Corey Vallas reports N.E.O. Urology in Boardman, Ohio paid attackers $75,000 after their computer systems were encrypted by ransomware. Police say the fax listed “Pay4Day.io” as the contact for further information. Read more on WFMJ. There is no notice on the medical practice’s web site as of the time of this posting, but it’s interesting…
Category: Malware
A computer virus has thrown Philadelphia’s court system into chaos
Colin Lecher reports: Since May 21st, a virus has shut down Philadelphia’s online court system, bringing network access to a standstill. The problems started unexpectedly: suddenly, no one could seem to access the system to file documents. “It wasn’t working,” says Rachel Gallegos, a senior staff attorney with the civil legal aid organization Community Legal…
TX: Edcouch hit by ransomware
Joanna Guzman reports: A hacker gains access to the city of Edcouch and threatens to erase all the city’s information if officials did not deposit $40,000 in Bitcoins; a form of electronic cash. Information from the water department and city finances were compromised in the attack. The city manager says this comes just after the…
FL: ‘Triple Threat’ Ransomware Attack Cripples Email Systems and Services of Lake City
Cyware reports: The Lake City Police Department is investigating a ransomware attack on their city network systems that resulted in the shutdown of several emergency services. The ransomware used in the attack has been detected as ‘Triple Threat’. What happened? In a breach notification, the Lake City police have revealed that the attack occurred on…
FIN8 hackers return after two years with attacks against hospitality sector
Catalin Cimpanu reports that researchers claim to have spotted evidence of ongoing and increasing FIN8 activity: But in a report published today, cyber-security firm Morphisec said it detected and stopped new FIN8 attacks aimed at companies in the hospitality industry. These new attacks leveraged the same malware the group had used in the past but…
Eight years later, the case against the Mariposa malware gang moves forward in the US
Catalin Cimpanu reports: Eight years after US law enforcement opened a first case in the operations of the Mariposa (Butterfly Bot, BFBOT) malware gang, officials are now moving forward with new charges and arrest warrants against four suspects. The original case started way back in May 2011, when US officials first filed a complaint against…