DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Il: Ransomware attack on Israeli IT company impacts more than 100 customers, including hospitals

Posted on July 20, 2021 by chum1ng0

Note: this report is a summary based entirely on machine translation of articles on ynet by Tal Shahaf and Calcalist by Raphael Kahan.

Shahaf reports that  Pionet , which is owned by Malam Tim, suffered a ransomware attack that has paralyzed many of the company’s systems and the sites of more than a hundred of the company’s customers, including Assuta, Rambam, Hadassah, Budget Car Rental Company, Sonol Fuel Company, and Apple importer Idigital. Idigital’s customers include the Israel Electric Corporation and Israel Railways.

The attackers have reportedly demanded a ransom of about half a million shekels (conversion: $151,861.82 USD). A ransom note demands an immediate/preliminary payment of $5000.00 in Monero.

Ransom Note
Image credit: ynet. Redacted by DataBreaches.net.

Kahan reports that the company had been warned months ago that its systems were vulnerable to attack, and the firm was reportedly given specific recommendations how to harden its security. As of the time of the attack, the company had allegedly not implemented any of them.

Both articles suggested inadequate security by Pionet had contributed to the attack, with the ynet article noting that the backup server had also been encrypted and an unnamed cybersecurity expert claiming that the customers, too, had failed to take proper security precautions. Of note, there was a report that once the attackers gained a foothold in Pionet, they were able to reach all systems managed by Pionet because they allegedly all used the same password.

The Assuta hospital, one of those impacted by the attack, reported that their appointment system was impacted for one day. It is not yet clear whether any patient information or care other than appointment scheduling was impacted by the attack on Pionet, but there  was a report that only marketing systems for hospitals were impacted.

Malam Tim had not issued any statement at the time these articles were published. The type of ransomware was not reported and while Calcalist reported some speculation that this might be the work of Iranians, there has been no proof of that.


Reporting by Chum1ng0, editing by Dissent


Related:

  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim 'largest leak ever' after uncovering WhatsApp enumeration flaw
  • Eurofiber admits crooks swiped data from French unit after cyberattack
Category: Business SectorMalwareSubcontractor

Post navigation

← Ransomware incident at major cloud provider disrupts real estate, title industry
Over 80 US Municipalities’ Sensitive Information, Including Resident’s Personal Data, Left Vulnerable in Massive Data Breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Des Moines Man Charged with Computer Fraud
  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.