The FBI this week advised organizations to protect against certain emerging ransomware trends, including multiple attacks on the same victim and new data destruction tactics.
 
“Foreign cyber adversaries continue to evolve their tactics in a way to increase likelihood of ransom payments,” said John Riggi, AHA’s national advisor for cybersecurity and risk. “The combination of multiple ransomware attacks on the same vulnerable victim organization and the use of a ‘ticking’ data destruction ‘time bomb’ speaks to the sinister mindset of these cyber thugs. To counter these latest tactics, it is strongly recommended that organizations maintain multiple offline copies of highly secure, encrypted and immutable backups. Immutable backups are essential to prevent encryption, deletion or alteration of data during a ransomware attack and will help facilitate restoration of data and networks without payment of a ransom.” 
 
For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity.

Headline
A joint advisory released April 23 from U.S. and international cybersecurity agencies, including the Cybersecurity and Infrastructure Security Agency, FBI,…
Headline
FBI Co-deputy Director Andrew Bailey discussed a rise in cyber and physical threats impacting health care. He discussed health care as the top critical…
Headline
Health care and public health was the top sector targeted for cyberthreats in 2025, according to the FBI’s latest annual report on internet crimes. There were…
Headline
The Cybersecurity and Infrastructure Security Agency released an alert March 27 on a vulnerability in F5 BIG-IP Access Policy Manager software that is being…
Headline
The FBI released an alert March 20 warning of a technique used by cyber actors working on behalf of the Iranian government to conduct malicious cyber activity…
Headline
The Cybersecurity and Infrastructure Security Agency March 18 released an alert urging U.S. organizations to harden their endpoint management systems following…