HC3 Threat Brief: Iranian Threat Actors Targeting Healthcare

According to a Nov. 3 threat brief from the Healthcare Sector Cybersecurity Coordination Center, the healthcare industry should be aware of Iranian hackers that use realistic phishing attacks to infiltrate networks
Nov. 9, 2022
2 min read

On Nov. 3, the Health Sector Cybersecurity Coordination Center (HC3) issued a threat brief on Iranian threat actors and the healthcare industry. Historically, Iranian threat actors are risk-averse and cyberattacks provide a means to exploit enemy vulnerabilities while minimizing the risk of escalation or relation.

These threat actors are known for wiper malware, website defacement, spear phishing, distributed denial-of-service (DDoS), theft of personally identifiable information (PHI), and social media-focused operations. Iranian threat actors that are known to target healthcare, according to the brief, include groups dubbed Pioneer Kitten; Magic Kitten; Infy; and UNC3890.

In June, we reported that FBI Director Christopher Wray said that a hacker group sponsored by the Iranian government attempted in the summer of 2021 to carry out a cyberattack on the computer system at Boston Children’s Hospital. The brief says that “Iranian hackers exploited a Fortigate appliance to access the environmental control networks of a U.S.-based children’s hospital. [The threat actors] Accessed known user accounts at the hospital from an IP address that the FBI associates with the Iranian government.”

The brief explains that Iranian hackers use fake personas to make their phishing attacks more realistic. In September 2022, the U.S. imposed an additional round of sanctions against Iran for its recent APT activity.

The brief suggests mitigations such as:

  • Training users on identifying phishing and how to report it
  • Training users on social engineering
  • Reviewing Log4j vulnerabilities
  • Implementing network segmentation
  • Maintaining offline backups of data
  • Ensuring backup data is encrypted
  • Reviewing antivirus logs
  • Auditing user accounts with administrative privileges
  • Having a strong incident response plan
  • Implementing the use of strong passwords and multifactor authentication
  • Requiring administrative privileges to install software

About the Author

Janette Wider

Janette Wider

Managing Editor

Janette Wider is Managing Editor of Healthcare Innovation, covering health IT and strategy. She has been covering health IT developments for the publication’s CIO- and CIMO-based audience and has taken a particular interest in cybersecurity, ransomware, telehealth, and policy and payment. 
Sign up for our eNewsletters
Get the latest news and updates