From: "David Bray, PhD" <david.a.bray@gmail.com>
To: thejoff@gmail.com,
"Network Neutrality is back! Let´s make the technical aspects
heard this time!" <nnagain@lists.bufferbloat.net>
Subject: Re: [NNagain] Cellular outage in US hits AT&T, T-Mobile and Verizon users, Downdetector shows + Cyberattacks on hospitals are likely to increase, putting lives at risk, experts warn
Date: Fri, 23 Feb 2024 14:31:47 -0500 [thread overview]
Message-ID: <CA+aeVP8kkQZuFeQzQYx6R9zziedXG=EJExgTQZJsLyP816hMbw@mail.gmail.com> (raw)
In-Reply-To: <CAO-LeMwmCcb=nqB2mF=5Eu0AktU3Rkyc0LYkAUSh=wpk4-AXKQ@mail.gmail.com>
[-- Attachment #1: Type: text/plain, Size: 5088 bytes --]
Recognizing that AT&T appears to have been an technical issue...
UnitedHealth Group on the otherhand is being reported as a cyberattack tied
to a nation-state:
https://www.msn.com/en-us/news/technology/cyberattack-hits-unitedhealth-group-unit-by-actor-with-suspected-nation-state-ties/ar-BB1iJtnk
UnitedHealth Group disclosed Thursday one of its subsidiaries was hit this
week by a cyberattack from an actor with a suspected nation-state
association.
After detecting the incident, Minnetonka-based UnitedHealth said it
isolated the impacted information technology systems from other connecting
systems in order to contain, assess and remediate the problem.
UnitedHealth did not specify what the impacted systems are used for, but
Rhode Island-based CVS Health — one of the nation's largest pharmacy
operators — said some of its business operations were impacted by the
network interruption. CVS Health said there was no indication that its
systems had been compromised.
"We're continuing to fill prescriptions but in certain cases we are not
able to process insurance claims, which our business continuity plan is
addressing to ensure patients continue to have access to their
medications," the company said in a statement to the Star Tribune.
In a regulatory filing Thursday, UnitedHealth Group said it learned
Wednesday of a "nation-state associated cyber security threat actor" that
had gained access to some information technology systems at Change
Healthcare, a business unit that's part of the company's OptumInsight
division.
On Thu, Feb 22, 2024 at 4:38 PM le berger des photons via Nnagain <
nnagain@lists.bufferbloat.net> wrote:
> given the plus minus statistics of the american health care system putting
> them out of business might save more lives than it takes, except that
> they'll just kill those people later.
>
> On Thu, Feb 22, 2024 at 10:11 PM Dave Taht via Nnagain <
> nnagain@lists.bufferbloat.net> wrote:
>
>> On Thu, Feb 22, 2024 at 3:52 PM David Bray, PhD via Nnagain
>> <nnagain@lists.bufferbloat.net> wrote:
>> >
>> >
>> https://www.msn.com/en-gb/money/technology/cellular-outage-in-us-hits-at-t-t-mobile-and-verizon-users-downdetector-shows/ar-BB1iHBMF
>>
>> I had feared this was the natural outgrowth of the devastating DNS
>> KEYTRAP attack that was announced yesterday:
>>
>> https://www.darkreading.com/cloud-security/keytrap-dns-bug-threatens-widespread-internet-outages
>>
>> But so far the bet on nanog is that "oops, cisco deleted the sim
>> database."
>>
>> I think they are being snarky about "the" sim database. I´m pretty
>> sure they are just being snarky...
>>
>> > A cellular outage in the United States was reported by AT&T, T-Mobile,
>> Verizon and other network users on Thursday, according to outage tracking
>> website Downdetector.com.
>> >
>> > The number of reports of AT&T outages peaked at 31,931 at around 4:30
>> a.m. ET, data from Downdetector, which tracks outages by collating status
>> reports from sources including user-submitted errors on its platform,
>> showed.
>> >
>> > More than 800 service outages of U.S. wireless carriers Verizon and
>> T-Mobile were also reported on the platform.
>> >
>> > Verizon, T-Mobile and AT&T did not immediately reply to Reuters'
>> requests for comment.
>> >
>> > And this - I was just on a call where it's clear this is increasing:
>> https://www.msn.com/en-us/health/health-news/cyberattacks-on-hospitals-are-likely-to-increase-putting-lives-at-risk-experts-warn/ar-BB1ihhll
>> >
>> > WASHINGTON (AP) — Cybersecurity experts are warning that hospitals
>> around the country are at risk for attacks like the one that is crippling
>> operations at a premier Midwestern children's hospital, and that the U.S.
>> government is doing too little prevent such breaches.
>> >
>> > Hospitals in recent years have shifted their use of online technology
>> to support everything from telehealth to medical devices to patient
>> records. Today, they are a favorite target for internet thieves who hold
>> systems' data and networks hostage for hefty ransoms, said John Riggi, the
>> American Hospital Association’s cybersecurity adviser.
>> >
>> > --
>> > David Bray, PhD Principal, LeadDoAdapt Ventures, Inc.
>> > Loomis Innovation Council Co-Chair & Distinguished Fellow
>> > Henry S. Stimson Center, Business Executives for National Security
>> > _______________________________________________
>> > Nnagain mailing list
>> > Nnagain@lists.bufferbloat.net
>> > https://lists.bufferbloat.net/listinfo/nnagain
>>
>>
>>
>> --
>> 40 years of net history, a couple songs:
>> https://www.youtube.com/watch?v=D9RGX6QFm5E
>> Dave Täht CSO, LibreQos
>> _______________________________________________
>> Nnagain mailing list
>> Nnagain@lists.bufferbloat.net
>> https://lists.bufferbloat.net/listinfo/nnagain
>>
> _______________________________________________
> Nnagain mailing list
> Nnagain@lists.bufferbloat.net
> https://lists.bufferbloat.net/listinfo/nnagain
>
[-- Attachment #2: Type: text/html, Size: 7392 bytes --]
prev parent reply other threads:[~2024-02-23 19:32 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <CA+aeVP_TbNXy-tnUbb27-fiMKd8pggAZmxZqow0g4ygVHteL8A@mail.gmail.com>
2024-02-22 20:51 ` David Bray, PhD
2024-02-22 21:11 ` Dave Taht
2024-02-22 21:24 ` Bill Woodcock
2024-02-22 23:39 ` the keyboard of geoff goodfellow
2024-02-22 23:42 ` Vint Cerf
2024-02-23 0:03 ` Bill Woodcock
2024-02-23 15:41 ` Dave Taht
2024-02-22 21:37 ` le berger des photons
2024-02-23 19:31 ` David Bray, PhD [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://lists.bufferbloat.net/postorius/lists/nnagain.lists.bufferbloat.net/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CA+aeVP8kkQZuFeQzQYx6R9zziedXG=EJExgTQZJsLyP816hMbw@mail.gmail.com' \
--to=david.a.bray@gmail.com \
--cc=nnagain@lists.bufferbloat.net \
--cc=thejoff@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox