Home Security Windows ransomware variant targets healthcare sector

Windows ransomware variant targets healthcare sector

Windows ransomware variant targets healthcare sector Featured

A new variant of the Philadelphia ransomware is targeting the healthcare sector in the US, researchers from the security firm Forcepoint have found.

Philadelphia is believed to be a new version of the ransomware known as Stampado.

The method of attack is using a shortened URL sent through a spear-phishing email. Forcepoint's Roland Dela Paz said he had come across a case where an attack was attempted on a hospital in Oregon and Southern Washington.

If a user clicked on the link in the email, then a malicious Microsoft Word file would be downloaded from a personal storage site.

"This document contains the targeted healthcare organisation's logo and a signature of a medical practitioner from that organisation as bait," Dela Paz wrote. "Three document icons pertaining to patient information are present in the file."

New strain of Philadelphia ransomware.

The ransom message seen after the new variant of Philadelphia ransomware finished encrypting files on a Windows system.

If the user clicks on any of the icons, a variant of the Philadelphia ransomware is downloaded and executed.

"Believed to be a new version of the Stampado ransomware, Philadelphia is an unsophisticated ransomware kit sold for a few hundred dollars to anyone who can afford it," Dela Paz wrote. "Recently, a video advertisement of Philadelphia surfaced on YouTube."

He said upon execution, the dropped Philadelphia variant got in touch with its command and control server. System information including the operating system, username, country, and system language were transmitted and the C&C server then generated a victim ID, a Bitcoin wallet ID and the Bitcoin ransom price.

Dela Paz said his interest was piqued by a couple of things: "Aside from the tailored bait against a specific healthcare organisation, the encrypted JavaScript contained a string 'hospitalspam' in its directory path.

"Likewise, the ransomware C2 also contained 'hospital/spam' in its path. Such wordings would imply that this is not an isolated case; but that the actor behind the campaign is specifically targeting hospitals using spam (spear phishing emails) as a distribution method."

He added that based on the directory timestamp found on the ransomware C2, it looked like this particular campaign against hospitals started in the third week of March.

Forcepoint principal security analyst Carl Leonard said: “While processing our open source intelligence feeds we discovered Philadelphia, currently a cheap, poorly written ransomware that is available cheaply to script kiddies.

"Although the ransom is currently only 0.3 BTC, the command and control paths suggest that the actor is targeting hospitals for this campaign so there are likely to be other targets.

"While this might not seem like a huge attack on the healthcare sector, should this trend catch on, collectively this represents a huge risk to the industry.”

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications