InTegriLogic Blog
United States – Three Affiliated Tribes
https://nativenewsonline.net/currents/three-affiliated-tribes-hit-by-ransomware-attack-holding-tribal-information-hostagExploit: Ransomware
Three Affiliated Tribes: Tribal Government Organization

Risk to Business:Â 1.607= Severe
The Three Affiliated Tribes (the Mandan, Hidatsa & Arikara Nations) announced to its staff and employees that its server was infected with ransomware. Since the server was hacked, the tribe has been unable to access files, email and critical information. Employees were also asked to refrain from using their work computers, Investigation and recovery is ongoing
Customers Impacted:Â Unknown
How It Could Affect Your Business:Â Protection from ransomware needs to be a top priority for every organization. These days a new attack is launched every 40 seconds putting every business in the line of fire.
United States – US Veterans Administration (VA)
https://threatpost.com/veterans-medical-records-ransomware/166025/Exploit:Â Ransomware
Veterans Administration: Federal Agency

Risk to Business:Â 1.722= Severe
The VA has found itself in the cybersecurity hot seat again after a data breach at a records contractor exposed more than 200,000 records for veterans. The contractor, United Valor Solutions, appears to have been the victim of a ransomware attack. Researchers found a trove of their data online, including this sensitive VA data. The VA has announced that its Veterans Benefits Administration (VBA) Privacy Office is currently working with Medical Disability Examination Officer (MDEO) and contractors to further handle the incident, with the VA Data Breach Response Service investigating independently.

Individual Risk:Â 1.722= Severe
The exposed records contain included patient names, birth dates, medical information, contact information and even doctor information and appointment times, unencrypted passwords and billing details for veterans and their families, all of which could be used in socially engineered spear phishing or fraud scams.
How it Could Affect Your Business:Â Ransomware is the gift that keeps on giving for medical sector targets. Not only are those victims facing expensive investigation and recovery costs, but they can also expect a substantial HIPAA fine and possibly more regulatory scrutiny.
Ireland – Health Service Executive (HSE)
https://www.bbc.com/news/world-europe-57134916Exploit: Ransomware
Health Service Executive (HSE): National Healthcare Provider

Risk to Business:Â 1.668 = Severe
Ransomware rocked Ireland after the Conti gang perpetrated attacks on both the Department of Health and Ireland’s national healthcare provider Health Service Executive (HSE). HSE was forced to take action including shutting down the majority of its systems including all national and local systems involved in all core services and all major hospitals. The ransom demand is reported to be $20 million.
The National Cyber Security Centre (NCSC) has said the HSE became aware of a significant ransomware attack on some of its systems in the early hours of Friday morning and the NCSC was informed of the issue and immediately activated its crisis response plan. On Monday, May 18, officials announced that diagnostic services were still impacted as well as other patient care necessities. Officials alos said that it may take the Irish health service weeks to repair systems and restore all services, at a price that will reach into the tens of millions of euros.
Customers Impacted:Â Unknown
How it Could Affect Your Business: Ransomware is the preferred weapon of cybercriminals at every activity level. Increased security awareness training makes organizations up to 70% less likely to experience damaging cybersecurity incidents like this one.
France – Acer Finance
https://securityaffairs.co/wordpress/117991/cyber-crime/avaddon-ransomware-acer-finance-axa.htmlExploit:Â Ransomware
Acer Finance: Financial Advisors

Risk to Business:Â 2.307 = Severe
Avaddon ransomware came calling at Acer Finance. The Company offers risk management, mutual funds, analysis, financial planning, and advisory services. Acer Finance serves individuals, entrepreneurs, and institutional investors in France. The ransomware gang claims to have stolen confidential company information about clients and employees, and they’re giving Acer Finance 240 hours to communicate and cooperate with them before start leaking the stolen valuable company documents. As proof of the hack, the group published several ID cards, personal documents, contracts, and a screenshot of the folders containing stolen data.
Customers Impacted:Â Unknown
How it Could Affect Your Business: No organization is safe from phishing. Every company should make stepping up phishing resistance training a priority.
Japan – Toshiba
https://www.cyberscoop.com/darkside-ransomware-toshiba-hack/Exploit: Ransomware
Toshiba: Electronics Manufacturer

