{"id":21330,"date":"2023-02-23T16:10:46","date_gmt":"2023-02-24T00:10:46","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/02\/23\/news-15061\/"},"modified":"2023-02-23T16:10:46","modified_gmt":"2023-02-24T00:10:46","slug":"news-15061","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/02\/23\/news-15061\/","title":{"rendered":"BlackCat ransomware targets another healthcare facility"},"content":{"rendered":"<p>In a statement issued Monday morning, Lehigh Valley Health Network said it&nbsp;had been the target of a cyberattack&nbsp;attributed to&nbsp;a ransomware gang known as BlackCat. The Network is made up of&nbsp;13 hospital campuses, as well as other health facilities, and is based in Pennsylvania.<\/p>\n<h2>BlackCat<\/h2>\n<p>The ransomware-as-a-service (RaaS) group BlackCat, also known as ALPHV and Noberus, is currently one of the most active groups, and has been associated with Russia. In our recent <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/02\/ransomware-in-february-2023\">February ransomware review<\/a> it came in second after Lockbit, based on the number of known attacks.<\/p>\n<p>In December, 2022, the Office of Information Security and Health Sector Cybersecurity Coordination Center issued an extensive <a href=\"https:\/\/www.aha.org\/system\/files\/media\/file\/2022\/12\/hc3-tlp-clear-analyst-note-blackcat-aka-alphv-12-12-22.pdf\" target=\"_blank\">Analyst Note<\/a> which identified BlackCat as a &#8220;relatively new but highly-capable&#8221; ransomware threat to health care providers.<\/p>\n<p>BlackCat uses double extortion and sometimes triple extortion to make victims pay the ransom.&nbsp;That means that besides encrypting files, the gang also threaten to publish the stolen data on a so-called &ldquo;leak site&rdquo;, and at times, threaten their victims with <a href=\"https:\/\/www.malwarebytes.com\/ddos\">DDoS<\/a> attacks.<\/p>\n<h2><\/h2>\n<h2>The attack<\/h2>\n<p>According to the health network, the attack targeted the network supporting Delta Medix, a physician practice in Lackawanna County. The unauthorized activity was detected on February 6, 2023 and involved a computer system used for patient images for radiation oncology treatment and other sensitive information.<\/p>\n<p>The health network is investigating the full scope of the attack, but says services have not been disrupted, although&nbsp;its websites seem to be offline for the moment.&nbsp;It was unable&nbsp;to say yet whether any specific patient&#8217;s personal or sensitive information was compromised, but promised to inform any affected individuals if it discovers that was the case.<\/p>\n<h2>No ransom<\/h2>\n<p>The Lehigh Valley Health Network said it has refused to pay a ransom, but did not disclose the demanded amount. According to the US Department of Health and Human Services (HHS) The BlackCat group has demanded ransoms as high as $1.5 million in previous cybersecurity attacks against the healthcare sector.<\/p>\n<p>Dr. Brian Nester, the health network&#8217;s president and CEO said:<\/p>\n<blockquote><p>&#8220;BlackCat demanded a ransom payment, but LVHN refused to pay this criminal enterprise. We understand that BlackCat has targeted other organizations in the academic and health care sectors. We are continuing to work closely with our cybersecurity experts to evaluate the information involved and will provide notices to individuals as required as soon as possible. Attacks like this are reprehensible and we are dedicating appropriate resources to respond to this incident.&#8221;<\/p><\/blockquote>\n<p>Recent reports indicated that <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/01\/ransomware-revenue-significantly-down-over-2022\">ransomware revenue went significantly down over 2022<\/a>, likely due to companies&rsquo; increasing unwillingness to meet the ransom demands.<\/p>\n<h2>How to avoid ransomware<\/h2>\n<ul>\n<li><strong>Block common forms of entry<\/strong>. Create a plan for <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching vulnerabilities<\/a> in internet-facing systems quickly; disable or <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\">harden remote access<\/a> like RDP and VPNs; use <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">endpoint security software<\/a> that can detect exploits and malware used to deliver ransomware.<\/li>\n<li><strong>Detect intrusions<\/strong>. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">EDR<\/a> or <a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">MDR<\/a> to detect unusual activity before an attack occurs.<\/li>\n<li><strong>Stop malicious encryption<\/strong>. Deploy Endpoint Detection and Response software like <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">Malwarebytes EDR<\/a> that uses multiple different detection techniques to identify ransomware.<\/li>\n<li><strong>Create offsite, offline backups<\/strong>. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.<\/li>\n<li><strong>Write an incident response plan<\/strong>. The period after a ransomware attack can be chaotic. Make a plan that outlines how you&#8217;ll isolate an outbreak, communicate with stakeholders, and restore your systems.<\/li>\n<\/ul>\n<hr \/>\n<p><strong>We don&rsquo;t just report on threats&mdash;we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/lehigh-valley-health-network-targeted-by-blackcat-ransomware\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/ransomware\" rel=\"category tag\">Ransomware<\/a><\/p>\n<p>Tags: Lehigh Valley Health Network<\/p>\n<p>Tags:  LVHN<\/p>\n<p>Tags:  BlackCat<\/p>\n<p>Tags:  ALPHV<\/p>\n<p>Tags:  Noberus<\/p>\n<p>Tags:  ransomware<\/p>\n<p>Tags:  leak site<\/p>\n<p>Tags:  DDoS<\/p>\n<p>The Lehigh Valley Health Network stated it was the target of a cybersecurity attack by a ransomware gang known as BlackCat<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/lehigh-valley-health-network-targeted-by-blackcat-ransomware\" title=\"BlackCat ransomware targets another healthcare facility\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/lehigh-valley-health-network-targeted-by-blackcat-ransomware\">BlackCat ransomware targets another healthcare facility<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26819,25303,10514,27147,28742,28743,32,26610,3765],"class_list":["post-21330","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-alphv","tag-blackcat","tag-ddos","tag-leak-site","tag-lehigh-valley-health-network","tag-lvhn","tag-news","tag-noberus","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21330"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21330\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}