Monday, May 12, 2025
HomeCyber Security NewsCybersecurity Firm CEO Arrested for Planting Malware in Hospital Systems

Cybersecurity Firm CEO Arrested for Planting Malware in Hospital Systems

Published on

SIEM as a Service

Follow Us on Google News

Jeffrey Bowie, the CEO of a local cybersecurity firm, has been arrested for allegedly planting malware on computers at SSM St. Anthony Hospital.

Bowie, who until recently touted himself as a leader in protecting businesses from cyber threats, now faces charges that he became the very threat he promised to prevent.

Police say the incident unfolded on August 6, 2024, when an alert employee noticed Bowie, a non-hospital staff member, using a computer designated strictly for employees.

- Advertisement - Google News

The employee’s quick-thinking report set off an immediate internal investigation by the hospital’s IT teams.

A subsequent forensic review revealed that Bowie had installed sophisticated malware on the system.

According to the News9 report, a probable cause affidavit states that the malware was programmed to capture a screenshot every 20 minutes, automatically transmitting those images to an outside location.

Such malware could have provided an unauthorized window into sensitive hospital operations, raising concerns about potential data leaks, privacy violations, and system vulnerabilities.

Bowie is now facing two counts of violating the Oklahoma Computer Crimes Act.

Authorities have not disclosed the possible motives behind his actions but are investigating any connections between Bowie’s cybersecurity firm and the hospital prior to the incident.

In response to the incident, SSM Health released a statement reassuring patients and the public:
“On August 6, 2024, an unauthorized individual was identified accessing a hospital computer in an alleged attempt to install malware. The protection of data and the integrity of our systems are top priorities. Due to precautions in place, the issue was addressed immediately, and no patient information was accessed. We worked closely with law enforcement during the investigation.”

Cybersecurity industry experts say the incident is a sobering reminder that those entrusted with safeguarding critical infrastructure can sometimes pose the greatest risk. “When the guards become the threat, it’s particularly troubling,” said Dr. Alicia Martinez, a cybersecurity analyst. “It highlights the importance of robust internal controls and employee vigilance.”

SSM Health says it has since conducted a thorough review of its computer systems and has increased monitoring and employee training.

“We want our patients and staff to know their safety and privacy are paramount,” the spokesperson added.

Bowie remains in custody as the investigation continues. If convicted, he could face significant penalties under Oklahoma’s computer crimes statutes.

The incident has sparked renewed conversations about trust, oversight, and accountability in the cybersecurity sector.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability...

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability...

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...