Hackers Target Data at Philadelphia Health-Care Systems

(TNS) — Jefferson Health says a cloud-based database with information on 1,769 patients treated at the Sidney Kimmel Cancer Center was breached in April during a national attack on a software vendor.

Hackers targeted software used for radiation treatment by oncologists.

Elekta Inc. informed Jefferson of the extent of the cyberattack on May 26 and Jefferson reported it to the federal government on Thursday, toward the end of a 60-day legal window for reporting such attacks. Jefferson also last week publicly disclosed the attack for the first time.

The FBI and other federal agencies warned health-care organizations last October that they could be heightened targets for cyber crimes.

Hacking incidents of patient information reported to the U.S. Department of Health and Human Services have soared 153% to 276 incidents so far this year compared with the same period in 2020, according to a federal database. Under federal rules, organizations report hacks only if they involve more than 500 people.

In early June, the database shows, Temple University Hospital reported a hacking incident that affected 16,356 people — without also making any general public announcement.

The health-care system declined on Monday to provide more information. “We are no longer doing business with the third-party vendor that was breached. We’re not able to provide additional details as the investigation is still open,” a spokesman said in an email.

“The bad guys are doing pretty well right now,” said Leeza Garber, a lecturer on cyber crime at the Wharton School and an adjunct professor at Drexel.

“There is a huge trend in hacking and cyber crimes,” said Lisa A. Lori, a lawyer at Klehr Harrison Harvey Branzburg LLP. “It’s not just health care. It’s every industry. Hackers are smart, and people may not be paying attention.”

Hackers look to steal information or to hold for ransom organizations whose computer systems have been crippled. Earlier this year, a cyberattack crippled Colonial Pipeline and disrupted gas supplies on the East Coast. Colonial Pipeline paid the hacking group DarkSide $4.4 million to restore its computer systems. U.S….


Olympic Games are Big Target for Hackers

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.

They’re the biggest showcase in the world for athletes, but the modern Olympic Games are also a big opportunity for hackers. 

text: Hackers hit DC Police Department

© Provided by NBC Bay Area

Hackers hit DC Police Department

Bay Area security companies said they’re actively monitoring traffic on phones and computers, looking for scams. 


Load Error

“These things are run, like our everyday lives, on technology,” said Andrew Rubin of Illumio.

Technology that makes the backbone of the games — software, hardware, the electric grid — vulnerable to hackers.

Silicon Valley cyber security companies are already tracking them.

“And you start to think about not so much the Olympics as an event, but all the technology that’s enabling it, and all of these represent attack surface,” Rubin said.

But the risk is not just to the games themselves, but to us, as streamers of the action.

The Tokyo games will be all over our phones and computer screens, giving bad actors another target: our passwords.

“They’re trying to install malicious software on your computer,” said Deepeen Desai, vice president of security research at Zscaler. “That can then result in anything from ransomware to information stealing to coin miners.”

Hackers are trying to use your machines to mine cryptocurrency,  so protect yourself.

The best advice from security experts is to be careful. When it comes to streaming sites, go with what you know. Don’t download apps or click on links promising “faster” speeds or gifts. They’re likely scam sites set up to try and snag your passwords.  

Continue Reading


Clearfield target of ransomware attack; official says city now ‘up and running’ | Government

Opt-in to Cyber Safety. Multiple layers of protection for your devices, online privacy and more.

CLEARFIELD — The City of Clearfield’s computer system was the target of a ransomware attack, which prompted the city to turn off the network for much of last week to minimize the potential impact.

The unknown hackers have asked for a ransom “in the millions” of dollars to unlock access to the system. But J.J. Allen, Clearfield’s city manager, says the Davis County city is taking steps to get around the hack, hasn’t paid any money and may end up paying nothing. Either way, it’s a point of concern and the cyberattack put a big dent in city operations last week.

“Our phones were down all of last week. We had no internet. All of our systems were down. It was a rough week,” Allen said.

The city’s information technology staffers discovered the attack on July 11 and the city’s computer systems were subsequently shut down in response. The city is recovering data from backup systems managed separately from the main network and Allen said city operations started going back to normal late last week. As of Tuesday, he said the city was “back up and running” and he praised the “heroic efforts from our IT people.”

Even so, officials are still trying to pinpoint the extent of the infiltration, how it occurred, who may be behind it and what data, precisely, may be compromised. “That is still being investigated and analyzed,” Allen said.

In a statement on Wednesday, Mayor Mark Shepherd said the quick reaction of IT staffers “prevented this event from becoming an absolute disaster.” He also emphasized that city residents’ financial data was not compromised, which factored in not talking publicly about the matter until now, as word has seeped out.

“We are still in the middle of a negotiation with those whom the investigators refer to as ‘actors.’ I prefer to call them pirates, terrorists or simply thieves. When you are in the process of negotiating, the last thing you want is to show your cards or to show weakness,” Shepherd said.

Randy Boyle, a professor of management information systems at Weber State and a Fulbright scholar, said the Clearfield attack has the hallmarks of cyberattacks that have increasingly been occurring…


You could be a target for ransomware

Opt-in to Cyber Safety. Multiple layers of protection for your devices, online privacy and more.

Millions of dollars in ransomware attacks may seem to target only large corporations, but they can also. Pennsylvania. Matthews replied to an email about the renewal of protection services because he had an existing computer service contract with Best Buy’s GeekSquad. I called the number in the email. “Can I access my computer remotely?” I thought it was a geek corps and said, “Of course,” Matthews said. She hung up and hung up her computer when the other person tried to access her bank account online, but she was still the victim of some online scams. What happened to Matthews was terrible, but it could have been worse. .. A malicious user could access her computer, but may have installed ransomware and demanded that she pay hundreds or thousands of dollars to get the computer back on track. Allowing someone to access your computer remotely is by no means a good idea. They can install ransomware. “Don’t open emails from unexpected or unknown users,” said Dr. Bruce Young of the University of Harrisburg. These emails can include installable links and attachments. The same kind of dangerous software on your machine. “I say I approach things with skepticism. Don’t click on this one I don’t know where it came from. Don’t open these files you’ve never seen before. Cyber ​​security company Proofpoint “You can protect yourself by changing your password at least every 90 days,” said Sherrod DeGrippo. Consider using a password manager to create and monitor your password.

Millions of dollars in ransomware attacks may seem to target only large corporations, but they can also.

“We received an email saying they were geeks,” said Christine Matthews, Pennsylvania.

Since she had an existing computer services contract with Best Buy’s GeekSquad, Matthews replied to an email about her protection services being updated.

She called the email number.

“He said,’Can you access your computer remotely?’ I thought it was a geek corps and said,’Of course,’” Matthews said.

When the other party tried to access her bank account online, she hung up the call and hung up her computer.

But she was still a victim of some online scams.

What happened to…