Monday, April 28, 2025
HomeCyber AttackHackers Threaten Patients Following a Massive Cyberattack on a Hospital

Hackers Threaten Patients Following a Massive Cyberattack on a Hospital

Published on

SIEM as a Service

Follow Us on Google News

One of the renowned hospitals in Israel became the victim of a data breach, and patients were blackmailed with a financial motive.

According to an Israel Hayom report, Maayanei HaYeshua Medical Center in Bnei Brak was attacked, and the sensitive data of most prominent politicians and others was breached.

The attack happened at the beginning of August, and now the cybercriminals are threatening the patients with their private medical records.

- Advertisement - Google News

Mayanei HaYeshua suspected that information leaked when it was targeted by the Ranger Locker group earlier this month.

The exact amount of money demanded by the hackers has not yet been confirmed.  However, Sources tell Israel Hayom that the hackers demand tens of millions of shekels as a ransom.

Hundreds of thousands of digital information, including psychiatric evaluations and various examinations that may indicate private medical conditions among Haredi wheelers and dealers, were allegedly seized by the gang as a result of the breach.

Cyberattack on a Hospital

The cyber gang has issued an ultimatum to the hospital, threatening to release private medical records containing personal information if its demands are not granted. 

The hospital sent the following statement to Israel Hayom: “Over the past week, the cyber experts from the Health Ministry, the National Cyber Directorate, and the hospital have been investigating the attack, and this includes an evaluation as to the scope of the breach and its implications.”

There have been no negotiations of any kind with the hackers, and as we said right after the attack happened, this incident is financially motivated. 

After being approached by hackers, Health Minister Moshe Arbel released his personal health information to the public.

Instead of letting hackers extort him or expose the CT scan, he disclosed his private health information.

Actually, he had a CT scan and kidney screening before donating to a relative. However, that scan revealed a malignant kidney tumor, so Arbel had the organ removed immediately.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Latest articles

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...