$460 Million Paid to Ransomware Groups in H1, 2024
Several ransomware reports have been released in the past few weeks that shed light on the extent to which ransomware is being used in cyberattacks, the profitability of the attacks, and the tactics involved. What these reports make clear is there is no sign of ransomware groups abandoning ransomware, even with significant law enforcement operations and arrests. Almost $460 Million Paid to Ransomware Groups in H1 2024 A recent report from the blockchain analysis firm Chainalysis has revealed ransomware victims have paid $459,800,000 to ransomware groups in the first half of 2024, a 2% increase from 2023’s record-breaking ransom payment total of $449,100,000 in H1, 2023. If payments continue in the second half of 2024 at the same level, last year’s record total of $1.1 billion in ransom payments will be broken. Chainalysis has identified a change in tactics at some ransomware groups, which appear to be targeting large organizations more frequently. Large organizations typically have more robust cybersecurity measures than smaller businesses as well as in-house security teams that...
Email Breach Reported by The Facial Pain Center
The Facial Pain Center in Minnesota has revealed several employee email accounts were accessed by an unauthorized individual in January 2024, exposing the protected health information of 1,894 individuals. Suspicious activity was identified in certain employee email accounts on January 23, 2024. Immediate action was taken to prevent further unauthorized access, and an investigation was launched to determine the nature and scope of the incident. A third-party cybersecurity company assisted with the investigation and confirmed that the threat actor had access to emails and related file shares, although the extent to which patient data was accessed and/or copied is not known. Due to the amount of data and number of email accounts involved it has taken several months to complete the review. That process was completed on June 10, 2024. The types of data involved varied from individual to individual and may have included names along with one or more of the following: date of birth, demographic information, medical information, and/or health insurance information. The Facial Pain Center...
Data Breaches Reported by Medical Center Barbour; Monte Nido; Allergy Medical Group of the North Area
Medical Center Barbour in Alabama, Allergy Medical Group of the North Area in California, and the nationwide eating disorder treatment provider Monte Nido have reported cyberattacks involving unauthorized access to patient data. Medical Center Barbour, Alabama Medical Center Barbour in Eufaula, AL, reported a breach of the personal information of 61,014 individuals to the Maine Attorney General and notified the affected individuals on August 22, 2024. Suspicious activity was identified within its network on October 29, 2023, and cybersecurity specialists were engaged to investigate the incident. The investigation concluded on December 8, 2023, and confirmed that an unauthorized third party had accessed files and data stored on its network and may have exfiltrated data. While the investigation was completed relatively quickly, it took until May 21, 2024, for the medical center to complete its internal review to determine the types of data involved, then a third-party data mining company was engaged to assist with the review of the data to allow notifications to be mailed. That...
Cyberattack on Help at Home Affects 26,700 Current & Former Patients
Data breaches have been reported by Help at Home, Kinsler Family Dentistry, ParkTree Community Health Center, and Providence Pediatrics Manito. Help at Home HAH Group Holding Company, a home healthcare provider that does business as Help at Home, has discovered the protected health information of 26,744 individuals has been exposed at one of its vendors. The vendor notified Help at Home about the intrusion on March 21, 2021; however, at the time, it was unclear to what extent personal information was involved. The unnamed former vendor conducted a review of the affected data and confirmed on June 19, 2024, that the information exposed and potentially stolen in the incident included names, dates of birth, Social Security numbers, financial account numbers, usernames and passwords, and/or certain medical, health insurance, and/or treatment information. HAH Group Holding Company mailed individual notifications on August 16, 2024, and has offered complimentary credit monitoring services. Kinsler Family Dentistry Kinsler Family Dentistry, the Frankfort, IN, dental practice of Julie D....
Karakurt Ransomware Group Member Charged in Ohio
An alleged member of the Karakurt threat group has been charged in U.S. District Court in Cincinnati with conspiracy to commit money laundering, wire fraud, and Hobbs Act extortion. Karakurt is a Russian cybercrime group thought to be a splinter group of the now-defunct Conti ransomware group. Karakurt specializes in data extortion rather than ransomware attacks, and gains access to corporate networks, steals sensitive data, and threatens to sell the stolen data if the ransom is not paid. The group maintains an auction site and if a sale cannot be arranged, the stolen data is added to the group’s data leak site where it can be downloaded for free. The group’s ransom demands have ranged from $25,000 to $13,000,000, with victims typically given a week from notification to pay the ransom. Karakurt has conducted attacks on a wide range of industry sectors, including several U.S. healthcare organizations. The group has claimed responsibility for attacks on CentroMed, Methodist McKinney Hospital, McAlester Regional Health Center, The Chattanooga Heart Institute, and most recently, Ann...



