Lance's Corner

DFS Issues Cybersecurity Alert on Remote Technology Workers

Nov 1, 2024

Per the notice below, the New York State Department of Financial Services (DFS) has issued a cybersecurity alert to all its regulated entities about the use of remote technology workers.

Industry Letter

Date: November 1, 2024

To: All DFS-Regulated Entities

Re: Cybersecurity Advisory – Threats Posed by Remote Technology Workers with Ties to Democratic People’s Republic of Korea

The New York State Department of Financial Services (“DFS”) cautions all regulated entities to be aware of applicants for remote technology-related positions as there has recently been an increase in reports of threats originating from the Democratic People’s Republic of Korea (“North Korea”).  Regulators and law enforcement have identified repeated attempts by threat actors seeking remote Information Technology (“IT”) jobs at U.S. companies to access company systems and illicitly generate revenue for North Korea.  This advisory provides background information about common methods used by these threat actors, how to identify applicants and employees that may have ties to a foreign threat actor, and recommended steps companies should take to protect against this threat.

Background

IT workers operating on behalf of North Korea have used various tactics to attempt to obtain employment with U.S. companies.  The applicants often pose as individuals from the U.S. and other countries, using false and stolen identities and proxy accounts that belong to U.S.-based individuals, some of whom may knowingly sell their identities, assist with account creation and maintenance, and participate in pre-employment drug screening tests.  North Korean threat actors often use virtual private networks (“VPNs”) to appear as though they originate from and reside in U.S.-based locations when applying for telework positions.  Applicants involved in this scheme may ask companies to ship devices to an alternative location just prior to commencing employment, where the device may be accessed by a U.S.-based co-conspirator.  They may also decline to participate in any in-person or video conferences, opting instead to communicate via messaging or phone.  In addition, they often download remote access protocols to allow threat actors from overseas to remotely access the work device and ultimately the targeted systems.  North Korean workers have been known to use native tools on systems to blend in with normal computer and network activity in an attempt to avoid detection.  Advisories regarding these threats have been issued by the Federal Bureau of Investigation and the United States Department of State.  More information on these threats and recommended best practices for employers issued by those agencies is available here and here.

Steps to Protect Information Systems from Foreign Threat Actors

DFS urges companies to take the following steps to exercise diligence to protect information systems and nonpublic information.

Raise awareness with senior executives, information security personnel, and human resources.  Companies should disseminate information about this threat to senior executives, hiring managers, cybersecurity personnel, and Third-Party Service Providers (“TPSPs”).  They should assess whether certain personnel would benefit from a targeted training about this threat.  In addition, companies that use staffing agencies or hiring platforms should confirm that these TPSPs are aware of this threat, and that the TPSPs implement cybersecurity best practices when vetting applicants on their behalf.

Conduct due diligence during the hiring process.  Companies should conduct stringent background checks and identity verification procedures during the hiring process.  For example, companies should require more than just one official government document to verify identity, such as passports and national IDs; scrutinize social media accounts carefully; confirm applicants’ physical and IP address locations; and detect VPN and proxy server usage at all times, but especially during the interview process.  Verification of employment references is key to knowing an employee’s true identity and should be conducted thoroughly and with great care.  In addition, companies should assess whether to require live interviews or video interviews with cameras on to provide a clear view of the applicant and their background.  During or following the interview, employers should also confirm that the pictures from the applicant’s identification documents match the person on camera.  Companies should also review applicants’ phone numbers for the use of Voice over Internet Protocol (“VOIP”) numbers.

Implement technical and monitoring controls.  Companies should assess their own risks related to applicants and insider threats and should implement appropriate measures to mitigate these risks.  Examples of technical controls that companies should consider include tracking and geolocating corporate laptops and cellphones to ensure they are delivered and remain at the initially reported residence.  Companies should also immediately flag as suspicious any change of address, use of mail forwarding, or atypical working patterns.  In addition, companies should monitor for and restrict suspicious IP address locations, unusual network traffic, and any unapproved use of all remote access tools.  Depending on the organization’s risk profile, organizations should also consider engaging a cybersecurity vendor that specializes in detecting and monitoring potential threats, including but not limited to those linked to North Korea.

Proceed cautiously with all remote technology employees.  Companies should strictly limit remote employees’ access to systems and data necessary to perform their jobs.  Access levels may gradually increase over time when necessary to accommodate employees’ expanded role.  In addition, companies should assess whether to restrict employees’ ability to use and install remote access tools, as these can permit backdoors into or direct access to companies’ networks.  Companies should also enhance monitoring of remote workers’ internet activity, including visits to any overseas or otherwise unnecessary websites.

Notify law enforcement and regulators.  If a company suspects that they may be a victim of a remote worker scheme or have been approached by a fraudulent IT worker, the company should investigate and report to the FBI’s Internet Crime Complaint Center (“IC3”) at www.IC3.gov immediately.  In addition, companies should confirm that they are fulfilling reporting obligations to DFS under 23 NYCRR § 500.17, as well as reporting obligations under other state or federal laws.

USDOL Issues Comprehensive Employer Guidance on Long COVID

The United States Department of Labor (USDOL) has issued a comprehensive set of resources that can be accessed below for employers on dealing with Long COVID.

Supporting Employees with Long COVID: A Guide for Employers

The “Supporting Employees with Long COVID” guide from the USDOL-funded Employer Assistance and Resource Network on Disability Inclusion (EARN) and Job Accommodation Network (JAN) addresses the basics of Long COVID, including its intersection with mental health, and common workplace supports for different symptoms.  It also explores employers’ responsibilities to provide reasonable accommodations and answers frequently asked questions about Long COVID and employment, including inquiries related to telework and leave.

