• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
maui ransomware actively targeting us healthcare organizations

Maui ransomware actively targeting US healthcare organizations

You are here: Home / General Cyber Security News / Maui ransomware actively targeting US healthcare organizations
July 7, 2022

Shutterstock

North Korean state-sponsored ransomware operators are operating a marketing campaign actively focusing on healthcare companies, according to an advisory issued by the FBI alongside the Cybersecurity and Infrastructure Security Company (CISA) and the Treasury Department.

The Maui ransomware strain has been used by North Korean hackers considering the fact that “at the very least Could 2021”, in accordance to the joint advisory. 

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The FBI also states it is noticed and responded to “multiple ransomware incidents” at health care providers throughout the sector, in which the malicious program is being employed to encrypt servers responsible for health care providers. 

These incidents involve critical things such as digital healthcare information solutions, as properly as diagnostic, imagining, and intranet providers. In some circumstances, these were identified to have disrupted the services delivered by the specific organizations for extended durations.

The CSA mentioned that the condition-sponsored cyber criminals likely think health care companies would be keen to pay back huge ransoms because they supply expert services critical to human life and wellbeing. 

“Because of this assumption, the FBI, CISA, and Treasury evaluate North Korean condition-sponsored actors are possible to continue on targeting HPH Sector companies,” it warned.

Minimising the ransomware risk

Despite the fact that it’s not known exactly how the hackers attain first entry to these healthcare systems, the CSA notes the ransomware is built for guide execution. In essence, the remote actor will use a command-line interface to interact with the malware and to identify which documents to encrypt. 

To assist mitigate likely hurt, companies are urged to apply and retain a selection of practices. These contain limiting accessibility to knowledge making use of authentications and digital certificates, minimising use of administrative accounts, turning off network device administration interfaces for large area networks (WANs), as nicely as applying a host of other resources to secure personalized identifiable data.

Furthermore, the authorities stated health care organizations really should stick to its list of cyber security tips for making ready for, mitigating, and stopping ransomware. Crucially, on the other hand, the doc advises organizations versus caving in to the requires of the cyber criminals.

A increase in healthcare attacks

Regrettably, ransomware attacks on health care organisations and providers are growing at a swift rate. Again in June, cloud security firm Zscaler’s 2022 ThreatLabz Ransomware Report discovered that attacks on the healthcare sector experienced grown exponentially, with double extortion ransomware attacks increasing by a staggering 650% in excess of 2021.

Somewhere else, an Outpost24 report very last year uncovered that 90% of web apps used by healthcare operators are thought of ‘critically exposed’ and highly inclined to vulnerabilities. 

That report also identified US health care businesses have a a lot bigger attack area when when compared to EU pharmaceutical companies, inspite of US health care vendors 30% much less external web apps.

“Any kind of information breach and downtime for health care organizations can be deadly, thus they have to just take a proactive stance to identify and mitigate potential security issues just before critical care can be impacted,” reported Nicolas Renard, security researcher at Outpost24, at the time.


Some components of this post are sourced from:
www.itpro.co.uk

Previous Post: «hack allows drone takeover via ‘expresslrs’ protocol Hack Allows Drone Takeover Via ‘ExpressLRS’ Protocol
Next Post: Over 1200 NPM Packages Found Involved in “CuteBoi” Cryptomining Campaign over 1200 npm packages found involved in "cuteboi" cryptomining campaign»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.