Saturday, July 20, 2024

Hackers Threaten Patients Following a Massive Cyberattack on a Hospital

One of the renowned hospitals in Israel became the victim of a data breach, and patients were blackmailed with a financial motive.

According to an Israel Hayom report, Maayanei HaYeshua Medical Center in Bnei Brak was attacked, and the sensitive data of most prominent politicians and others was breached.

The attack happened at the beginning of August, and now the cybercriminals are threatening the patients with their private medical records.

Mayanei HaYeshua suspected that information leaked when it was targeted by the Ranger Locker group earlier this month.

The exact amount of money demanded by the hackers has not yet been confirmed.  However, Sources tell Israel Hayom that the hackers demand tens of millions of shekels as a ransom.

Hundreds of thousands of digital information, including psychiatric evaluations and various examinations that may indicate private medical conditions among Haredi wheelers and dealers, were allegedly seized by the gang as a result of the breach.

Cyberattack on a Hospital

The cyber gang has issued an ultimatum to the hospital, threatening to release private medical records containing personal information if its demands are not granted. 

The hospital sent the following statement to Israel Hayom: “Over the past week, the cyber experts from the Health Ministry, the National Cyber Directorate, and the hospital have been investigating the attack, and this includes an evaluation as to the scope of the breach and its implications.”

There have been no negotiations of any kind with the hackers, and as we said right after the attack happened, this incident is financially motivated. 

After being approached by hackers, Health Minister Moshe Arbel released his personal health information to the public.

Instead of letting hackers extort him or expose the CT scan, he disclosed his private health information.

Actually, he had a CT scan and kidney screening before donating to a relative. However, that scan revealed a malignant kidney tumor, so Arbel had the organ removed immediately.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.


Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles