Security News > 2022 > June > Cybercriminals Expand Attack Radius and Ransomware Pain Points
Rather than the typical ransom request for data restoration that has become commonplace, criminals are increasingly expanding their radius.
Secondhand victims, including dental practices and insurance providers, could be potential targets based on the data obtained in the primary ransomware attack.
"In May of 2021, Ireland's public health system, the Health Service Executive, was victimized by a ransomware attack that had significant reverberations." In the following days and weeks, multiple hospitals connected to the public health service experienced service outages and financial losses, in addition to facing increased risk to patient data safety and access to care.
These facts point to a concerning global trend that extends the negative impact of a ransomware attack.
These black market vendors are not generally the ransomware operators themselves, but a third party who sells their access to a ransomware gang and thereby accelerates the pace of the ransomware gang's operations.
Recovery should go beyond "Wipe and reimage" to include thorough checks that can identify residual signs of compromise and, wherever possible, clearly determine initial access points to avoid reintroducing the attack vector during recovery efforts.
News URL
https://threatpost.com/criminals-expand-attack-radius/179832/
Related news
- JPCERT shares Windows Event Log tips to detect ransomware attacks (source)
- Ransomware attack forces UMC Health System to divert some patients (source)
- Underground ransomware claims attack on Casio, leaks stolen data (source)
- Casio confirms customer data stolen in a ransomware attack (source)
- Schools bombarded by nation-state attacks, ransomware gangs, and everyone in between (source)
- BianLian ransomware claims attack on Boston Children's Health Physicians (source)
- Microsoft: Ransomware Attacks Growing More Dangerous, Complex (source)
- Tech giant Nidec confirms data breach following ransomware attack (source)
- Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks (source)
- Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks (source)