Stolen Health Records Flooding Dark Web Markets

According to new research provided to CyberScoop and conducted by the Institute for Critical Infrastructure Technology and cybersecurity firms Flashpoint and Intel Security, the large amount of leaked patient records stolen and posted for sale to the dark web in recent months has caused prices for most of those records to drop.

In the face of exceeding supply, stagnant demand and increased law enforcement attention, it’s becoming increasingly difficult for criminals to make a living selling partial healthcare records, according to James Scott, a senior fellow at ICIT.

While the quality, quantity and sometimes origin of such electronic records will help dictate the price of any specific package for sale, average prices are largely trending downwards for individual, non-financial files, new research shows.

The value of similar healthcare records that sold last year for roughly $75 to $100 dollars can now be found for around $20 to $50 dollars.

“The volume of medical data for sale in the criminal underground is increasing, leading to very low prices for individual records,” Vitali Kremez, a senior analyst focused on cyber intelligence at Flashpoint, told CyberScoop.

A majority of stolen healthcare patient records sold on the dark web come from US-based institutions that have been breached, according to Intel Security.

The average price for a single complete electronic health record, described as a “fullz” in underground markets, typically tagged with financial information and supporting documents like utility bills or insurance receipts, currently hovers around $50, World Privacy Forum founder Pam Dixon recently estimated.

In broad strokes, an electronic healthcare record is rarely worth very much unless it is converted into a “complete ID kit,” which combines long form healthcare records, additional documents and are authorised via a breached government registration database, explained Scott.

Even so, because healthcare records contain vast personal information, these document offer scammers a stepping stone to more comprehensive fraud schemes.

Dixon told Healthcare IT News that decreasing prices are a general conclusion of easier access to sensitive personal records. One component of this eased access, based upon data gathered by ICIT and Intel Security, is the growing sale of hacking-as-a-service on the dark web, which enables those without technical backgrounds to hack into systems by relying on paid mercenaries.

Laying the groundwork for a further discordant dark web economy in some part, according to Kremez and Intel Security vice president Raj Samani, is also the ambiguous rise of prominent, dedicated healthcare hackers. Two of these mysterious actors, known simply by their vendor usernames “earthbound11” and “the dark-overlord,” have been flooding the market with medical fullz in recent months, thereby dictating the price for other smaller resellers.

A hacker’s underground reputation is typically one of the leading factors leading to the valuation and eventual sale of any records package they post, research shows.

“The larger trend in the trade of compromised personal healthcare information is toward larger breaches affecting more data,” said Kremez, “cyber-criminals themselves have realised that the value of their stolen medical data is much lower than once expected.”

Though it remains unclear how a recent fall in Dark Web prices have and now continue to influence hackers’ attack behavior towards the healthcare industry, several experts who spoke with CyberScoop believe it will ultimately lead to a spike in overall network intrusions at hospitals, the counter-intuitive thinking here being that larger data dumps will help dark web vendors recoup recent profit losses.

“After the 2015 breach of 100 million medical records from Anthem, Premera Blue Cross, and Excellus Health Plan, let alone the numerous smaller networks compromised in 2015 and 2016, the annual rate of medical identity theft could easily increase to be ten or twenty times greater than the 2014 rate,” an extensive, recent Dark Web report from ICIT reads.

Unlike stolen credit card details and other payment information sold online, however, a cloud of uncertainty looms over leaked healthcare records because cause and effect is difficult to decipher, said Samani. According to an April 2014 FBI bulletin, electronic healthcare record theft is also more difficult to detect, taking almost twice as long to spot as normal identity theft.

In most cases, the data necessary to draw a conclusive connection between a leaked patient record and relevant case of identity fraud, for example, is neither readily available nor visible The result is an environment where targeted data breaches occur but security researchers cannot definitely say how some, if not most, of the leaked information is being used, explained Samani.

“The impact of stolen payment cards is felt almost immediately whereas other forms of data the impact could be longer term,” said Samani, “indeed we can determine a direct correlation between a breach, and the pain felt when cards are declined. But it is not so easy to determine the origin of fraud with other forms of data.”

AIRS:     Why Are Hackers After Healthcare Records?:      Healthcare Data Breaches In 2017 Will Get Worse:

You Might Also Read:

Google Challenged For Collecting American Health Data:

 

« Give Children More Control Of Data Privacy
Non-Secure IoT Devices Are Powerful Weapons »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

Inceptus

Inceptus

Inceptus is a next generation Managed Security Service Provider (MSSP). We are dedicated to keeping our customers safe, secure and protected while doing business on the Internet.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Hilltop Technologies

Hilltop Technologies

Hilltop Technologies is a cybersecurity company specialized in managed security services and consulting tailored for all sectors from higher education to publicly traded companies.

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike is a company based in Tirana that offers full service in the field of cyber and physical security.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.