If it sounds like a ransomware attack and they won’t tell you what’s going on for more than one week, I think ransomware sounds like a reasonable guess, and DataBreaches understands why some people are suggesting that. On November 25, The City reported: The computer network system at a major Brooklyn hospital network has been…
Liability for cyber attacks clarified by Ontario Court of Appeal
Molly Reynolds, Nic Wall, and Shalom Cumbo-Steinmetz of Torys LLP write: The Ontario Court of Appeal released a trilogy of decisions on November 25 on the availability of the “intrusion upon seclusion” tort in data breach class actions. At issue was whether the tort can be used against corporate defendants that had been hacked by…
Trigona ransomware spotted in increasing attacks worldwide
Lawrence Abrams reports: A previously unnamed ransomware has rebranded under the name ‘Trigona,’ launching a new Tor negotiation site where they accept Monero as ransom payments. Trigona has been active for some time, with samples seen at the beginning of the year. However, those samples utilized email for negotiations and were not branded under a…
GA: Federal magistrate judge recommends dismissing hacking case against Vikas Singla
In June 2021, DataBreaches reported that Vikas Singla had been indicted on charges relating to a 2018 cyberattack on Gwinnett Medical Center. At the time of the alleged attack, Singla was the chief operating officer of a metro-Atlanta network security company. He was charged with 18 counts of violating the Computer Fraud and Abuse Act…
Update: One week later, All India Institute of Medical Sciences (AIIMS) services still on manual system
Servers of the All India Institute of Medical Sciences (AIIMS) are still down as AIIMS works to recover from a ransomware attack. According to some sources, the attackers, who have not been named, had reportedly demanded about Rs 200 crore in cryptocurrency, but Delhi Police deny that AIIMS has reported receiving any such demand. Thirty…
DOD Releases Path to Cyber Security Through Zero Trust Architecture
News from U.S. DoD: The Defense Department on Tuesday released its Zero Trust Strategy and Roadmap, which spells out how it plans to move beyond traditional network security methods to achieve reduced network attack surfaces, enable risk management and effective data-sharing in partnership environments, and contain and remediate adversary activities over the next five years. “Zero…