Case Studies
September 18, 2024 . 5 min read

Healthcare Case Study - Securing an Organization from Domain Compromise

Non-Disclosure Agreement

Due to the sensitive nature of the work performed, a Non-Disclosure Agreement (NDA) was signed with the client, preventing the disclosure of their name, location, and specific infrastructure details. This case study highlights the key cybersecurity challenges faced and the solutions implemented while maintaining client confidentiality.

Cyber attacks can happen to any company in this digital world; it’s just a matter of when. The team at P.I.V.O.T Security are experts in handling critical situations like these and provide dedicated expertise for incident responses for all organizations. We believe in crafting custom processes and plans based on the requirements and structure of the organization we are working with.

In this case study, we will talk about one of our healthcare clients whose database was compromised by a sophisticated threat actor. The client requested us to perform an IR (Incident Response), identifying the root cause, conducting assessments of the data loss (if any), and eradicating the threat.

Key Highlights

Key Challenges

  1. Active Directory domain compromised
  2. PHI and PII data involved
  3. Sophisticated threat actor
  4. Compliance standards not followed

Solution

  1. Detailed incident response performed
  2. Log analysis for finding root cause
  3. Critical patching and vulnerability remediation
  4. Reassessment of web apps & DB auditing

Resources and Timelines

  1. 2 days for identifying root cause
  2. Completed the IR with reports in 12 days
  3. Development and compliance team involvement with P.I.V.O.T's team

Resources and Timelines

  1. 2 days for identifying root cause
  2. Completed the IR with reports in 12 days
  3. Development and compliance team involvement with P.I.V.O.T's team

Problem Statement

The client’s server was compromised by an adversary. The attacker gained access to their database, exposing sensitive Protected Health Information (PHI) and Personally Identifiable Information (PII) of more than 10,000 customers. This posed a significant risk to the organization’s operations and compliance, especially with regulations around healthcare data protection.

We understood the web application was compromised. Once P.I.V.O.T was onboarded, our task was to understand the actual root cause and patch the web application.

Client Tech Stack:

  • Cloud infrastructure with single cloud service provider
  • Apache Tomcat Servers
  • MS SQL
  • NodeJs
  • ReactJs

Solution

Our team was brought in to handle the situation through a complete Incident Response (IR) plan. During the onboarding, we signed an NDA before starting the process. First things first, the P.I.V.O.T team assigned dedicated roles and responsibilities among their team members and with the client. This helped in formulating a core team for the IR process to accomplish the goals.

We submitted a basic report with the insights we gathered. We began with an IR, then performed a full audit of the web applications and the organization’s entire asset inventory to find weaknesses, and finally helped apply patches to secure their systems.

Incident Response Process Followed:

Incident Response Flow

  1. Security Logs and Event Data Review: The client provided us with the logs of their web and database applications. We analyzed them, and within two days, we figured out that a .env config file of a web application was exposed publicly. It contained admin credentials for the database.

  2. Gathered Evidence: Our team collected logs, event data, memory dumps, and system configurations for proof. On the 3rd day, we quickly created a report explaining the major findings.

  3. Patch and Update Systems: Once the finding was clear, the process of patching started. Our team sat with the developers and helped them patch the system and fix the misconfigurations. It took almost 48 hours to fix all the major web applications.

  4. Reassessment: We did a quick reassessment of the web application that was exposed, and the client redeployed the fix.

Other Tasks Performed:

  • Web Application and Asset Audit: We performed an in-depth audit of all web applications and assets. Tools like BurpSuite Professional and HCL AppScan were used to scan for vulnerabilities across their web applications. For some applications, we manually detected vulnerabilities along with the app scans.

  • Database and Asset Review: Since the database was breached, we reverified the security configuration, admin details, authentication, and authorization of all the storage and data processing systems to ensure the safety of the PHI and PII data post the incident response.

  • Compliance Standards Maintenance and Review: Once the above activity was complete, within two weeks, our team was tasked with reviewing the security policies according to various information security and data privacy standards, including ISO-27001, HIPAA, and GDPR. We ensured the major policy rules were followed.

Results and Outcomes

Our team’s effort led to a complete root cause analysis of the issue, ensuring that the threat actor didn’t have access to the database anymore and PHI/PII data was secured. The data of more than 10,000 customers was lost initially, but we made sure it was secure post-incident. The organization experienced minimal operational disruption and was able to maintain business continuity.

  • Web Application Secured: The configurations of the web application were fixed to not expose configuration files anymore.
  • No Further Data Exposure: Sensitive data (PHI/PII) was protected, and no additional breaches occurred.
  • Compliance Achieved: The organization successfully met various important compliance requirements, ensuring continued regulatory compliance.
  • Stronger Security: The client’s security posture was significantly improved through multiple patches and system updates.

Like what you read? Share with your community.
Is Your Incident Response Plan Effective and Regularly Updated?
Not having an up-to-date incident response plan can lead to complications such as prolonged recovery times, increased damage, and higher risks, eventually leading to the downfall of business operations. A regularly updated and thoroughly tested plan is crucial for maintaining a strong security stature.Learn More.
Share with your community!
Tags
Incident ResponseWeb application testingHealthcare
Our Product
Re-think Phishing Simulations – the AI Way
Don’t let a single click by an employee, breach your organization!
Use Phish-E, our AI-powered Phishing Simulation Platform that significantly raises your employees’ cyber awareness using the latest attack trends and templates.
Book Your 30 Seat Free Trial Now
Sign Up for Our Security Newsletter
Get the information you need conveniently delivered to your email, saving you time and effort.
logo
startupindia
Accreditations
ISO/IEC 27001:2022
ISO 9001:2015
Let’s Connect
We are on a mission to bridge the gap between offense and defense
© 2024 P.I.V.O.T Security Private Limited | Sitemap
youtube
linkedin
twitter