• chevron_right

      Health care giant comes clean about recent hack and paid ransom

      news.movim.eu / ArsTechnica · 4 days ago - 20:44 · 1 minute

    Health care giant comes clean about recent hack and paid ransom

    Enlarge (credit: Getty Images)

    Change Healthcare, the health care services provider that recently experienced a ransomware attack that hamstrung the US prescription market for two weeks, was hacked through a compromised account that failed to use multifactor authentication, the company CEO told members of Congress.

    The February 21 attack by a ransomware group using the names ALPHV or BlackCat took down a nationwide network Change Healthcare administers to allow healthcare providers to manage customer payments and insurance claims. With no easy way for pharmacies to calculate what costs were covered by insurance companies, payment processors, providers, and patients experienced long delays in filling prescriptions for medicines, many of which were lifesaving. Change Healthcare has also reported that hackers behind the attacks obtained personal health information for a "substantial portion" of the US population.

    Standard defense not in place

    Andrew Witty, CEO of Change Healthcare parent company UnitedHealth Group, said the breach started on February 12 when hackers somehow obtained an account password for a portal allowing remote access to employee desktop devices. The account, Witty admitted, failed to use multifactor authentication (MFA), a standard defense against password compromises that requires additional authentication in the form of a one-time password or physical security key.

    Read 8 remaining paragraphs | Comments

    • chevron_right

      « Nous avons vu vos comptes, vous allez donc payer cette somme » : les astuces de hackers pour faire chanter les victimes

      news.movim.eu / Numerama · 4 days ago - 15:52

    Une entreprise de cybersécurité constate une hausse dans le paiement des ransomware. Des méthodes plus « professionnelles » et ingénieuses de chantage forceraient les victimes à payer.

    • chevron_right

      Cyberattaque contre l’hôpital de Cannes : le coupable n’est nul autre que le redouté Lockbit

      news.movim.eu / Numerama · 4 days ago - 08:05

    Deux semaines après la cyberattaque contre l'hôpital Simone-Veil de Cannes, le groupe de hackers Lockbit a revendiqué l'attaque. Ce gang de pirates avait pourtant été déstabilisé par une opération des forces de l'ordre récemment.

    • chevron_right

      Professionnels en « coup de pression », ces talents que veulent embaucher les cybercriminels

      news.movim.eu / Numerama · Wednesday, 24 April - 17:22

    Des groupes de cybercriminels sont à la recherche de profils capables de trouver des informations, négocier et mettre la pression sur les victimes des cyberattaques, en particulier les grands patrons.

    • chevron_right

      Hackers are carrying out ransomware experiments in developing countries

      news.movim.eu / ArsTechnica · Wednesday, 24 April - 13:26

    Hackers are carrying out ransomware experiments in developing countries

    Enlarge (credit: Getty Images)

    Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia and South America before targeting richer countries that have more sophisticated security methods.

    Hackers have adopted a “strategy” of infiltrating systems in the developing world before moving to higher-value targets such as in North America and Europe, according to a report published on Wednesday by cyber security firm Performanta.

    “Adversaries are using developing countries as a platform where they can test their malicious programs before the more resourceful countries are targeted,” the company told Banking Risk and Regulation, a service from FT Specialist.

    Read 20 remaining paragraphs | Comments

    • chevron_right

      Des hackers extorquent des pédophiles pris au piège d’un simple logiciel malveillant

      news.movim.eu / Numerama · Monday, 22 April - 16:27

    Des chercheurs en cybersécurité ont détecté la copie malveillante d'une plateforme connue pour être fréquentée par des pédophiles. Le site clone installait un logiciel malveillant qui demandait une rançon à la cible.

    • chevron_right

      Missouri county declares state of emergency amid suspected ransomware attack

      news.movim.eu / ArsTechnica · Tuesday, 2 April - 23:59

    Downtown Kansas City, Missouri, which is part of Jackson County.

    Enlarge / Downtown Kansas City, Missouri, which is part of Jackson County. (credit: Eric Rogers )

    Jackson County, Missouri, has declared a state of emergency and closed key offices indefinitely as it responds to what officials believe is a ransomware attack that has made some of its IT systems inoperable.

    "Jackson County has identified significant disruptions within its IT systems, potentially attributable to a ransomware attack," officials wrote Tuesday . "Early indications suggest operational inconsistencies across its digital infrastructure and certain systems have been rendered inoperative while others continue to function as normal."

    The systems confirmed inoperable include tax and online property payments, issuance of marriage licenses, and inmate searches. In response, the Assessment, Collection and Recorder of Deeds offices at all county locations are closed until further notice.

    Read 10 remaining paragraphs | Comments

    • chevron_right

      Member of LockBit ransomware group sentenced to 4 years in prison

      news.movim.eu / ArsTechnica · Thursday, 14 March - 23:15

    The bars of a jail cell are pictured along with a man's hand turning a key in the lock of the cell door.

    Enlarge (credit: Getty Images | Charles O'Rear)

    A dual Canadian-Russian national has been sentenced to four years in prison for his role in infecting more than 1,000 victims with the LockBit ransomware and then extorting them for tens of millions of dollars.

    Mikhail Vasiliev, a 33-year-old who most recently lived in Ontario, Canada, was arrested in November 2022 and charged with conspiring to infect protected computers with ransomware and sending ransom demands to victims. Last month, he pleaded guilty to eight counts of cyber extortion, mischief, and weapons charges.

    During an October 2022 raid on Vasiliev’s Bradford, Ontario home, Canadian law enforcement agents found Vasiliev working on a laptop that displayed a login screen to the LockBit control panel, which members used to carry out attacks. The investigators also found a seed phrase credential for a bitcoin wallet address that was linked to a different wallet that had received a payment from a victim that had been infected and extorted by LockBit.

    Read 8 remaining paragraphs | Comments

    • chevron_right

      Amid paralyzing ransomware attack, feds probe UnitedHealth’s HIPAA compliance

      news.movim.eu / ArsTechnica · Thursday, 14 March - 18:35 · 1 minute

    Multistory glass-and-brick building with UnitedHealthcare logo on exterior.

    Enlarge (credit: Getty | Bloomberg )

    As health systems around the US are still grappling with an unprecedented ransomware attack on the country's largest health care payment processor, the US Department of Health and Human Services is opening an investigation into whether that processor and its parent company, UnitedHealthcare Group, complied with federal rules to protect private patient data.

    The attack targeted Change Healthcare, a unit of UnitedHealthcare Group (UHG) that provides financial services to tens of thousands of health care providers around the country, including doctors, dentists, hospitals, and pharmacies. According to an antitrust lawsuit brought against UHG by the Department of Justice in 2022, 50 percent of all medical claims in the US pass through Change Healthcare's electronic data interchange clearinghouse . (The DOJ lost its case to prevent UHG's acquisition of Change Healthcare and last year abandoned plans for an appeal .)

    As Ars reported previously , the attack was disclosed on February 21 by UHG's subsidiary, Optum, which now runs Change Healthcare. On February 29, UHG accused the notorious Russian-speaking ransomware gang known both as AlphV and BlackCat of being responsible. According to The Washington Post , the attack involved stealing patient data, encrypting company files, and demanding money to unlock them. The result is a paralysis of claims processing and payments, causing hospitals to run out of cash for payroll and services and preventing patients from getting care and prescriptions. Additionally, the attack is believed to have exposed the health data of millions of US patients.

    Read 7 remaining paragraphs | Comments