DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ransomware Group FIN12 Aggressively Going After Healthcare Targets

Posted on October 9, 2021 by Dissent

Ravie Lakshmanan reports:

An “aggressive” financially motivated threat actor has been identified as linked to a string of RYUK ransomware attacks since October 2018, while maintaining close partnerships with TrickBot-affiliated threat actors and using a publicly available arsenal of tools such as Cobalt Strike Beacon payloads to interact with victim networks.

Cybersecurity firm Mandiant attributed the intrusions to a Russian-speaking hacker group codenamed FIN12, and previously tracked as UNC1878, with a disproportionate focus on healthcare organizations with more than $300 million in revenue, among others, including education, financial, manufacturing, and technology sectors, located in North America, Europe, and the Asia Pacific.

Read more on The Hacker News.


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Authorities released free decryptor for Phobos and 8base ransomware
  • North Country Healthcare responds to Stormous's claims of a breach
  • Gladney Adoption Center had serious data exposures in the past few months. What will they do to prevent more?
  • Armenian National Extradited to the United States Faces Federal Charges for Ransomware Extortion Conspiracy
Category: Commentaries and AnalysesMalware

Post navigation

← Data Hack Hits Alumni of Harvard-Westlake Private School
Za: Ransomware attack crisis over, says justice department →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hackers leak purported Aeroflot data as Russia denies breach
  • Palo Alto Networks investigating ransomware threat related to SharePoint exploitation
  • Six months after discovering an attack, Northwest Radiologists notifies almost 350,000 Washington State residents
  • As ransomware gangs threaten physical harm, ‘I am afraid of what’s next,’ ex-negotiator says
  • Dermatology Clinics Affected by Practice Management Company Data Breach
  • UK: Physiotherapist who accessed patient’s personal data to visit her home is struck off
  • Genoa Community Hospital discloses breach discovered in March
  • In Singapore, 147,000 customer records exposed in Cycle & Carriage data breach
  • New adult safeguarding toolkit to help protect vulnerable adults’ data
  • Hacker Arrested for Data Theft Targeting Spanish Bank Customers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People
  • Searches of Your Private Data in the Cloud Amount to Illicit State Action
  • How a Tax Subpoena in Ohio Tests European Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.