• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

How Blue Springs Dealt with Its Ransomware Attack

July 31, 2018Simeon Georgiev

Healthcare industry has been dismantled with the onslaught of ransomware attacks in 2018 as several hospitals and institutions have been unable to save their systems from the advanced and sophisticated ransomware distribution and infection strategies. Ransomware removal experts found a similar case when a health institution in Missouri, Blue Springs Family Care disclosed that data of almost 45,000 patients was compromised as cybercriminals continuously assaulted its systems with cyber attacks.

This development invalidates a few media reports claiming a decrease in ransomware campaigns. In fact, recently LabCorp Diagnostics, one of the largest clinical laboratories in the US also reported a huge breach while another healthcare institution in Missouri, Cass Regional was also an unfortunate victim of a ransomware attack.

Steps Taken to Deal with the Threat

Blue Springs actually discovered the presence of a ransom in their systems in mid-May. Subsequently, a firm’s services were acquired for analysis and ransomware removal. The firm deduced that a combination of malware along with ransomware invaded its systems. However, it was not ascertained that how the cybercriminals manage to infiltrate countless viruses without any cyber-resistance from the systems as well as their order of infiltration.

These attacks enabled the cybercriminals to tap into the databases of Blue Springs and extract the entire informational data of patients. This information ranges from names, banking details, SSN, licenses, medical diagnoses, and treatment. Ransomware removal analysts have cautioned that this information can be misused for medical and identity fraud.

The infection segments of the systems were isolated in order to limit further proliferation and damage and work was initiated for ransomware removal. Moreover, newer anti-malware tools have been deployed in the systems to keep an eye on the future cyber-threats. Additionally, security measures like firewalls and intrusion prevention systems have also been installed. Lastly, from now on all the patients’ data will be encrypted which means that cybercriminals will be unable to read the data even after a breach.

 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post EndureData Releases a Solution for Ransomware Removal and Recovery Next post Riverside Police Department Reeling from the Effects of a Ransomware Attack

Related Articles

Ransomware Prevention: 8 Ways to Ward off Threats Effectively

January 19, 2018Simeon Georgiev
Ransomware Prevention: 8 Ways to Ward off Threats Effectively

FedEx under Ransomware Attack Again

January 25, 2018Simeon Georgiev
FedEx under Ransomware Attack Again

Experts Discover a Variant of Cryptomix Ransomware

February 20, 2018Simeon Georgiev

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.