While DataBreaches was aware of the 2023 incident referenced below, this site was not aware of any 2019 ransomware attack. The following is a press release issued by HHS OCR today: Today, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced a settlement with Guam Memorial Hospital Authority (GMHA),…
Category: Malware
Edmond cybersecurity CEO accused of planting malware on hospital computers
Kilee Thomas reports: Investigators said he walked right into St. Anthony Hospital and put malicious malware on an employee’s computer, which could have exposed critical patient data. Jeffrey Bowie is listed as the CEO of a cyber security company based in Edmond, but instead of helping protect St. Anthony Hospital from hackers, authorities said he…
Kyiv Region Police Expose Hackers Who Infected Notaries’ Computers with Viruses and Changed Data in State Registries
As reported on dev.ua: In the Kyiv region, police detained a group of hackers who gained remote access to the devices of state bailiffs and private notaries and, for a fee, illegally removed encumbrances imposed on citizens’ property. According to the Cyber Police, four suspects, one of whom was a private contractor, set up a scheme…
Dialysis firm DaVita hit by ransomware attack (1)
Updated April 24, 2025: The InterLock ransomware gang has claimed responsibility for this attack. They claim to have exfiltrated 1,510 GB of data, 683,104 files, and 75,836 folders, and have leaked the file tree and some folder information. Reuters reports: DaVita said on Monday it had become aware of a ransomware incident that has encrypted…
Operation Endgame follow-up leads to five detentions and interrogations as well as server takedowns
From Europol: Following the massive botnet takedown codenamed Operation Endgame in May 2024, which shut down the biggest malware droppers, including IcedID, SystemBC, Pikabot, Smokeloader and Bumblebee, law enforcement agencies across North America and Europe dealt another blow to the malware ecosystem in early 2025. In a coordinated series of actions, customers of the Smokeloader pay-per-install botnet,…
When the victimizers become the victims…. RansomHub the victim of a takeover?
In February, RansomHub was described as the leading Ransomware-as-a-Service group and as a pervasive threat to critical sectors. Weeks later, Trend Micro analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware. RansomHub was clearly developing and making a significant impact in the ransomware ecosystem. But in the blink of an eye, it seemed,…