Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267
0

Healthcare and education remain common ransomware targets | #malware | #ransomware | #hacking | #aihp


Healthcare and education sectors accounted for most of the ransomware disclosures in August, a month that remained low for confirmed attacks compared with earlier this year.

TechTarget Editorial began compiling a ransomware database in January that tracks public reports and disclosure notifications for each month. While organizations don’t always confirm that the attacks have involved ransomware, there are some key factors, including the mention of encrypted services.

Based on recent data, the slow summer of disclosures and confirmed attacks has continued. Last month’s list included 18 organizations overall, with five entries likely to have been ransomware but not confirmed. Since June, entries have remained in the teens, which does not necessarily mean ransomware attacks are down, though public reporting and disclosures appear to be. Earlier this year, we tracked between 30 to 50 disclosures and reports per month.

Cybereason CISO Israel Barak told TechTarget Editorial that ransomware remains one of the top three threats observed in incident response cases. And when phishing or identity compromises occur, ransomware is the most prevalent endgame, he said.

Jamie Levy, director of R&D at Huntress, said the cybersecurity vendor has also observed that ransomware is up, though groups have steered away from high ransom demands to target small and medium-sized businesses.

In addition to the frequency of ransomware attacks, the database also highlights the often lengthy time spans between when an attack occurred and when it was disclosed. These gaps were particularly long for some of the healthcare ransomware attacks last month; for example, two organizations, Valent U.S.A. LLC and Community Surgical Supply Inc., were hit nearly one year ago, but did not disclose the attacks until August.

Community Surgical Supply was one of a handful of healthcare-related companies on August’s list. While the Massachusetts-based medical supply company confirmed it had no indication that any information was misused, attackers did have access to sensitive information such as passport numbers and Social Security numbers. Similarly, a disclosure from Lamoille Health Partners warned patients that Social Security numbers, along with health insurance and medical treatment information, might have been compromised during a ransomware attack.

Another healthcare disclosure came from EmergeOrtho, an orthopedic practice in North Carolina with more than 45 offices. Though it referred to the ransomware attack as “sophisticated,” the practice assured patients that no medical records, treatment information or financial information was compromised as a result of the incident.

As for educational institutions, one ransomware attack took down the Mansfield Independent School District in Texas. According to a local media report, the attack shut down the school district’s website, email and phone systems. It also affected the visitor and volunteer management systems, which forced the suspension of campus visitors.

Sierra College in Rocklin, Calif., suffered a ransomware attack on Aug. 20, two days before the start of its fall semester. The community college was able to recover quickly due to security improvements implemented after a different ransomware attack in May 2021, according to a report by GovTech.

However, one of the most significant attacks on the education sector occurred against Whitworth University in Washington, which shut down the campus network for weeks just as the new school year was scheduled to start. Prominent ransomware gang LockBit claimed responsibility for the attack by posting about the university on its public leak site.

LockBit also struck Entrust, which was the most well-known victim for the month. Bleeping Computer first reported in July that the digital certificate vendor had been breached by an unnamed ransomware gang the previous month; Entrust sent security notification letters issued by CEO Todd Wilkinson that confirmed an unauthorized party had accessed its systems and stolen some files, though the notifications did not refer to any ransomware.

However, LockBit last month claimed responsibility for the attack and added Entrust on its data leak site. The ransomware gang began leaking data that allegedly belonged to Entrust before its dark web site went offline. Entrust has not confirmed that the incident involved ransomware, and the company did not respond to TechTarget Editorial’s request for comment.

Click Here For The Original Source.


————————————————————————————-

National Cyber Security

FREE
VIEW