabilities in multifactor authentication (MFA) protocols and Windows print spooler. 
 
John Riggi, AHA’s national advisor for cybersecurity and risk, said, “Russian state-sponsored cyber criminals and spies are conducting ‘vulnerability chaining’ — linking multiple known vulnerabilities together to gain access to networks and data. This pattern highlights the need to ensure MFA is properly configured to detect and prohibit unknown devices from enrolling in the service, and prioritizing patching of all vulnerabilities that allow unauthorized remote access and code execution. Reports of the Russian military deploying destructive malware in Ukraine continue to add urgency to acting on all alerts related to cyber threats posed by the Russian government." 
 
For more on this or other cyber and risk issues, email Riggi at jriggi@aha.org.
 

Related News Articles

Headline
There has been a sharp uptick this year in ruthless tactics by cybercriminals, who are now directly threatening patients with the release of sensitive…
Headline
The AHA July 24 shared information and new offerings from some of its private sector partners that can help hospitals and health systems strengthen their…
Headline
AHA President and CEO Rick Pollack opened the 2024 AHA Leadership Summit in San Diego discussing the similarities of the U.S. Navy Seals to the hospital field…
Headline
A non-malicious global technology outage that began in the early morning of July 19 is continuing to affect many industries and is having varying effects on…
Headline
John Riggi, AHA’s national advisor for cybersecurity and risk, participated July 18 as the opening keynote speaker in the Information Security Media Group’s…
Headline
A joint advisory issued the week of July 8 by the Cybersecurity and Infrastructure Security Agency, National Security Agency, FBI and several international…