Saturday, March 15, 2025
HomeRansomwareHackers Compromised Navi Mumbai Hospital Computers Sytems With Ransomware

Hackers Compromised Navi Mumbai Hospital Computers Sytems With Ransomware

Published on

SIEM as a Service

Follow Us on Google News

Ransomware attack hits computer systems of Navi Mumbai Mahatma Gandhi Mission Hospital. The attack came into light on Sunday when a receptionist switched on her computer.

As soon as they noticed the attack, the hospital authorities tried to disconnect other machines from the network, but it was too late as all the system already infected reports TOI.

Hospital’s technical team trying to decrypt the data, the good news is that the hospital had data backed up until and they are also trying to gather July month data.

The ransomware is a turnkey business for some criminals, it’s become a billion-dollar industry that shows no signs of going away anytime soon. The cost of Ransomware attacks Crossed more than $1Billion in a single year alone and day by day number of Ransomware attacks are increasing and threatening around the world.

Hospital Systems administrator said we received a link with that has ransom demand from hackers, but we have not opened it.

The hospital system Computerised billing and medicine prescription were affected with the attack, authorities said last 15 days data has been encrypted.

Ransomware enter’s into the network through many possible ways that include Phishing Email, Email Attachments, Embedded Hyperlink, Websites & Downloads and Drive by Infection.

Also Read

Ransomware Attack Response and Mitigation Checklist

Magniber Ransomware Improves Its Obfuscation Techniques and Expands to Other Asian Countries

New Version of GandCrab Ransomware Attack via Compromised Websites using SMB Exploit Spreader

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware

The increasing popularity of generative artificial intelligence (GenAI) tools, such as OpenAI’s ChatGPT and...

U.S. Charges LockBit Ransomware Developer in Cybercrime Crackdown

The U.S. Department of Justice has charged Rostislav Panev, a dual Russian and Israeli...

Decrypting Akira Ransomware on Linux/ESXi Without Paying Hackers

A team successfully decrypted an instance of the Akira ransomware on Linux/ESXi systems without...