Lawrence Abrams reports: A hacking group used the Conti’s leaked ransomware source code to create their own ransomware to use in cyberattacks against Russian organizations. […] However, the tables have now turned, with a hacking group known as NB65 now targeting Russian organizations with ransomware attacks. Read more at BleepingComputer.
Category: Malware
East Tennessee Children’s Hospital updates information on ransomware incident
On March 15, this site noted that the East Tennessee Children’s Hospital had posted a notice about an IT security incident. At the time, they did not identify the incident as a ransomware incident. DataBreaches.net subsequently found some explanation for that notice — a listing on a Russian-language forum offering data from ETCH with numerous…
Five ransomware groups, five victims… will it ever ease up?
The following is a snapshot of recent attacks on U.S. healthcare entities by ransomware teams. #1 First Choice Community Healthcare – Hive Hive threat actors have never sworn off attacking the healthcare sector. In addition to claiming that they attacked the Partnership HealthPlan of California on March 19 (an attack that has impacted PHPC’s functioning),…
Ransomware negotiations are taking longer (and that’s a good thing)
Joe Uchill reports: It’s taking longer to negotiate ransomware demands. That is a good thing. Law firm BakerHosteler, which handles more than 1,250 cyber-related incidents a year, said in its annual Data Security and Incident Response report that the typical ransomware negotiation for its clients in 2021 lasted eight days. That is roughly twice as long as…
MO: Tague Family Practice patient records stolen and leaked
Tague Family Practice (TFP) in St. Louis, Missouri is a primary care practice that strives to maintain the traditional care model of a doctor who spends time getting to know you and providing preventative care as well as care for acute problems or chronic conditions. On some date unknown to DataBreaches.net, the practice fell victim…
I-SEC attacked by Conti threat actors
I-SEC is one of the main providers in the field of aviation security checks according to §5 LuftSiG (German Aviation Security Law) in Frankfurt. Conti threat actors added I-SEC to their leak site and have provided some proof of claim. There is no notice on I-SEC’s website at the time of this publication. DataBreaches.net sent…