Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

2021 could bring more vaccine-related cyberattacks, here’s how distribution organizations should prep

By Jay Paz
vaccine covid
February 2, 2021

The COVID-19 vaccine is rolling out to the public, and in the past few months we’ve witnessed cyber criminals take advantage of vaccine logistical networks through supply chain attacks: a technique where cybercriminals infiltrate a network through an outside provider with access to its systems.

As vaccine distribution continues through 2021, the companies managing the process must proactively think about their current risk level, how they can decrease that risk, and how they can strengthen their security posture moving forward.

 

Breaking down IBM’s December 2020 warning:

Healthcare distribution networks are behind on their cybersecurity measures. However, there are some legitimate reasons for this.

Healthcare distribution networks face challenges that spur from working on legacy systems storing a lot of private data. From a pentesting perspective, these organizations are typically hesitant to conduct routine cybersecurity checks due to the risk of outage during critical procedures that can put patients’ lives at risk.

To best understand how easily cyber criminals can operate against healthcare distribution networks, let’s break down IBM’s December 2020 Advisory and what caused it. The advisory stated that threat actors “sent phishing emails to executives involved in vaccine storage and transport to harvest account credentials.” The way the criminals conducted these attacks were successful in two-fold.

First, phishing attacks are easy to perform. Internet service providers like Gmail and Yahoo! grant untraceable email access to virtually anyone. Similarly, it takes minutes to register a new domain name - one that is similar to the targeted organization.

Second, phishing is just the tip of the iceberg when it comes to access. Once a threat actor swindles a victim into granting them one login credential, knowing the human tendency to use one password for many portals, criminals can gain access to a suite of data.

This data and systems access enables them to carry out higher-stakes ransomware and malware attacks. Put simply, a threat actor leverages phishing to “fish” for what else they can find to do more damage. These threat actors don’t necessarily need to have a target in mind; they are agents of chaos and opportunity.

A simple phish could even lead to a physical social engineering attack. Consider this scenario: I’m targeting a vaccine developer, and I phish one of their employees. I find the distribution partnership they have, as well as the destination of the vaccine shipment. I can then identify the truck that is physically transporting the load (easily spotted based on their sub-zero temperature capability). I could find its end destination, make my way into the warehouse, and physically unplug the refrigerated trucks: resulting in financial damages -- and worse, putting lives at risk by delaying the vaccines.

 

How distribution and healthcare organizations must proactively protect themselves:

A simple phishing attack can yield major destruction for healthcare distribution organizations. Here’s how they should think about their cybersecurity posture for the year to come.

First, they must understand that in the criminal world, data is the new currency. When you agree to do work with another company, there is a trust extension that must be made when it comes to data and systems access.

So, for those that are moving the vaccine and working directly with healthcare organizations, the first step to data protection is classification. Understanding what your data is, what risk level it has, and how you are storing it is key. Then, segmenting that data to only provide access to those who need it is crucial.

Conducting regular pentests can be extremely helpful for these distribution organizations. A thorough security assessment can help them identify weaknesses or flaws an attacker could exploit to impact confidentiality. Now more than ever, pentesting should be as much of a precaution to distribution networks as background checking drivers.

Organizations should also leverage anti-phishing tooling installed to email platforms. But that solution may not be 100% foolproof: cue social engineering. The weakest link in any cybersecurity program is the end user. This is where security awareness training comes in. This, in combination with threat modeling and pentesting, enables employees to understand where they could be the bottom line for attacks.

It’s all about enhancing the maturity of a cybersecurity program. To prevent attacks, vaccine distribution organizations can’t just think about the technical solutions of a cybersecurity program. They must adopt cybersecurity “layers” that help them prepare for the worst.

KEYWORDS: COVID-19 cyber security pandemic risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jay Paz is Cobalt’s Director of Pentest Operations and Research. He has more than 12 years of experience in information security and 20 years of information technology experience including system analysis, design and implementation for enterprise level solutions. At Cobalt, he lays the groundwork for innovation and scale as he oversees operations and day-to-day management for Cobalt’s pentester community.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security champions program

    Here’s why your organization needs a security champions program

    See More
  • skills-freepik1170x658.jpg

    Stuck in the cybersecurity talent chasm? Here's how industrial organizations can climb out

    See More
  • Tax documents and coffee mug

    Cybersecurity experts share how AI could enhance tax-related scams

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing