June 15, 2021

Ryuk ransomware incident at a COVID-19 research centre enabled by the “cracked” software

rH8huDg3CPZiKoVg61LvzFWaf5zEjQar7SnU65BCmp4.jpg

Home Forums Ryuk ransomware incident at a COVID-19 research centre enabled by the “cracked” software

This topic contains 1 reply, has 2 voices, and was last updated by  Illuminaso 1 month, 1 week ago.

  • Author
    Posts
  • #390936

    anonymous
    Participant


    Ryuk ransomware incident at a COVID-19 research centre enabled by the “cracked” software

  • #390938

    Illuminaso

    A lot of hackers draw the line at medical equipment. I remember a Harvard study a few years ago where they put out a few honeypots disguised as network connected heart monitors, and other various medical equipment. As soon as hackers realized what they were connected to, basically all of them immediately disconnected and left them alone. I guess not everyone is so nice.

  • #390939

    cenotaphx

    The post is a good summary of all the things you shouldn’t do that could go wrong and of course, went wrong in any institute, let alone sensitive subjects like medicinal research.

  • #390940

    LPFJOSIE

    “Perhaps the hardest lesson of all, however, was discovering that the attack and its impact could have been avoided with a less trusting and more robust approach to network access.”

    That’s gotta hurt

  • #390941

    oldwhitedevil

    Great article

You must be logged in to reply to this topic.