{"id":165088,"date":"2018-10-10T10:00:48","date_gmt":"2018-10-10T10:00:48","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=165088"},"modified":"2026-04-06T18:03:12","modified_gmt":"2026-04-06T18:03:12","slug":"opinie-bogdan-botezatu-specialist-in-amenintari-informatice-bitdefender-cum-au-devenit-serviciile-medicale-tinta-preferata-a-piratilor-informatici","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=165088","title":{"rendered":"Opinie Bogdan Botezatu, specialist \u00een amenin\u0163\u0103ri informatice, Bitdefender: &#8220;Cum au devenit serviciile medicale \u0163inta preferat\u0103 a pira\u0163ilor informatici&#8221;"},"content":{"rendered":"<p>\nPrintre industriile afectate de WannaCry \u015fi succesorii s\u0103i, serviciile medicale au fost lovite \u00een mod deosebit, deoarece hackerii au devenit din ce \u00een ce mai interesa\u0163i s\u0103 pun\u0103 m\u00e2na pe fi\u015fe medicale. Motivul? Fi\u015fele medicale electronice con\u0163in date extrem de sensibile, de la consulta\u0163ii, re\u0163ete \u015fi tratamente p\u00e2n\u0103 la istoricul medical al pacientului. \u00cen acela\u015fi timp, multe clinici comunic\u0103 prin canale nesigure, sistemele lor sunt slab \u00eentre\u0163inute, iar opera\u0163iunile sunt remediate greoi \u00een cazul descoperirii unei vulnerabilit\u0103\u0163i.<\/p>\n<p>\nIstoricul medical, de v\u00e2nzare pe Dark Web<br \/>\nPachetele de informa\u0163ii despre s\u0103n\u0103tatea pacientului care ajung pe Dark Web (pia\u0163a neagr\u0103 a internetului, sau internetul ascuns) \u00een urma unei bre\u015fe sunt cunoscute sub numele de \u201efullz\u201d. Fullz pot fi folosite pentru diverse tipuri de fraud\u0103 \u015fi \u015fantaj, cum ar fi frauda bancar\u0103, cea medical\u0103, furtul de identitate \u015fi \u015fantajul.<br \/>\nDe\u015fi serviciile medicale sunt totodat\u0103 mai bine reglementate dec\u00e2t majoritatea celorlalte industrii, \u00een ultimul an s-a observat o cre\u015ftere considerabil\u0103 a num\u0103rului de bre\u015fe \u2013 \u00een special atacurile de tip ransomware. Datele pacien\u0163ilor sunt, de asemenea, cele mai frecvente tipuri de date cu caracter personal compromise.<br \/>\nOarecum ironic, odat\u0103 cu introducerea noilor reglement\u0103ri, precum GDPR, incidentele raportate \u00een domeniul s\u0103n\u0103t\u0103\u0163ii au \u00eenceput s\u0103 creasc\u0103, iar anali\u015ftii se a\u015fteapt\u0103 ca aceast\u0103 tendin\u0163\u0103 s\u0103 se amplifice.<br \/>\n\u00cen Statele Unite, clinicile \u015fi spitalele au suferit o cre\u015ftere substan\u0163ial\u0103 a num\u0103rului de bre\u015fe \u00een a doua jum\u0103tate a anului 2018. \u00centre 2 milioane \u015fi 3 milioane de fi\u015fe ale pacien\u0163ilor au fost expuse, iar \u015fapte dintre incidentele raportate au men\u0163ionat \u00een mod special \u015fantajul pentru redob\u00e2ndirea accesului la datele blocate.<br \/>\nSamSam prefer\u0103 mai ales spitalele<br \/>\nO familie de ransomware denumit\u0103 SamSam a fost responsabil\u0103 de atacuri cheie care au vizat spitalele \u00een 2017 \u015fi 2018, unele unit\u0103\u0163i fiind for\u0163ate s\u0103 \u00eenceteze activitatea \u015fi chiar s\u0103 refuze internarea sau tratarea pacien\u0163ilor cu afec\u0163iuni, \u00een timp ce altele s-au \u00eentors la pix \u015fi h\u00e2rtie. Un atac asupra Ministerului S\u0103n\u0103t\u0103\u0163ii din Singapore a compromis 1,5 milioane de \u00eenregistr\u0103ri ale pacien\u0163ilor, inclusiv fi\u015fa apar\u0163in\u00e2nd prim- ministrului.<br \/>\nNumai \u00een prima jum\u0103tate a lui 2018 au fost raportate cel pu\u0163in zece incidente de tip ransomware care au avut ca \u0163int\u0103 o institu\u0163ie de servicii medicale.<br \/>\nMul\u0163i atacatori care au luat \u00een vizor sectorul s\u0103n\u0103t\u0103\u0163ii \u00een 2017 \u015fi 2018 au folosit familia de ransomware SamSam, care \u2013 la fel ca r\u0103u-famatul WannaCry \u2013 utilizeaz\u0103 o component\u0103 de \u201evierme\u201d pentru a se extinde pe infrastructura vizat\u0103. De la descoperirea acestei familii de ransomware, SamSam a provocat victimelor pagube de 6 milioane de dolari. SamSam afi\u015feaz\u0103 un ironic \u201eI\u2019m sorry\u201c \u00een notele sale de r\u0103scump\u0103rare.