Stuff reports: Waikato District Health Board has succeeded in court action to stop Radio New Zealand using data taken in a cyber-attack. In a decision released on Wednesday, the health board has won an interim injunction through the High Court restraining Radio NZ from accessing stolen data without consent and to permanently delete that data…
Category: Malware
UK: Isle of Wight schools hit by ransomware
Computing reports: Six schools on the Isle of Wight have been hit by a ransomware attack that resulted in the encryption of data and may delay the start of the new term. The attack, which encrypted data, hit the schools and their umbrella organisation the Isle of Wight of Education Federation between July 28th and…
U.S. medical entities fall prey to Pysa threat actors, but many haven’t disclosed it – at least, not yet.
—– A DataBreaches.net report by Dissent and Chum1ng0 —– Since 2018, threat actors known as “Pysa” (for “Protect Your System Amigo”) have used mespinoza ransomware to lock up victims’ files after exfiltrating a copy of them. In early 2020, alerts about these “big-game hunters” were published by both the FBI and CNIL . Since then,…
Coghlin Electrical Co. hit with ransomware attack
Monica Benevides reports: Worcester contractor Coghlin Electrical Corp. experienced a ransomware attack on Monday [July 26], although compromised files have been recovered, the Worcester Telegram & Gazette reported Friday. When reached via email by WBJ, Coghlin CEO Sue Mailman declined to expand on the situation. From the earlier report and this one, it sounds like…
An interview with BlackMatter
Curious about the new kids on the ransomware block and whether they are really new kids or just old hands forming a new group? Read this great interview by Dmitry Smilyanets on The Record.
Decryptor released for Prometheus ransomware victims
Catalin Cimpanu reports: Taiwanese security firm CyCraft has released a free application that can help victims of the Prometheus ransomware recover and decrypt some of their files. Available on GitHub, the decryptor effectively works by brute-forcing the encryption key used to lock the victim’s data. Read more on The Record.