Malware & RansomwareHIGH

Medusa Ransomware - Attacks Mississippi Hospital and County

🎯

Basically, a hacker group attacked a big hospital and a county, asking for money to stop leaking data.

Quick Summary

A major ransomware attack has struck a Mississippi hospital and a New Jersey county, demanding $800,000 in ransom. The incident disrupted vital healthcare services and exposed sensitive data risks. Authorities are investigating the attacks and working on recovery efforts.

What Happened

In a significant cyberattack, the Medusa ransomware gang has claimed responsibility for targeting the University of Mississippi Medical Center (UMMC), the largest hospital in Mississippi. This attack disrupted operations for nine days, forcing healthcare professionals to revert to analog methods for patient care. The hospital, which employs around 10,000 staff and serves as the state’s only Level I trauma center, faced immense challenges during this period. Doctors and nurses had to find innovative ways to manage patient care without access to their usual digital systems.

The attack occurred at the end of February, with the hospital fully reopening on March 2. During this time, the Medusa gang demanded a ransom of $800,000, threatening to leak sensitive data stolen from the hospital by March 20. The FBI and Department of Homeland Security were called in to assist with recovery efforts, highlighting the seriousness of the incident.

Who's Affected

The primary victims of this attack include UMMC and the patients who rely on its services. With its unique offerings, such as the only children’s hospital and organ transplant programs in Mississippi, the disruption posed a significant risk to patient care. Additionally, the attack on Passaic County in New Jersey, which serves nearly 600,000 residents, further illustrates the widespread impact of Medusa's operations. This county also faced a malware attack that compromised phone lines and IT systems across government offices.

Signs of Infection

Indicators of the ransomware attack included the sudden inability of UMMC to access its digital systems, which forced staff to use paper and pen for managing patient care. The hospital had to close all 35 clinic locations, although its emergency departments remained operational. In Passaic County, the malware attack disrupted communication systems, indicating a coordinated effort by the Medusa group to target critical infrastructure.

How to Protect Yourself

Healthcare organizations and municipalities must prioritize cybersecurity to protect against ransomware attacks. Here are some recommended actions:

  • Regularly back up data to secure locations to minimize loss during an attack.
  • Implement robust security measures, including firewalls and intrusion detection systems.
  • Train staff on recognizing phishing attempts and suspicious activities.
  • Develop an incident response plan to ensure swift action in the event of a cyberattack.

As the Medusa ransomware gang continues to target critical sectors, vigilance and preparedness are essential to mitigate risks and protect sensitive data.

🔒 Pro insight: The Medusa ransomware group's targeting of healthcare facilities underscores the urgent need for enhanced cybersecurity measures in critical sectors.

Original article from

The Record

Read Full Article

Related Pings

HIGHMalware & Ransomware

Ransomware - Google Warns of Shifting Tactics and Data Theft

Ransomware actors are changing their tactics as profits decline. Google warns that data theft is on the rise, impacting many organizations. It's crucial to adapt security measures to counter these evolving threats.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Glassworm Targets Popular React Native Packages

A serious supply chain attack has hit popular React Native packages, allowing hackers to steal credentials and cryptocurrency. Developers are at risk, especially those using the affected packages. Immediate action is required to secure systems and prevent further theft.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Android OS Attack Bypasses Mobile Payment Security

A new Android attack technique is hijacking payment apps and bypassing security. Users are at risk of unauthorized transactions and fraud. Experts recommend stronger verification methods to combat this threat.

Infosecurity Magazine·
HIGHMalware & Ransomware

Warlock Ransomware - New Post-Exploitation Techniques Revealed

The Warlock Ransomware Group has ramped up its tactics with new post-exploitation techniques. This poses a serious threat to organizations, especially those with weak security. Awareness and proactive measures are crucial to combat these evolving threats.

Dark Reading·
HIGHMalware & Ransomware

RondoDox Botnet - Expands Targets to 174 Vulnerabilities

RondoDox botnet is ramping up attacks, targeting 174 vulnerabilities with 15,000 daily exploit attempts. This surge poses significant risks to various devices globally. Organizations must act quickly to defend against these threats.

Security Affairs·
HIGHMalware & Ransomware

LeakNet Ransomware - New ClickFix Tactics Uncovered

LeakNet ransomware is using ClickFix tactics via hacked sites to trick users into running harmful commands. This new strategy broadens their reach, putting many at risk. Stay informed and protect your systems against these evolving threats.

The Hacker News·