HITRUST Deploys ‘Honeypots’ to Gain Knowledge of Cyber Attack Methods | Healthcare Informatics Magazine | Health IT | Information Technology Skip to content Skip to navigation

HITRUST Deploys ‘Honeypots’ to Gain Knowledge of Cyber Attack Methods

October 5, 2017
by David Raths
| Reprints
Deception environment spans healthcare organizations

The Health Information Trust Alliance (HITRUST) and Trend Micro have created a deception-based threat detection collaboration platform that deploys “honeypots” across the healthcare ecosystem.

HITRUST CTX Deceptive deploys decoys that work together to deceive attackers and gain knowledge of their methods, processes, tactics and targets of interest. These decoys, or honeypots, are computer systems designed to attract and monitor attackers and are typically deployed as stand-alone systems within individual organizations.

HITRUST said it has taken the concept to the next level by designing a deception environment that spans across many healthcare organizations via the HITRUST CTX threat-sharing infrastructure. HITRUST has also deployed decoys of commonly used systems including leading EHRs, medical devices and other healthcare-specific systems. HITRUST facilitates the 24/7 monitoring of the activity.

HITRUST said this is the first time that multiple organizations have come together to undertake such a sophisticated and aggressive approach to cyber deception. By working together and sharing the different types of traps and decoys, as well as intelligence gathered related to specific threat actors, systems or medical devices, cyber defenders now have insight beyond basic IOC information.

HITRUST said CTX Deceptive will provide insight into how threat actors are infiltrating and exploiting networks, applications and systems while capturing complete malicious activity, IP addresses and domains.

Advanced tactical intelligence on attack behaviors and possible attack paths can be anticipated, and indicators of compromise data and alerts on threats to specific applications and medical systems can be shared with organizations to prevent an attack and reduce the risk of breach or compromise.

HITRUST said Trend Micro’s experience with honeypots allows it to understand the results of malicious activity within the HITRUST CTX and provide an advanced level of protection. With enhanced visibility into the network, early detection of attacks in the decoy environment can improve the industry’s time-to-respond with third-party integrations to isolate and block attacks.

HITRUST will not publicly disclose any information about the participating organizations or the target systems that decoys have been developed or will be in the future.

 

 

 

Get the latest information on Cybersecurity and attend other valuable sessions at this two-day Summit providing healthcare leaders with educational content, insightful debate and dialogue on the future of healthcare and technology.

Learn More

Topics

News

Ohio Man Charged for Allegedly Defrauding Cleveland Clinic out of $2.8M

A man in Westlake, Ohio has been indicted in federal court for his role in a conspiracy to defraud the Cleveland Clinic out of at least $2.8 million.

Survey: Most Providers Say Interoperability by 2020 Not Attainable with Current Federal Policies

The majority of healthcare providers (71 percent) believe that current federal polices, committees and regulations are not sufficient to help the country attain meaningful health IT interoperability by 2020.

House Committee Presses Nuance Executives on NotPetya Attack

he U.S. House Energy and Commerce Committee is requesting that Nuance Communications executives provide more information about the malware incident, called NotPetya, that impacted the company, along with multinational companies in 65 countries, back in June.

Regenstrief Researchers to Study Impact of HIE on Emergency Care

Scientists at the Indianapolis-based Regenstrief Institute are conducting what they say is the first study of health information exchange (HIE) use over multiple years to evaluate whether it improves patient outcomes in emergency departments.

Report: Healthcare Organizations Struggle with Human Error in Securing PHI

In the first nine months of 2017, unintended disclosure accounted for 41 percent of healthcare data breach incidents, according to a report from specialist insurer Beazley.

Three More Providers Receive 2017 HIMSS Davies Awards

Three patient care organizations have received the 2017 global Healthcare Information and Management Systems Society (HIMSS) Enterprise Nicholas E. Davies Award of Excellence for healthcare technology innovations that improve patient outcomes.