Russian National Arrested and Charged for LockBit Ransomware Attacks
A Russian national has been arrested in Arizona and charged in connection to LockBit ransomware and other cyberattacks conducted on targets in the United States, Europe, Asia, and Africa since 2020. Magomedovich Astamirov, 20, of the Chechen Republic in Russia, is alleged to have conducted at least 5 LockBit ransomware attacks in the United States and other countries as an affiliate of the LockBit ransomware-as-a-service (RaaS) operation. LockBit is currently the most widely used ransomware variant and has been used to extort around $91 million from U.S. organizations since 2020. According to the Department of Justice, from at least August 2020, Astamirov conspired with other members of the LockBit RaaS operation to intentionally damage protected computers, commit wire fraud, and deploy ransomware to extort money from companies. HE is accused of directly executing at least 5 attacks on targets in the United States and abroad. Astamirov owned, controlled, and used a variety of email addresses, IP addresses, and other online provider accounts to deploy the ransomware and communicate...
Progress Software Warns of New MOVEit Zero-Day Vulnerability – Immediate Action Required
Progress Software has issued a warning about another vulnerability in its MOVEit Transfer file transfer software, an exploit for which is in the public domain. The announcement comes as the Clop ransomware group starts to name companies that were attacked by exploiting a separate zero-day bug in May, and CISA confirms the victims include several federal agencies. The latest vulnerability, CVE-2023-35708, is a critical bug that allows privilege escalation and potential unauthorized access to the environment. A Proof-of-Concept (PoC) exploit for the new zero-day flaw has been shared by a security researcher on Twitter, although at the time of release, code execution is not believed to have been achieved. The attacks by the Clop gang demonstrate that MOVEit vulnerabilities can be weaponized and exploited in mass attacks, so mitigations should be implemented immediately and patches applied as soon they are released. MOVEit Transfer Zero Day Mitigations and Fixes According to Progress Software, all users must take action to address the latest MOVEit zero day bug. The steps that need to...
Great Valley Cardiology Notifies 181,700+ Individuals About PHI Exposure
Commonwealth Health Physician Network-Cardiology, aka Great Valley Cardiology in Scranton, PA, has notified 181,764 current and former patients about a cyberattack and data breach that was discovered on April 13, 2023. The forensic investigation confirmed that the information potentially compromised in the attack included names in combination with addresses, birth dates, Social Security numbers, driver’s license numbers, passport numbers, bank account and credit/debit card information, diagnosis, medications, lab test results, and health insurance/claims information. Hackers first gained access to Great Valley Cardiology’s systems on February 2, 2023, and access remained possible until its systems were secured on April 14, 2023. The healthcare provider was reportedly notified about the attack by the Department of Homeland Security, with access to its systems gained as a result of a successful brute force attack. Affected individuals have been offered complimentary credit monitoring and identity theft protection services for 24 months as a precaution, although there are no...
Washington Hospital Pays $240,000 HIPAA Penalty After Security Guards Access Medical Records
The HHS’ Office for Civil Rights (OCR) investigates all reported breaches of the protected health information of 500 or more individuals and some smaller breaches to determine if the breach was caused by the failure to comply with the HIPAA Rules. OCR’s latest HIPAA enforcement action confirms that it is not the scale of a data breach that determines if a financial penalty must be paid but the severity of the underlying HIPAA violations. A relatively small data breach was reported to OCR on February 28, 2018, by Yakima Valley Memorial Hospital (formerly Virginia Mason Memorial), a 222-bed non-profit community hospital in Washington state. The hospital discovered security guards had been accessing the medical records of patients when there was no legitimate work reason for the medical record access, and 419 medical records had been impermissibly viewed. OCR launched an investigation into the snooping incident in May 2018 and discovered widespread snooping on medical records by security guards in the hospital’s emergency department. 23 security guards had used their login credentials...
Johns Hopkins Investigating Cyberattack and Data Breach
Johns Hopkins University and Johns Hopkins Health System are investigating a May 31, 2023, cyberattack and data breach that targeted a widely used software tool. While the tool that was targeted was not mentioned in the attack, the breach date coincides with the Clop/FIN11 attacks on the MOVEit Transfer managed file transfer solution. While the investigation into the data breach is ongoing, the initial findings indicate that sensitive personal and financial information was impacted, including names, contact information, and health billing records. Notifications will be sent to all affected individuals in the coming weeks once the full scope and breadth of the breach are determined. Johns Hopkins has confirmed that credit monitoring services will be offered to affected individuals. In the meantime, Johns Hopkins urges all students, faculty staff, and their dependents to take immediate action to protect their personal information, including conducting reviews of their statements, credit reports, and accounts for unusual activity, and should consider placing a fraud alert and credit...



