• Welcome to Christian Forums
  1. Welcome to Christian Forums, a forum to discuss Christianity in a friendly surrounding.

    Your voice is missing! You will need to register to be able to join in fellowship with Christians all over the world.

    We hope to see you as a part of our community soon and God Bless!

  2. The forums in the Christian Congregations category are now open only to Christian members. Please review our current Faith Groups list for information on which faith groups are considered to be Christian faiths. Christian members please remember to read the Statement of Purpose threads for each forum within Christian Congregations before posting in the forum.
  3. Please note there is a new rule regarding the posting of videos. It reads, "Post a summary of the videos you post . An exception can be made for music videos.". Unless you are simply sharing music, please post a summary, or the gist, of the video you wish to share.
  4. There have been some changes in the Life Stages section involving the following forums: Roaring 20s, Terrific Thirties, Fabulous Forties, and Golden Eagles. They are changed to Gen Z, Millennials, Gen X, and Golden Eagles will have a slight change.
  5. CF Staff, Angels and Ambassadors; ask that you join us in praying for the world in this difficult time, asking our Holy Father to stop the spread of the virus, and for healing of all affected.

US Hospitals hit by Russian ransomware in coordinated attack

Discussion in 'News & Current Events (Articles Required)' started by essentialsaltes, Oct 29, 2020.

  1. essentialsaltes

    essentialsaltes Stranger in a Strange Land

    United States
    Legal Union (Other)
    Russian-speaking cybercriminals in recent days have launched a coordinated attack targeting U.S. hospitals already stressed by the coronavirus pandemic with ransomware that analysts worry could lead to fatalities.

    In the space of 24 hours beginning Monday, six hospitals from California to New York have been hit by the Ryuk ransomware, which encrypts data on computer systems, forcing the hospitals in some cases to disrupt patient care and cancel noncritical surgeries, analysts said.

    The criminals have demanded a ransom ranging upward of $1 million to unlock the system, and some hospitals have paid, they said.

    On Tuesday, the FBI, the Department of Homeland Security and the Department of Health and Human Services issued a joint advisory alerting health-care providers to the threat.
    • Informative Informative x 3
    • List
    We teamed up with Faith Counseling. Can they help you today?
  2. dqhall

    dqhall Well-Known Member Supporter

    United States
    I read an article some time ago about ransomware attacks originating from Russia and North Korea.
  3. ThatRobGuy

    ThatRobGuy Part of the IT crowd Supporter

    United States
    Ransomware is nasty business.

    It's shocking that major institutions (like hospitals and city/state governments) don't have better protections in place for such things.

    In many cases, even if the "ransom" is paid, the hackers still don't unlock/decrypt the data...so moneys paid is all for naught.

    We had 9 different "ransomwares" tried to infect our company's network over the last 9 months. Thankfully, we have a pretty good InfoSec team at our company that were able to identify the threat and squash it.

    I've had the opportunity to disassemble some of the code they write for attacks like this, and while what they write is pretty intuitive, the weak-point in any corporate/government entity that gets infected by it is poor employee training.

    In a lot of these cases, the ransomware gets onto the corporate network by an employee opening a suspicious attachment, or by the organization not being very careful when they "let go" of certain employees who have an intimate knowledge of their internal infrastructure (server names, which ports are open on the DMZ, etc...)

    Every company has certain "holes" in their firewall...it's how data from the outside world (whether it be for ordering products, or data transfer from one vendor to another) makes it into internal databases, etc... Spiteful "ex-employees" are a real weak point in that regard. Any company with an InfoSec team worth their salt, knows to change TCP/UDP/SFTP ports used for such traffic when a disgruntled employee "parts ways" with the organization.
    Last edited: Oct 29, 2020