WROC reports: A ransomware attack at Jordan Health caused the center to take precautions and shut down computers at the facility. […] So far, forensics show patient data was not accessed. That information is stored on a separate and encrypted server that was not targeted in the attack. Read more on RochesterFirst.
Ryuk Ransomware Attack in Florida Forces Prosecutor to Drop Charges in Drug Cases
Silviu Stahie reports: A ransomware attack against the police department in Stuart, Florida last year had an unexpected consequence; the police officers had to drop several cases after losing important evidence. Read about it on Hot for Security. The story was first reported by WPTV.
OnlyFans says it wasn’t hacked after hundreds of performers’ videos leak online
Jacob Kastrenakes and Megan Farokhmanesh report: More than 1.6TB worth of videos and images from OnlyFans has been leaked online. The data dump appears to be primarily comprised of women’s accounts, specifically those who use the site to share pornographic images. OnlyFans claims it’s not due to a hack, though. Steve Pym, OnlyFans’ marketing chief, said…
UPDATE: TQL says data breach was not malware or ransomware attack
Clarissa Hawes reports: Total Quality Logistics (TQL) says it will continue to work with an expert cybersecurity firm to find out how external hackers breached its IT systems and gained access to some carriers’ sensitive business information. Tom Millikin, corporate communications manager of TQL, told FreightWaves the data breach was not a malware or ransomware…
Nemty Ransomware Actively Distributed via ‘Love Letter’ Spam
Sergiu Gatlan reports: Security researchers have spotted an ongoing malspam campaign using emails disguised as messages from secret lovers to deliver Nemty Ransomware payloads on the computers of potential victims. The spam campaign was identified by both Malwarebytes and X-Force IRIS researchers and has started distributing malicious messages yesterday via a persistent stream of emails. Read…
How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer
Lily Hay Newman reports: John Strand breaks into things for a living. As a penetration tester, he gets hired by organizations to attack their defenses, helping reveal weaknesses before actual bad guys find them. Normally, Strand embarks on these missions himself, or deploys one of his experienced colleagues at Black Hills Information Security. But in…