Mike Robuk reports: Dish Network stated it reinstated the ability customers of its Boost Mobile brand to access account information as it provided an update on its bid to recover from a cyberattack in February. The operator last week explained Boost Mobile subscribers can pay their bills online, at stores and through apps. Dish Network remains tight-lipped…
Category: Malware
Four months after cyberattack, CHC Montlégia hospital system still offline
Seen in an article on The Brussels Times about risks to hospitals of cyberattacks: Last November the CHC Montlégia in Liège was also the victim of a cyberattack. Nearly four months later, its computer system is still offline. The only thing I could find on that was this February article on how the CHC was…
Lansing Community College dealing with “cybersecurity incident”
On March 16, Amaya Kuznicki reported: A cyberthreat shutdown Lansing Community College for the rest of the week. The school is working with the FBI, a cyber insurance response team, and the Michigan Cyber Command Center to solve the problem. LCC posted on social media Thursday that classes will not be in session Friday, but…
RAT developer arrested for infecting 10,000 PCs with malware
Bill Toulas reports: Ukraine’s cyberpolice has arrested the developer of a remote access trojan (RAT) malware that infected over 10,000 computers while posing as game applications. “The 25-year-old offender was exposed by employees of the Khmelnychchyna Cybercrime Department together with the regional police investigative department and the SBU regional department,” reads the cyberpolice’s announcement. Read more…
Bits ‘n Pieces (Trozos y Piezas)
ES: HLA Grupo Hospitalario data listed for sale after web server misconfiguration On March 14, a forum user on BreachForums listed data from the HLA Grupo Hospitalario in Spain for sale. The listing advertised 45,000 patient records and information on 1,600 doctors, with samples provided of each. HLA Grupo Hospitalario is owned by Asisa, which…
CISA Advisory: #StopRansomware: LockBit 3.0
Release Date: March 16, 2023 Alert Code: AA23-075A SUMMARY Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to…