"Ransomware Hacking Groups Post Data from 5 Healthcare Entities"

NetWalker, REvil, SunCrypt, and Pysa (also known as Mespinoza) ransomware hacking groups posted data on the dark web, allegedly stolen from Assured Imaging, University Hospital New Jersey, National Western Life, The College of Nurses of Ontario, and Nonin Medical. These hacking groups are taking advantage of the double extortion ransomware tactic, made popular by the Maze hacking group. In this tactic, threat actors try to maximize their chance of making a profit through threats of selling or auctioning stolen data to increase pressure on their victims to pay the demanded ransom. Pysa hackers claim that they stole data from Assured Imaging, potentially impacting more than 240,000 patients. The same group also claims to have stolen 1.55 GB of files, including data such as budget calculations, payment orders, current settlements, and more, from Nonin Medical. Other sensitive information allegedly stolen by hackers include patients' health status, images of scanned IDs, signatures, and passports. This article continues to discuss the alleged theft of data from five separate healthcare entities by different ransomware hacking groups in recent weeks and the response to these incidents.

HealthITSecurity reports "Ransomware Hacking Groups Post Data from 5 Healthcare Entities"

Submitted by Anonymous on