David Paddon reports: The Medisys Health Group and its affiliate Copeman Healthcare say they paid an unspecified ransom to retrieve personal information for about 60,000 clients after detecting a security breach on Aug. 31. An email from Medisys head office in Montreal says privacy officials were notified Sept. 4, four days after the breach was…
Category: Malware
SunCrypt ransomware group swears off medical entities, sets sights on cybersecurity firms
When the SunCrypt ransomware group opened a leak site where they listed victims who had not paid their ransom demands, they attracted public attention and demonstrated their ability to use the media to their advantage. BleepingComputer reported that SunCrypt operators had reached out to them to introduce themselves as part of the Maze cartel. Days…
Hackers hit South African government fund for children and missing people
Mfuneko Toyana reports: Hackers attacked a South Africa’s justice department fund last week, the department said on Sept 30, but said it did not receive any ransom demands. They targeted a fund containing a pool of money held by the courts in trust on behalf of minors, unborn heirs and missing or absent persons, it…
Arthur J. Gallagher targeted in ransomware attack
Matt Sheehan reports: International insurance brokerage firm Arthur J. Gallagher & Co has confirmed that it was the target of a ransomware attack on September 26th. The firm said the incident impacted a “limited portion” of its internal systems, and does not expect it to have a material impact on its operations or financial condition….
Swatch shuts down some technology systems after cyberattack
Brenna Hughes Neghaiwi reports: Swatch Group UHR.S shut down some of its technology systems after detecting a cyberattack over the weekend, the world’s biggest watchmaker said on Tuesday. “Swatch Group confirms that it has identified clear signs of a developing cyber-attack on some of its IT systems during the weekend,” the company said in an emailed…
The Cyber-Avengers Protecting Hospitals From Ransomware
Sonner Kehrt has an article on CTI that begins: It was early February when Ohad Zaidenberg first started noticing malicious emails and files disguised as information about Covid. He’s a cyber intelligence researcher based in Israel, and they were the sort of schemes he encountered all the time—benign-looking messages that trick people into giving someone network…