A highly sophisticated threat actor has stolen tools used by cybersecurity company FireEye to evaluate the security posture of enterprise systems, which unauthorized third-party users could abuse to take control of targeted systems, the Cybersecurity and Infrastructure Security Agency announced yesterday.

CISA recommends cybersecurity practitioners review details on the theft of the FireEye Red Team tools and countermeasures available to minimize the threat. 

This is a really big deal — to say the least. It puts every organization in every sector at risk,” said John Riggi, AHA’s senior advisor for cybersecurity and risk. “It’s equivalent to sophisticated foreign criminals or spies breaking into a highly secure armory and stealing the ‘good guys’ most capable and effective weapons. I can’t emphasize enough to all organizations, especially those that possess sensitive data and research, to implement FireEye’s countermeasures as soon as possible.”  

For more on this and other cybersecurity and risk issues, hospital and health system leaders may contact Riggi at jriggi@aha.org.

Related News Articles

Headline
Larry Pierce, director of cybersecurity and information security officer for Atlantic Health, unpacks how the growth of artificial intelligence is reshaping…
Headline
U.S. and international agencies Jan. 14 released guidance on secure connectivity for operational technology environments. Examples of OT environments in health…
Headline
The AHA Jan. 14 expressed support for the Rural Hospital Cybersecurity Enhancement Act (S. 2169), legislation that would direct the Department of Health and…
Headline
The FBI Jan. 8 released an alert on evolving threat tactics by Kimsuky, a North Korean state-sponsored cyber threat group. As of last year, the group…
Headline
The Cybersecurity and Infrastructure Security Agency Dec. 11 released an update to its voluntary Cybersecurity Performance Goals, which includes measurable…
Headline
U.S. and international agencies are warning of potential cyberattacks on health care and other critical infrastructure from state-sponsored cyber actors in…