The Department of Health and Human Services today alerted the health care and public health sector to an Oct. 24 ransomware attack against at least 20 news and real estate websites in Eastern Europe and Japan. The malware campaign, called “Bad Rabbit” after the first two words on the ransom page, redirected victims to a fake Adobe Flash player update that contained the ransomware. According to HHS, the attack does not seem to be targeting the United States or health care sector, although some U.S. entities were affected. Many major anti-virus companies started detecting and blocking the Bad Rabbit malware campaign by Oct. 25, the agency said. Precautionary measures to mitigate ransomware threats include ensuring anti-virus software is up to date and implementing a data backup and recovery plan to maintain copies of sensitive or proprietary data in a separate and secure location, HHS said. For additional resources to reduce and manage cyber risks, visit www.aha.org/cybersecurity.

Related News Articles

Headline
The AHA Jan. 14 expressed support for the Rural Hospital Cybersecurity Enhancement Act (S. 2169), legislation that would direct the Department of Health and…
Headline
The FBI Jan. 8 released an alert on evolving threat tactics by Kimsuky, a North Korean state-sponsored cyber threat group. As of last year, the group…
Headline
The Cybersecurity and Infrastructure Security Agency Dec. 11 released an update to its voluntary Cybersecurity Performance Goals, which includes measurable…
Headline
U.S. and international agencies are warning of potential cyberattacks on health care and other critical infrastructure from state-sponsored cyber actors in…
Headline
A critical, unauthenticated remote code execution vulnerability known as React2Shell has been added to the Cybersecurity and Infrastructure Security Agency’s…
Headline
The FBI has public resources available to help prevent exploitation by cybercriminals, who use artificial intelligence for deception. An infographic by the FBI…