WANE reports: The Indiana Department of Health announced Tuesday it is notifying nearly 750,000 Hoosiers that data from the state’s COVID-19 online contact tracing survey was improperly accessed back in July. The data included name, address, email, gender, ethnicity and race, and date of birth. “We believe the risk to Hoosiers whose information was accessed…
T-Mobile says at least 47M current and former customers affected by hack
Zack Whittaker reports: T-Mobile has confirmed that millions of current and former customers had their information stolen in a data breach, following reports of a hack over the weekend. In a statement, T-Mobile, which has more than 100 million customers, said its preliminary analysis shows 7.8 million current postpaid T-Mobile customers had information taken in the…
New details — and data — emerge from Eskenazi Health ransomware incident
On August 4, this site noted that Eskenazi Health in Indiana had reportedly gone on diversion protocols following an attempted ransomware attack. On August 9, the hospital reported that it was still on diversion but that no patient or employee data was affected by the attack – or at least as far as they could…
The Gelre hospital has been attacked by cyber criminals for three weeks
Cybercrimeinfo.nl reports: Hackers have spent three weeks trying to break into the ICT environment of Gelre hospitals. They failed to loot privacy-sensitive data or other information. As a precaution, the healthcare institutions have increased the security measures. Gelre Hospitals (Dutch: Gelre Ziekenhuizen) is a group of hospitals comprising hospitals in Apeldoorn and Zutphen, and an outpatient clinic…
Here’s how information stealers pose a threat beyond ransomware
From Intel 471: Ransomware is a top threat that security teams should be tailoring their systems to defend against. But in order to do so, they may need to look further than the ransomware itself. And by widening that scope, these teams may protect their enterprise beyond the damage that ransomware can cause. The activity…
Conti ransomware prioritizes revenue and cyberinsurance data theft
Lawrence Abrams points us to some interesting findings by Advanced Intel, who pored through the Conti manuals and materials recently dumped by a disgruntled affiliate. An interesting tactic used by the ransomware gang is using the legitimate Atera remote access software as a backdoor for continued persistence. When conducting an attack, ransomware operations commonly deploy…