$17,000 Ransom Paid von Hollywood Medical Center (Aktualisiert) - Wie, Technologie und PC Security Forum | SensorsTechForum.com
BEDROHUNG ENTFERNT

$17,000 Ransom Paid von Hollywood Medical Center (Aktualisiert)

Wenn Sie folgen IT-Sicherheit News, Sie auf jeden Fall haben gehört, dass die Hollywood Presbyterian Medical Center von Ransomware getroffen wurde. Folglich, das Zentrum beschlossen, das Lösegeld zu zahlen, erkennen, dass sie keine andere Wahl hatte. Jedoch, the claim that the ransom demanded by cyber criminals equaled to 9,000 BitCoin, oder $3.6 Million, is nothing but a speculation, as revealed by a statement issued by HPMC’s CEO Allen Stefanek.

17-Tausend-Dollar-Lösegeld-sensorstechforum

Initial Claims of the Size of the Ransom Turn Out to Be Untrue

Mr Stefanek wrote that the reports of such payments were false:

The reports of the hospital paying 9000 Bitcoins oder $3.4 million are false. The amount of ransom requested was 40 Bitcoins, equivalent to approximately $17,000. The malware locks systems by encrypting files and demanding ransom to obtain the decryption key. The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key. In the best interest of restoring normal operations, we did this.

As seen in the quote above, the Medical Center paid 40 Bitcoins, oder $17,000, an enormous amount of money but considerably less than $3 Million.

Targeted Malware Attacks Continue in 2016

High-profile, targeted attacks are continuously increasing and affecting various financial sectors, health care being of them. This is not the first case when the affected party decides to pay cyber criminals. Leider, with some ransomware pieces decryption without the unique key in possession of its creators is not possible. Several such cases are yet to be resolved:

  • Die neueste Version von Crypto (random extensions appended to the filenames which are also changed to confuse the victim even more);
  • The latest versions of TeslaCrypt (.Mikro, .mp3, .vvv Erweiterungen);
  • The newly disclosed Locky Ransom (.locky Erweiterung).

Even though the hospital hasn’t revealed the ransomware that attacked them earlier this month, we suspect that it may be one of the pieces mentioned above. Wenn nicht, it was definitely a sophisticated form of ransomware that couldn’t be resolved with any of the known decryption utilities. Dass, or the hospital couldn’t afford to waste any time and needed to restore normal functionality as soon as possible.

More Ransomware Stories:
FBI’s Advice on Ransomware: Pay Them
Magie, the Open Source Ransomware from GitHub

Glücklicherweise, no patient was physically hurt by the ransomware attack, nor was it fatal to the employees’ personal information:

It is important to note that this incident did not affect the delivery and quality of the excellent patient care you expect and receive from Hollywood Presbyterian Medical Center (“HPMC”). Patient care has not been compromised in any way. Weiter, we have no evidence at this time that any patient or employee information was subject to unauthorized access.

Werfen Sie einen Blick auf Stefanek’s statement.

Artikel aktualisieren (Februar 19, 2016)

Our colleagues over at Heimdal Sicherheit have just confirmed that the ransomware that hit the Hollywood Presbyterian is indeed Locky. Multiple security analyses also reveal that Locky is closely related to the Dridex malware. More information will be available soon.

Milena Dimitrova

Ein inspirierter Schriftsteller und Content-Manager, der mit SensorsTechForum ist seit 4 Jahre. Genießt ‚Mr. Robot‘und Ängste‚1984‘. Konzentriert sich auf die Privatsphäre der Nutzer und Malware-Entwicklung, sie die feste Überzeugung, in einer Welt, in der Cybersicherheit eine zentrale Rolle spielt. Wenn der gesunde Menschenverstand macht keinen Sinn, sie wird es sich Notizen zu machen. Diese Noten drehen können später in Artikel!

Mehr Beiträge

Schreibe einen Kommentar

Ihre E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind markiert *

Frist ist erschöpft. Bitte laden CAPTCHA.

Auf Facebook teilen Teilen
Loading ...
Empfehlen über Twitter Tweet
Loading ...
Share on Google Plus Teilen
Loading ...
Share on Linkedin Teilen
Loading ...
Empfehlen über Digg Teilen
Teilen auf Reddit Teilen
Loading ...
Empfehlen über Stumbleupon Teilen
Loading ...