COVID-19 hacking extends to supply chain for controlling vaccine temperature, IBM says

(Getty Images)


Written by

As drug companies turn their attention from the development to the deployment of a coronavirus vaccine, well-resourced hackers are doing the same.

IBM researchers on Thursday revealed a global spearphishing campaign they said was aimed at companies involved in the storage and transport of vaccines in temperature-controlled environments. Those controls allow the medicine to be sent to far-flung places. IBM suspects the attackers are tied to a government, but they said they didn’t have enough evidence to determine which one.

The attackers’ goal may have been to steal login credentials from those companies in order to gain future access “to corporate networks and sensitive information relating to the COVID-19 vaccine distribution,” the researchers said. It’s unclear how successful the phishing has been.

The findings illustrate how virtually every step of the months-long project by drug companies to produce a vaccine has been targeted by hackers. The U.S. government accused Chinese hackers of targeting vaccine research in May, and examples of similar espionage operations tied to North Korea and Russia have also emerged.

The phishing campaign uncovered by IBM began in September and has targeted organizations in six countries in Europe and Asia. All of the organizations appear to be associated with a supply-chain program run by Gavi, an international organization that handles vaccines.

The attackers targeted companies from the energy, manufacturing and software sectors that are supporting the distribution of a vaccine (IBM did not name any of them.) With access to internal communications at such companies, the attackers could gather information on the “infrastructure that governments intend to use to distribute a vaccine to the vendors that will be supplying it,” the IBM researchers said.

“This adversary picked the perfect cover – one that would pass scrutiny and suspicion,” Claire Zaboeva, senior cyber threat analyst at IBM Security X-Force, said in an email.

That cover saw the hackers pose as an executive at Haier Biomedical, a supplier involved in Gavi’s vaccine supply-chain program, and send phishing emails to companies supporting transportation needs for the program. China-based Haier touts itself as “the world’s only complete cold chain provider,” or organization that offers the full range of temperatures needed for storing biomedical equipment.

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency on Thursday highlighted the IBM research and urged organizations to guard against the hacking.

“Today’s report highlights the importance of cybersecurity diligence at each step in the vaccine supply chain,” said Josh Corman, CISA’s chief strategist for health care. “CISA encourages all organizations involved in vaccine storage and transport to harden attack surfaces, particularly in cold storage operation, and remain vigilant against all activity in this space.”

-In this Story-

coronavirus, Cybersecurity and Infrastructure Security Agency (CISA), health care, IBM, security research, spearphishing