Risk to Business:Â 1.817 = Severe
European units of Japanese tech giant Toshiba are investigating a security incident in which scammers may have used a similar hacking tool to the malware used against IT systems at Colonial Pipeline. The company announced that it had been forced to disconnect network connections between Japan and Europe to stop the spread of ransomware. The attack is believed to have been perpetrated by the DarkSide ransomware gang. Toshiba Tec Group, a unit of the multinational conglomerate which makes printers and other technologies, said the firm had not yet confirmed that customer related information was leaked externally. The incident is under investigation and the company says that it has not paid any ransom.
How it Could Affect Your Business: By disrupting internal operations, ransomware can cause tremendous problems for multinational companies even if no data is stolen or systems encrypted.
United States – Three Affiliated Tribes
https://nativenewsonline.net/currents/three-affiliated-tribes-hit-by-ransomware-attack-holding-tribal-information-hostagExploit: Ransomware
Three Affiliated Tribes: Tribal Government Organization

Risk to Business:Â 1.607= Severe
The Three Affiliated Tribes (the Mandan, Hidatsa & Arikara Nations) announced to its staff and employees that its server was infected with ransomware. Since the server was hacked, the tribe has been unable to access files, email and critical information. Employees were also asked to refrain from using their work computers, Investigation and recovery is ongoing
Customers Impacted:Â Unknown
How It Could Affect Your Business:Â Protection from ransomware needs to be a top priority for every organization. These days a new attack is launched every 40 seconds putting every business in the line of fire.
United States – US Veterans Administration (VA)
https://threatpost.com/veterans-medical-records-ransomware/166025/Exploit:Â Ransomware
Veterans Administration: Federal Agency

Risk to Business:Â 1.722= Severe
The VA has found itself in the cybersecurity hot seat again after a data breach at a records contractor exposed more than 200,000 records for veterans. The contractor, United Valor Solutions, appears to have been the victim of a ransomware attack. Researchers found a trove of their data online, including this sensitive VA data. The VA has announced that its Veterans Benefits Administration (VBA) Privacy Office is currently working with Medical Disability Examination Officer (MDEO) and contractors to further handle the incident, with the VA Data Breach Response Service investigating independently.

Individual Risk:Â 1.722= Severe
The exposed records contain included patient names, birth dates, medical information, contact information and even doctor information and appointment times, unencrypted passwords and billing details for veterans and their families, all of which could be used in socially engineered spear phishing or fraud scams.
How it Could Affect Your Business:Â Ransomware is the gift that keeps on giving for medical sector targets. Not only are those victims facing expensive investigation and recovery costs, but they can also expect a substantial HIPAA fine and possibly more regulatory scrutiny.
Ireland – Health Service Executive (HSE)
https://www.bbc.com/news/world-europe-57134916Exploit: Ransomware
Health Service Executive (HSE): National Healthcare Provider

Risk to Business:Â 1.668 = Severe
Ransomware rocked Ireland after the Conti gang perpetrated attacks on both the Department of Health and Ireland’s national healthcare provider Health Service Executive (HSE). HSE was forced to take action including shutting down the majority of its systems including all national and local systems involved in all core services and all major hospitals. The ransom demand is reported to be $20 million.
The National Cyber Security Centre (NCSC) has said the HSE became aware of a significant ransomware attack on some of its systems in the early hours of Friday morning and the NCSC was informed of the issue and immediately activated its crisis response plan. On Monday, May 18, officials announced that diagnostic services were still impacted as well as other patient care necessities. Officials alos said that it may take the Irish health service weeks to repair systems and restore all services, at a price that will reach into the tens of millions of euros.
Customers Impacted:Â Unknown
How it Could Affect Your Business: Ransomware is the preferred weapon of cybercriminals at every activity level. Increased security awareness training makes organizations up to 70% less likely to experience damaging cybersecurity incidents like this one.
France – Acer Finance
https://securityaffairs.co/wordpress/117991/cyber-crime/avaddon-ransomware-acer-finance-axa.htmlExploit:Â Ransomware
Acer Finance: Financial Advisors

