Security News > 2024 > January > Capital Health attack claimed by LockBit ransomware, risk of data leak
The LockBit ransomware operation has claimed responsibility for a November 2023 cyberattack on the Capital Health hospital network and threatens to leak stolen data and negotiation chats by tomorrow.
The LockBit ransomware gang has now claimed responsibility for the attack on Capital Health by listing the healthcare company on its data leak extortion portal yesterday.
While this policy has been broken numerous times by the operation's affiliates, in the attack on Capital Health, the LockBit operation says they purposely avoided encrypting the organization's files and instead only stole data.
"We purposely didn't encrypt this hospital so as not to interfere with patient care. We just stole over 10 million files," the ransomware gang stated on their data leak site.
Encryption-less ransomware attacks can still lead to system outages as part of the victim's response action, catastrophic data breaches for many people who received care in the targeted hospitals, and significant financial losses for already underfunded or economically stressed institutions.
Norton Healthcare discloses data breach after May ransomware attack.
News URL
Related news
- UnitedHealth confirms it paid ransomware gang to stop data leak (source)
- BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks (source)
- JetBrains is still mad at Rapid7 for the ransomware attacks on its customers (source)
- Stanford: Data of 27,000 people stolen in September ransomware attack (source)
- LockBit ransomware affiliate gets four years in jail, to pay $860k (source)
- Nissan confirms ransomware attack exposed data of 100,000 people (source)
- LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada (source)
- LockBit ransomware kingpin gets 4 years behind bars (source)
- GhostRace – New Data Leak Vulnerability Affects Modern CPUs (source)
- TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks (source)