The crucial role of cybersecurity in the COVID-19 vaccine distribution
With more than 73 million coronavirus cases worldwide, the COVID-19 vaccines offer potential relief. Yet, as many organizations are getting involved in their distribution worldwide, the attack surface for cybercriminals expands, and it worries cybersecurity experts.
COVID-19 has already accelerated cybersecurity risks to unprecedented levels. Now, as countries begin to vaccinate their populations, malicious actors are preparing to hack supply chain distributions, experts claim.
Criminals have been breathing down the vaccine researchers’ necks since they’ve started vaccine development. In July, it was reported that state-sponsored hackers from China, Russia, Iran, and North Korea were engaged in concerted attempts to steal vaccine secrets. In November, news that Russia and North Korea were targeting COVID-19 vaccine research surfaced.
And recently, IBM published an unnerving report about how criminals are trying to disrupt the distribution of COVID-19 vaccines. IBM reported that it had uncovered a global phishing campaign focused on organizations associated with the COVID-19 vaccine “cold chain” – the process needed to keep vaccine doses at minus 70 degrees Celsius to avoid spoiling as they travel from manufacturers to the recipients.
At the moment, countries are trying to figure out logistics, and more companies are getting involved in the vaccine distribution process. It means that the attack surface for hackers has increased, and they are highly likely to attack some of the companies just for financial gain.
How badly could a successful cyberattack damage the vaccine distribution chain? And how can organizations prevent these attacks from happening? To discuss these and other questions, CyberNews sat down with Elizabeth Mann, EY Americas Health and Life Sciences Cybersecurity Leader, and Susan Garfield, EY US Consulting Principal, and Life Sciences Sector Commercial Lead.
What are the criminals after?
First, we’ve got to learn that state-sponsored hackers were trying to steal vaccine secrets. Recent reports, released by numerous third parties, allow Elizabeth Mann to assume that most of the attacks are financially motivated.
“It’s worth noting that there’s a significant financial gain from ransomware attacks on critical systems. However, in the health sector, the theft of intellectual property, proprietary research, and exclusive methods is the threat vector that we have seen on a nation-state level,” Mann told CyberNews.
Disruption is a less common motive, and although one could imagine actors looking to create chaos, there is not a clear path to monetizing it, Mann explained.
In case of a successful hack attack, could a vaccine shipment be redirected and never reach those who it was supposed to reach?
In theory, yes, Susan Garfield reckons. And this is one reason why collaboration between supply chain and cybersecurity teams is the key.
“Often, these two disciplines sit in different parts of the enterprise, but teaming across silos has never been more important. One of our clients, for example, has made clear to all teams that their digital distribution platforms are among their highest-rated and most valued digital assets. Certainly, it would be a leading practice to protect those systems, including active defense, ongoing monitoring, and frequent testing and practicing for a response,” she explained.
Even though it’s hard to predict what will happen in the following weeks or months, hackers will probably attempt to hack into various systems one way or another.
“The question always comes down to motivation – who is motivated to disrupt this distribution, and what is their end game. The facts are that distribution systems can be compromised, and the motivation for doing so needs to be understood in different parts of the world,” Garfield said.
What to do?
With the understanding of their crucial role in stopping the pandemic, companies that are involved in the distribution of vaccines should have an incident response practice, Mann explained.
“It’s also important to have an offline understanding of who you would need in the case of an emergency, and how to contact those people or organizations, which may include outside counsel, incident response retainers, communications teams, both internal and external and boards of directors and executive leadership. Resilience is of utmost importance, and it needs to be tested, tuned, and practiced”, she said.
Of course, some precautionary measures can be implemented, including threat intelligence services, endpoint protection, establishing and testing critical system redundancies and failovers, and prioritizing systems that are essential to distribution.
“It’s also important to have a comprehensive understanding of what’s needed to restart priority systems in the appropriate order,” Mann told CyberNews.
Hospitals need support
The line between work and home is fuzzier than ever, with millions of people working remotely. That, as it has been established many times before, amplifies the risk of cyberattacks.
“It’s important to have robust technical policies as it relates to working remotely, including the protection of endpoints and the considerations of using unmanaged devices. The cloud-based threat management tools on the market that can be deployed as a service are an important tool in a larger work from home environment. Organizations should also consider implementing and enforcing multifactor authentication, and also ensure that mobile device management enforces equivalent controls for access to cloud environments,” Mann said.
Some organizations, such as hospitals and other healthcare institutions that are holding the frontlines these days, face big challenges from the cybersecurity perspective as well. There have been numerous reports about cyberattacks on hospitals, and a ransomware attack claimed its first victim earlier this year.
“There’s no question that hospitals need support. Too often, healthcare systems’ cybersecurity is underfunded, and investing proactively is key. As one example, ransomware is a known threat, and addressing a breach is more costly than the controls needed to reduce the risk. There is also a big question around medical device security, which can impact patient care as well,” Garfield told CyberNews.
What techniques will criminals deploy while attacking companies distributing vaccines are up to our guessing, of course.
“Awareness and training are key – as always. In fact, phishing continues to be the optimal path to infiltration. Equally important are controls and configurations designed to reduce the prevalence of phishing emails, as well as new techniques for behavioral authentication that can reduce account compromises,” Mann said.