Operational outages have been experienced by 86% of healthcare organizations impacted by ransomware attacks, reports HealthITSecurity.
Twenty-five percent of the 57% of health organizations hit by ransomware during the past three years reported needing to stop operations, while 60% noted that certain business processes have been totally disrupted by ransomware, according to a Trend Micro report.
The findings also showed that sensitive data leaks were experienced by three-fifths of respondents. Forty-three percent of respondents cited supply chain partners as the reason for being targeted in attacks, while another 43% noted that inadequate ransomware attack chain visibility has increased their vulnerability to attacks.
Trend Micro Technical Director Bharat Mistry emphasized the adverse effect of ransomware attacks on patient safety.
"Operational outages put patient lives at risk. We can't rely on the bad guys to change their ways, so healthcare organizations need to get better at detection and response and share the appropriate intelligence with partners to secure their supply chains," said Mistry.
New attacks with the updated SysUpdate toolkit have been deployed by Chinese advanced persistent threat operation Budworm, also known as APT27, Emissary Panda, Bronze Union, Lucky Mouse, Iron Tiger, and Red Phoenix, against an Asian government and a Middle East-based telecommunications provider, reports The Hacker News.
Forty-five malicious NPM and PyPI packages have been deployed by threat actors to facilitate extensive data theft operations as part of a campaign that commenced on Sept. 12, according to BleepingComputer.
Sixty thousand emails from U.S. State Department accounts were noted by a staffer working for Sen. Eric Schmitt, R-Mo., to have been exfiltrated by Chinese threat actors during the widespread compromise of Microsoft email accounts that commenced in May, according to Reuters.