Download the guide

Accommodation and Compliance: Long COVID

The Long COVID Accommodation and Compliance webpage from the USDOL-funded Job Accommodation Network (JAN) helps employers and employees understand strategies for supporting workers with Long COVID.  Topics include Long COVID in the context of disability under the Americans with Disabilities Act (ADA), specific accommodation ideas based on limitations or work-related functions, common situations and solutions, and questions to consider when identifying effective accommodations for employees with Long COVID.  Find this and other Long COVID resources from JAN, below:

Long COVID, Disability and Underserved Communities: Recommendations for Employers

The research-to-practice brief “Long COVID, Disability and Underserved Communities” synthesizes an extensive review of documents, literature and data sources, conducted by the USDOL-funded Employer Assistance and Resource Network on Disability Inclusion (EARN) on the impact of Long COVID on employment, with a focus on demographic differences.  It also outlines recommended actions organizations can take to create a supportive and inclusive workplace culture for people with Long COVID, especially those with disabilities who belong to other historically underserved groups.

Read the brief

Long COVID and Disability Accommodations in the Workplace

The policy brief “Long COVID and Disability Accommodations in the Workplace” explores Long COVID’s impact on the workforce and provides examples of policy actions different states are taking to help affected people remain at work or return when ready.  It was developed by the National Conference of State Legislatures (NCSL) as part of its involvement in USDOL’s State Exchange on Employment and Disability (SEED) initiative.

Download the policy brief

Understanding and Addressing the Workplace Challenges Related to Long COVID

The report “Understanding and Addressing the Workplace Challenges Related to Long COVID” summarizes key themes and takeaways from an ePolicyWorks national online dialogue through which members of the public were invited to share their experiences and insights regarding workplace challenges posed by Long COVID.  The dialogue took place during summer 2022 and was hosted by USDOL and its agencies in collaboration with the Centers for Disease Control and Prevention and the U.S. Surgeon General.

Download the report

Working with Long COVID

The USDOL-published “Working with Long COVID” fact sheet shares strategies for supporting workers with Long COVID, including accommodations for common symptoms and resources for further guidance and assistance with specific situations.

Download the fact sheet

COVID-19: Long-Term Symptoms

This USDOL motion graphic informs workers with Long COVID that they may be entitled to temporary or long-term supports to help them stay on the job or return to work when ready, and shares where they can find related assistance.

Watch the motion graphic

A Personal Story of Long COVID and Disability Disclosure

In the podcast “A Personal Story of Long COVID and Disability Disclosure,” Pam Bingham, senior program manager for Intuit’s Diversity, Equity and Inclusion in Tech team, shares her personal experience of navigating Long COVID symptoms at work.  The segment was produced by the USDOL-funded Partnership on Employment and Accessible Technology (PEAT) as part of its ongoing “Future of Work” podcast series.

Listen to the podcast

HHS OIG Issues Annual Report on State MFCUs

Per the notice below, the Office of the Inspector General (OIG) of the United States Department of Health and Human Services (HHS) has issued its annual report on the performance of state Medicaid Fraud Control Units (MFCUs).

Medicaid Fraud Control Units Fiscal Year 2023 Annual Report (OEI-09-24-00200) 

Medicaid Fraud Control Units (MFCUs) investigate and prosecute Medicaid provider fraud and patient abuse or neglect. OIG is the Federal agency that oversees and annually approves federal funding for MFCUs through a recertification process. This new report analyzed the statistical data on annual case outcomes—such as convictions, civil settlements and judgments, and recoveries—that the 53 MFCUs submitted for Fiscal Year 2023.  New York data is as follows:

Outcomes

  • Investigations1 - 556
  • Indicted/Charged - 9
  • Convictions - 8
  • Civil Settlements/Judgments - 28
  • Recoveries2 - $73,204,518

Resources

  • MFCU Expenditures3 - $55,964,293
  • Staff on Board4 - 257

1Investigations are defined as the total number of open investigations at the end of the fiscal year.

2Recoveries are defined as the amount of money that defendants are required to pay as a result of a settlement, judgment, or prefiling settlement in criminal and civil cases and may not reflect actual collections.  Recoveries may involve cases that include participation by other Federal and State agencies.

3MFCU and Medicaid Expenditures include both State and Federal expenditures.

4Staff on Board is defined as the total number of staff employed by the Unit at the end of the fiscal year.

Read the Full Report

View the Statistical Chart

Engage with the Interactive Map

GAO Issues Report on Medicaid Managed Care Service Denials and Appeal Outcomes

The United States Government Accountability Office (GAO) has issued a report on federal use of state data on Medicaid managed care service denials and appeal outcomes.  GAO found that federal oversight is limited because it doesn't require states to report on Medicaid managed care service denials or appeal outcomes and there has not been much progress on plans to analyze and make the data publicly available.  To read the GAO report on federal use of state data on Medicaid managed care service denials and appeal outcomes, use the first link below.  To read GAO highlights of the report on federal use of state data on Medicaid managed care service denials and appeal outcomes, use the second link below.
https://www.gao.gov/assets/d24106627.pdf  (GAO report on federal use of state data on Medicaid managed care service denials and appeal outcomes)
https://www.gao.gov/assets/d24106627_high.pdf  (GAO highlights on federal use of state data on Medicaid managed care service denials and appeal outcomes)

CMS Issues Latest Medicare Regulatory Activities Update

The Centers for Medicare and Medicaid Services (CMS) has issued its latest update on its regulatory activities in the Medicare program.  While dentistry is only minimally connected to the Medicare program, Medicare drives the majority of health care policies and insurance reimbursement policies throughout the country.  Therefore, it always pays to keep a close eye on what CMS is doing in Medicare.  To read the latest CMS update on its regulatory activities in Medicare, use the link below.
https://www.cms.gov/training-education/medicare-learning-network/newsletter/2024-03-14-mlnc