A new attack group, dubbed Orangeworm, is conducting targeted cyber attacks against healthcare organizations in the United States, Europe and Asia, according to a new report from researchers at cybersecurity firm Symantec.
And, researchers have observed that the hackers have gotten footholds on the computers controlling high-tech imaging devices, such as X-Ray and MRI machines. Cybersecurity researchers have long warmed about the vulnerability of connected medical devices, and this latest research indicates that hackers are actively targeting medical machines.
The researchers also note that the hacker group does not appear to be linked to a nation-state actor. “While Orangeworm is known to have been active for at least several years, we do not believe that the group bears any hallmarks of a state-sponsored actor—it is likely the work of an individual or a small group of individuals. There are currently no technical or operational indicators to ascertain the origin of the group,” the researchers state.
First identified in January 2015, Orangeworm has also conducted targeted attacks against organizations in related industries as part of a larger supply-chain attack in order to reach their intended victims, Symantec researchers report. “Known victims include healthcare providers, pharmaceuticals, IT solution providers for healthcare and equipment manufactures that serve the healthcare industry, likely for the purpose of corporate espionage,” the report states.
The hackers deploy a custom backdoor called Trojan.Kwampirs within large international corporations that operate within the healthcare sector in the United States, Europe, and Asia.
According to the Symantec report, the hacker group has deliberately set its sights on healthcare. “The group appears to choose its targets carefully and deliberately, conducting a good amount of planning before launching an attack,” the report states, noting that nearly 40 percent of Orangeworm’s victim organizations operate within the healthcare industry.
“The Kwampirs malware was found on machines which had software installed for the use and control of high-tech imaging devices such as X-Ray and MRI machines. Additionally, Orangeworm was observed to have an interest in machines used to assist patients in completing consent forms for required procedures. The exact motives of the group are unclear,” the report states.
Researchers have found that the biggest number of Orangeworm’s victims are located in the U.S., accounting for 17 percent of the infection rate by region. While Orangeworm has impacted only a small set of victims in 2016 and 2017, according to Symantec telemetry, researchers have seen infections in multiple countries due to the nature of the victims operating large international corporations.
“We believe that these industries have also been targeted as part of a larger supply-chain attack in order for Orangeworm to get access to their intended victims related to healthcare. Orangeworm’s secondary targets include manufacturing, information technology, agriculture, and logistics. While these industries may appear to be unrelated, we found them to have multiple links to healthcare, such as large manufacturers that produce medical imaging devices sold directly into healthcare firms, IT organizations that provide support services to medical clinics, and logistical organizations that deliver healthcare products,” the researchers state.
In a blog posted today, the researchers note that the Kwampirs malware uses a fairly aggressive means to propagate itself once inside a victim's network by copying itself over network shares. “While this method is considered somewhat old, it may still be viable for environments that run older operating systems such as Windows XP. This method has likely proved effective within the healthcare industry, which may run legacy systems on older platforms designed for the medical community. Older systems like Windows XP are much more likely to be prevalent within this industry.”