Site Status
If you see this message. The move to a new host has completed
Most Recent Posts
AC v 12.0.0
by ChrisFNP - 01/09/2025 6:27 PM
Wednesday, Thursday, Friday and Saturday nights
by ChrisFNP - 01/09/2025 6:23 PM
Medical Billing and Coding Essential
by MZ Medical Billi - 01/06/2025 4:52 AM
Searching ICD 110 Codes
by JBS - 01/04/2025 10:30 AM
Time sensitive MIPS news for 2024 reporting
by JBS - 12/27/2024 10:15 AM
AC Billing Software
by Mnemonic - 12/24/2024 12:16 PM
imported items
by ACZ - 12/13/2024 6:57 PM
Covid-19 vaccine
by Naeem - 12/13/2024 6:51 PM
Member Spotlight
Sandeep
Sandeep
California
Posts: 2,316
Joined: April 2011
Newest Members
girlfromwebpage, thomastommy12312, Dr M @ EmmFamPr, Stella, BritbikeMorgan
4,588 Registered Users
Previous Thread
Next Thread
Print Thread
Rate Thread
Joined: Apr 2011
Posts: 2,316
Likes: 2
Sandeep Offline OP
G
Member
OP Offline
G
Member
Joined: Apr 2011
Posts: 2,316
Likes: 2
Quote
Negotiating with criminals doesn't always work out, as Kansas Heart Hospital in Wichita learned last week. The hospital paid to get files back after falling victim to ransomware, but only got "partial access" and a demand for more money, Techspot is reporting.

That's right: the criminals got their ransom, and then decided they wanted more money. The hospital's president, Dr. Greg Duick says the hospital is not paying up.

"I'm not at liberty, because it's an ongoing investigation, to say the actual exact amount," said Duick. "A small amount was [paid]."

The hospital had a plan for this sort of attack, and it's not clear why it didn't work. Without more details from Kansas Heart, it's hard to say. But there's at least one bright side.
Source - Fox News

Joined: Nov 2006
Posts: 2,084
Member
Offline
Member
Joined: Nov 2006
Posts: 2,084
I wonder if this was the "Locky" ransomeware. The email looks like a request for payment with an attachment "invoice". When you open the attachment, it asks you to allow macros. If you do, it encrypts your files and demands payment to unlock, usually in bitcoin.

It has come to several of our office emails, including an email linked to our Updox workspace. Fortunately none of our staff have fallen for it.


John
Internal Medicine
Joined: Sep 2003
Posts: 12,856
Likes: 32
Member
Offline
Member
Joined: Sep 2003
Posts: 12,856
Likes: 32
MalwareBytes recommends strongly that you NOT pay the ransom. Of course, with a hospital that may not be so easy.

The FBI, which until now, did not have a stance either way has come out and urged people NOT to pay the ransom.

It doesn't seem good for business for the criminals to not send the encryption key. Just this story alone would convince many people not to pay.

I could see falling for the attachment, but then enabling macros. That's crazy.


Bert
Pediatrics
Brewer, Maine

Joined: Sep 2010
Posts: 362
Likes: 6
Member
Offline
Member
Joined: Sep 2010
Posts: 362
Likes: 6
I'm trying to educate my staff on these threats. I have everyone including myself loggin in as a standard user (non-administrator). How much does that help to protect us?

For attachment macro attacks should we be specifically disabling them somewhere in Office? And can any non-administrator "enable" macros?

Of course I've instructed staff to not open attachments in general unless really sure of the source.

We apply all our microsoft, adobe reader, java patches promptly.

Backups including disconnected drive.

Anything else for prevention recommended?


Larry
Solo IM
Midwest

Moderated by  ChrisFNP, DocGene, JBS, Wendell365 

Link Copied to Clipboard
ShoutChat
Comment Guidelines: Do post respectful and insightful comments. Don't flame, hate, spam.
Who's Online Now
0 members (), 34 guests, and 13 robots.
Key: Admin, Global Mod, Mod
Top Posters(30 Days)
JBS 3
Bert 2
ACZ 1
tcosta 1
Top Posters
Bert 12,856
JBS 2,976
Wendell365 2,362
Sandeep 2,316
ryanjo 2,084
Leslie 2,002
Wayne 1,889
This board is dedicated to the memory of Michael "Indy" Astleford. February 6, 1961 -- April 16, 2019




SiteLock
Powered by UBB.threads™ PHP Forum Software 7.7.5