<\/p>\n<p>\nDaune mai mari dec\u00e2t costul protec\u0163iei<br \/>\nPentru al optulea an consecutiv, clinicile \u015fi spitalele au suportat costuri mai mari dec\u00e2t orice alt sector din pierderea datelor. Costurile asociate cu pierderea datelor \u00een domeniul asisten\u0163ei medicale sunt aproape de trei ori mai mari dec\u00e2t \u00een celelalte industrii \u2013 de 408 dolari pentru fiecare fi\u015f\u0103 medical\u0103 pierdut\u0103 sau furat\u0103.<br \/>\n\u00cen industriile puternic reglementate, cum ar fi serviciile medicale, clien\u0163ii au de obicei a\u015ftept\u0103ri ridicate pentru protec\u0163ia datelor lor. Un studiu al Ponemon Institute arat\u0103 c\u0103 anumite industrii sunt mai vulnerabile la perturb\u0103ri atunci c\u00e2nd clien\u0163ii \u00ee\u015fi schimb\u0103 furnizorii de servicii. C\u00e2nd aceste organiza\u0163ii au o \u00eenc\u0103lcare a datelor, \u00eencrederea clien\u0163ilor scade \u015fi, ca urmare, vor \u00eencerca s\u0103 g\u0103seasc\u0103 un \u00eenlocuitor.<br \/>\nDe fapt, industria servicilor medicale are una dintre cele mai slabe rate de reten\u0163ie de clien\u0163i, urmat\u0103 de finan\u0163e, farmaceutice, servicii, tehnologii, energie, comunicare \u015fi educa\u0163ie.<br \/>\nNu \u00een ultimul r\u00e2nd, organiza\u0163iile din domeniu sunt foarte lente \u00een a remedia o bre\u015f\u0103: \u00een medie au nevoie de 103 zile pentru a reveni la normal. Absen\u0163a identific\u0103rii rapide a compromiterii datelor duce la noi costuri, pe l\u00e2ng\u0103 reputa\u0163ia lezat\u0103 \u015fi impactul nedorit asupra reten\u0163iei clien\u0163ilor. \u00cen 2017, costul total mediu a fost de 2,8 milioane de dolari pentru mai pu\u0163in de 100 de zile p\u00e2n\u0103 la identificarea unei bre\u015fe \u015fi de 3,83 milioane de dolari pentru mai mult de 100 de zile.<br \/>\nOperatorii ransomware continu\u0103 s\u0103 vizeze sectorul medical \u00eentr-un peisaj legislativ din ce \u00een ce mai complicat. Serviciile medicale necesit\u0103 \u00eembun\u0103t\u0103\u0163irea drastic\u0103 a sistemelor folosite pentru agregarea \u015fi transmiterea datelor pacien\u0163ilor \u2013 informa\u0163iile sensibile trebuie stocate pe serverele proprii \u00een mod criptat, iar accesul la acestea trebuie limitat c\u0103tre persoanele autorizate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00cen lunile care au urmat izbucnirii evenimentului WannaCry din 2017,ransomware a devenit cea mai virulent\u0103 form\u0103 de malware care amenin\u0163\u0103 economia digital\u0103 \u2013 \u015fi a r\u0103mas a\u015fa p\u00e2n\u0103 \u00een prezent.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[211,15977,8039,37437,4126,4641,246,19913,188,532,32766,17927,474,10652,8853,406,12845,408,461,12644,245,519,205,16389,315,7374,19591,9039,19707,16708],"class_list":["post-165088","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-amenintare","tag-amenintari","tag-bitdefender","tag-botezatu","tag-clienti","tag-clinici","tag-crestere","tag-descoperire","tag-economie","tag-eveniment","tag-folosire","tag-incidente","tag-industrie","tag-informatica","tag-istoric","tag-medici","tag-pacient","tag-pacienti","tag-pierdere","tag-pirati","tag-prezenta","tag-raportare","tag-sanatate","tag-santaj","tag-sector","tag-servicii-medicale","tag-specialist","tag-spitale","tag-timp","tag-tinta"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/165088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=165088"}],"version-history":[{"count":1,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/165088\/revisions"}],"predecessor-version":[{"id":165099,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/165088\/revisions\/165099"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=165088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=165088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=165088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}