Home Security Windows ransomware variant targets healthcare sector

Windows ransomware variant targets healthcare sector

A new variant of the Philadelphia ransomware is targeting the healthcare sector in the US, researchers from the security firm Forcepoint have found.

Philadelphia is believed to be a new version of the ransomware known as Stampado.

The method of attack is using a shortened URL sent through a spear-phishing email. Forcepoint's Roland Dela Paz said he had come across a case where an attack was attempted on a hospital in Oregon and Southern Washington.

If a user clicked on the link in the email, then a malicious Microsoft Word file would be downloaded from a personal storage site.

"This document contains the targeted healthcare organisation's logo and a signature of a medical practitioner from that organisation as bait," Dela Paz wrote. "Three document icons pertaining to patient information are present in the file."

New strain of Philadelphia ransomware.

The ransom message seen after the new variant of Philadelphia ransomware finished encrypting files on a Windows system.

If the user clicks on any of the icons, a variant of the Philadelphia ransomware is downloaded and executed.

"Believed to be a new version of the Stampado ransomware, Philadelphia is an unsophisticated ransomware kit sold for a few hundred dollars to anyone who can afford it," Dela Paz wrote. "Recently, a video advertisement of Philadelphia surfaced on YouTube."

He said upon execution, the dropped Philadelphia variant got in touch with its command and control server. System information including the operating system, username, country, and system language were transmitted and the C&C server then generated a victim ID, a Bitcoin wallet ID and the Bitcoin ransom price.

Dela Paz said his interest was piqued by a couple of things: "Aside from the tailored bait against a specific healthcare organisation, the encrypted JavaScript contained a string 'hospitalspam' in its directory path.

"Likewise, the ransomware C2 also contained 'hospital/spam' in its path. Such wordings would imply that this is not an isolated case; but that the actor behind the campaign is specifically targeting hospitals using spam (spear phishing emails) as a distribution method."

He added that based on the directory timestamp found on the ransomware C2, it looked like this particular campaign against hospitals started in the third week of March.

Forcepoint principal security analyst Carl Leonard said: “While processing our open source intelligence feeds we discovered Philadelphia, currently a cheap, poorly written ransomware that is available cheaply to script kiddies.

"Although the ransom is currently only 0.3 BTC, the command and control paths suggest that the actor is targeting hospitals for this campaign so there are likely to be other targets.

"While this might not seem like a huge attack on the healthcare sector, should this trend catch on, collectively this represents a huge risk to the industry.”


Did you know: 1 in 10 mobile services in Australia use an MVNO, as more consumers are turning away from the big 3 providers?

The Australian mobile landscape is changing, and you can take advantage of it.

Any business can grow its brand (and revenue) by adding mobile services to their product range.

From telcos to supermarkets, see who’s found success and learn how they did it in the free report ‘Rise of the MVNOs’.

This free report shows you how to become a successful MVNO:

· Track recent MVNO market trends
· See who’s found success with mobile
· Find out the secret to how they did it
· Learn how to launch your own MVNO service


Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.