Britton White writes: After a university was recently hit with Ransomware, I decided to research the university’s domain name searching for any users who might have been hit with Redline Infostealer/Malware. To no surprise, I found many students had unknowingly had their saved browser credentials scraped (stolen/exfiltrated). It didn’t take long to find a student…
Category: Malware
Conti’s Ransomware Toll on the Healthcare Industry
Brian Krebs reports: Conti — one of the most ruthless and successful Russian ransomware groups — publicly declared during the height of the COVID-19 pandemic that it would refrain from targeting healthcare providers. But new information confirms this pledge was always a lie, and that Conti has launched more than 200 attacks against hospitals and other…
RIPTA says it paid hackers $170K in ransom money after massive data breach
ABC6 reports: The Rhode Island Public Transit Authority said Thursday it paid hackers $170,000 in ransom money after a massive data breach in August. The hack exposed the names, birth dates, and social security numbers of thousands of state employees, some of which didn’t even work for the agency. Read more at ABC6. The incident, which affected 22,000…
Patients increasingly suing hospitals over data breaches
Jeff Lagasse reports: Industries are increasingly being sued by consumers for data breaches, but the sector with the biggest litigation increase is healthcare, according to new findings from the law firm BakerHostetler. In fact, healthcare comprises 23% of lawsuits due to data breaches. The next highest after that is business and professional services at 17%,…
Russian hackers tried to sabotage Ukrainian power grid – officials, researchers
Reuters reports: Russian hackers attempted to launch a destructive cyberattack on Ukraine’s electricity grid last week, Ukrainian officials and cybersecurity researchers said on Tuesday. The group, dubbed “Sandworm” by security researchers and previously tied to destructive cyberattacks attributed to Russia, deployed destructive and data-wiping malware on computers controlling high voltage substations in Ukraine, the Computer…
LockBit ransomware gang lurked in a U.S. gov network for months
Bill Toulas reports: A regional U.S. government agency compromised with LockBit ransomware had the threat actor in its network for at least five months before the payload was deployed, security researchers found. Logs retrieved from the compromised machines showed that two threat groups had compromised them and were engaged in reconnaissance and remote access operations….