The LockBit ransomware group has claimed responsibility for the November 2023 cyberattack on the Capital Health hospital network and is threatening to leak 7 terabytes of stolen data by today if ransomware demands are not met.
Last November, the New Jersey and Pennsylvania primary healthcare service provider experienced an IT systems outage following a cyberattack on its network. Despite operations returning to normal, Capital Health’s latest updates indicate they are still investigating whether data was stolen during the cyberattack.
This past Sunday, the LockBit ransomware gang claimed responsibility for the attack on its data leak extortion portal alleging to have stolen seven terabytes of medical data which they threaten to leak today if the organization fails to meet their ransom payment demands.
“We purposely didn’t encrypt this hospital so as not to interfere with patient care. We just stole over 10 million files,” LockBit stated on their data leak site.
Emily Phelps, VP, Cyware had this to say:
“This ransomware attack underscores the critical importance of hospitals gaining access to actionable threat intelligence swiftly and effectively. Hospitals are essential service providers, and any delay in identifying and mitigating cyber threats can have dire consequences, not just for data security but also for patient care – even though the ransomware group did not encrypt the files.”
It’s nice that LockBit has some degree of ethics. But they’re still holding patient data for ransom. That’s bad for the patients involved in this through no fault of their own, it’s bad for the hospital, and it’s bad for all of us as this will just keep happening until we all get serious about locking things down so these sorts of event don’t happen.
Related
This entry was posted on January 10, 2024 at 8:47 am and is filed under Commentary. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Capital Health Pwned By LockBit
The LockBit ransomware group has claimed responsibility for the November 2023 cyberattack on the Capital Health hospital network and is threatening to leak 7 terabytes of stolen data by today if ransomware demands are not met.
Last November, the New Jersey and Pennsylvania primary healthcare service provider experienced an IT systems outage following a cyberattack on its network. Despite operations returning to normal, Capital Health’s latest updates indicate they are still investigating whether data was stolen during the cyberattack.
This past Sunday, the LockBit ransomware gang claimed responsibility for the attack on its data leak extortion portal alleging to have stolen seven terabytes of medical data which they threaten to leak today if the organization fails to meet their ransom payment demands.
“We purposely didn’t encrypt this hospital so as not to interfere with patient care. We just stole over 10 million files,” LockBit stated on their data leak site.
Emily Phelps, VP, Cyware had this to say:
“This ransomware attack underscores the critical importance of hospitals gaining access to actionable threat intelligence swiftly and effectively. Hospitals are essential service providers, and any delay in identifying and mitigating cyber threats can have dire consequences, not just for data security but also for patient care – even though the ransomware group did not encrypt the files.”
It’s nice that LockBit has some degree of ethics. But they’re still holding patient data for ransom. That’s bad for the patients involved in this through no fault of their own, it’s bad for the hospital, and it’s bad for all of us as this will just keep happening until we all get serious about locking things down so these sorts of event don’t happen.
Share this:
Like this:
Related
This entry was posted on January 10, 2024 at 8:47 am and is filed under Commentary. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.