Tuesday, March 4, 2025
HomeRansomwareHackers Compromised Navi Mumbai Hospital Computers Sytems With Ransomware

Hackers Compromised Navi Mumbai Hospital Computers Sytems With Ransomware

Published on

SIEM as a Service

Follow Us on Google News

Ransomware attack hits computer systems of Navi Mumbai Mahatma Gandhi Mission Hospital. The attack came into light on Sunday when a receptionist switched on her computer.

As soon as they noticed the attack, the hospital authorities tried to disconnect other machines from the network, but it was too late as all the system already infected reports TOI.

Hospital’s technical team trying to decrypt the data, the good news is that the hospital had data backed up until and they are also trying to gather July month data.

The ransomware is a turnkey business for some criminals, it’s become a billion-dollar industry that shows no signs of going away anytime soon. The cost of Ransomware attacks Crossed more than $1Billion in a single year alone and day by day number of Ransomware attacks are increasing and threatening around the world.

Hospital Systems administrator said we received a link with that has ransom demand from hackers, but we have not opened it.

The hospital system Computerised billing and medicine prescription were affected with the attack, authorities said last 15 days data has been encrypted.

Ransomware enter’s into the network through many possible ways that include Phishing Email, Email Attachments, Embedded Hyperlink, Websites & Downloads and Drive by Infection.

Also Read

Ransomware Attack Response and Mitigation Checklist

Magniber Ransomware Improves Its Obfuscation Techniques and Expands to Other Asian Countries

New Version of GandCrab Ransomware Attack via Compromised Websites using SMB Exploit Spreader

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...