The Department of Health and Human Services today alerted the health care and public health sector to an Oct. 24 ransomware attack against at least 20 news and real estate websites in Eastern Europe and Japan. The malware campaign, called “Bad Rabbit” after the first two words on the ransom page, redirected victims to a fake Adobe Flash player update that contained the ransomware. According to HHS, the attack does not seem to be targeting the United States or health care sector, although some U.S. entities were affected. Many major anti-virus companies started detecting and blocking the Bad Rabbit malware campaign by Oct. 25, the agency said. Precautionary measures to mitigate ransomware threats include ensuring anti-virus software is up to date and implementing a data backup and recovery plan to maintain copies of sensitive or proprietary data in a separate and secure location, HHS said. For additional resources to reduce and manage cyber risks, visit www.aha.org/cybersecurity.

Related News Articles

Headline
Microsoft has released a security update to address a critical remote code execution vulnerability impacting multiple versions of Windows Server Update…
Headline
In part two of a recent blog, AHA National Advisor for Cybersecurity and Risk John Riggi and AHA Deputy National Advisor for Cybersecurity and Risk Scott Gee…
AHA Cyber Intel
In part one of this blog, we reviewed the number of cyberattacks the health care field endured this year compared to last; provided an overview of the lessons…
Headline
The Cybersecurity and Infrastructure Security Agency Oct. 15 released an emergency directive advising federal agencies to take stock of their F5 BIG-IP…
Headline
In part one of a new blog, John Riggi, AHA national advisor for cybersecurity and risk, and Scott Gee, AHA deputy national advisor for cybersecurity and risk,…
Perspective
Public
This week, the FBI issued an urgent warning to all users — including hospitals — of a critical security soft spot within Oracle’s E-Business Suite, stating “…