Security

Cyber-crime

Enzo Biochem settles lawsuit over 2023 ransomware attack for $7.5M

That's in addition to the $4.5M fine paid to three state AGs last year


Enzo Biochem has settled a consolidated class-action lawsuit relating to its 2023 ransomware incident for $7.5 million.

The agreement was reached on January 13 and disclosed via a Form 8-K with the Securities and Exchange Commission (SEC) two days later.

In addition to the settlement fee, the agreement mandated that Enzo make "certain upgrades to its data protection systems" – the details were unspecified. These measures, it reported to the SEC, had already been completed.

The life sciences company, which develops research and diagnostic tools, also had to cough up $4.5 million to three state attorneys general just five months ago related to the same April 2023 attack.

New York attorney general Letitia James led the investigation into the company's security practices, finding various failings that led to 2.47 million people's data being compromised.

Enzo's credential hygiene was a particular point of concern. James' office's investigation into the attack [PDF] revealed that genuine company credentials were used to make the initial intrusion, and these credentials were shared among five employees.

One of the credentials hadn't been updated in ten years. Enzo also didn't require multi-factor authentication (MFA), its processes for encrypting data at rest were deemed ineffective, and it was found to have taken an "informal" approach to evaluating IT risk, among other findings.

"Getting blood work or medical testing should not result in patients having their personal and health information stolen by cybercriminals," the attorney general said at the time. 

"Healthcare companies like Enzo that do not prioritize data security put patients at serious risk of fraud and identity theft. Data security is part of patient safety, and my office will continue to hold companies accountable when they fail to protect New Yorkers."

The New York-based company responded to the attack in 2023 by making big investments in security, funding an extensive 15-point refurbishment of its cyber function.

An authentication overhaul was executed, introducing MFA and more stringent password complexity requirements. It also paid for an endpoint detection and response (EDR) system and a 24/7 managed security operations center (SOC), among other things. Adopting the fabled "Zero Trust" helped it resolve the case too.

The attack was never claimed by a known ransomware group. James's report confirmed that Enzo's systems were encrypted, but did not clarify whether a ransom was paid.

The report further revealed that attackers exfiltrated approximately 1.4 TB of Enzo's data. The types of data potentially accessed or stolen included names, dates of birth, home addresses, phone numbers, medical treatment and diagnosis information, clinical test information, and social security numbers.

The intrusion began on April 4. The company's firewall blocked numerous malicious connections but failed to notify staff because there were no systems in place dedicated to monitoring or alerting the relevant people to suspicious network activity.

It took Enzo two days to realize it had been compromised, only after the attackers lifted patient data and deployed an encryption payload, James's report stated.

The company's stock price tumbled following the attack and is now trading at $0.70 per share – its lowest since 1991.

Enzo Biochem was one of many medical companies to be hit with data-stealing cyberattacks all around the same time. Companies including Zoll, Independent Living Systems, NextGen Healthcare, and PharMerica all experienced similar events during spring 2023 and all are based in the northern hemisphere, although there is no suggestion the attacks were linked. ®

Send us news
1 Comment

Medusa ransomware gang demands $2M from UK private health services provider

2.3 TB held to ransom as biz formerly known as Virgin Care tells us it's probing IT 'security incident'

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Ransomware isn't always about the money: Government spies have objectives, too

Analysts tell El Reg why Russia's operators aren't that careful, and why North Korea wants money AND data

Experts race to extract intel from Black Basta internal chat leaks

Researchers say there's dissent in the ranks. Plus: An AI tool lets you have a go yourself at analysing the data

Healthcare outfit that served military personnel settles allegations it faked infosec compliance for $11M

If this makes you feel sick, knowing this happened before ransomware actors started targeting medical info may help

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

London celebrity talent agency reports itself to ICO following Rhysida attack claims

Showbiz members' passport scans already plastered online

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

Southern Water takes the fifth over alleged $750K Black Basta ransom offer

Leaked chats and spilled secrets as AI helps decode circa 200K private talks

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Triplestrength hits victims with triple trouble: Ransomware, cloud hijacks, crypto-mining

These crooks have no chill

US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware

Called it an 'incident' in SEC filing, but encrypted apps and data exfiltration suggest Lee just can’t say the R word