Risk to Business:Â 2.307 = Severe
Avaddon ransomware came calling at Acer Finance. The Company offers risk management, mutual funds, analysis, financial planning, and advisory services. Acer Finance serves individuals, entrepreneurs, and institutional investors in France. The ransomware gang claims to have stolen confidential company information about clients and employees, and they’re giving Acer Finance 240 hours to communicate and cooperate with them before start leaking the stolen valuable company documents. As proof of the hack, the group published several ID cards, personal documents, contracts, and a screenshot of the folders containing stolen data.
Customers Impacted:Â Unknown
How it Could Affect Your Business: No organization is safe from phishing. Every company should make stepping up phishing resistance training a priority.
Japan – Toshiba
https://www.cyberscoop.com/darkside-ransomware-toshiba-hack/Exploit: Ransomware
Toshiba: Electronics Manufacturer

Risk to Business:Â 1.817 = Severe
European units of Japanese tech giant Toshiba are investigating a security incident in which scammers may have used a similar hacking tool to the malware used against IT systems at Colonial Pipeline. The company announced that it had been forced to disconnect network connections between Japan and Europe to stop the spread of ransomware. The attack is believed to have been perpetrated by the DarkSide ransomware gang. Toshiba Tec Group, a unit of the multinational conglomerate which makes printers and other technologies, said the firm had not yet confirmed that customer related information was leaked externally. The incident is under investigation and the company says that it has not paid any ransom.
How it Could Affect Your Business: By disrupting internal operations, ransomware can cause tremendous problems for multinational companies even if no data is stolen or systems encrypted.
The surge in cybercrimes against businesses during the COVID-19 pandemic proved how flexible cyber players are. Remember that it could happen to any organization, including yours, if you do not arm your business with robust backup and regular security awareness training.
It’s alarming that phishing shot up by 67% since the start of the pandemic. Initially, when this turn of events stunned the world and businesses struggled to adapt to the new normal, hackers pretending to be the World Health Organization (WHO) duped people into clicking on malicious links or sharing sensitive information. Such evil tricks, if not tackled, can easily violate your business network and lead to a terrible disaster, compromising invaluable data.For instance, in November 2020, the Internal Revenue Services (IRS) issued a warning regarding an SMS-based phishing scam through which hackers cheated citizens in the name of a 'Covid-19 TREAS FUND'. When someone clicked on the link , they were redirected to a website identical to www.irs.gov which collected their data. This scam is just the tip of an iceberg of phishing scams that unfurled in 2020. What if one of your employees fell prey to such a scam? A careless mistake like that could result in a successful cyber attack on your business that can have severe repercussions. Data loss, downtime, hefty penalties, lawsuits or even permanent closure.
The sudden appearance of COVID-19 caused a sense of panic among businesses. With the virus spreading like wildfire, the work-from-home model was the only available option to maintain a safe working environment. However, the unprecedented scale of remote work has endangered the security of several businesses, including yours. If you do not fix the gap between the preparedness and efficacy of your backup and security defenses, data loss could just be the first of many problems you could face.
Why Backups and Security Awareness Training Matter?
Backups can be a lifesaver for your business by protecting your valuable data from being deleted or altered by cybercriminals. Although the pandemic acted as a catalyst for backup adoption, only 41% of businesses back up their data at least once a day. That is not a very healthy practice and you must make sure proper policy development, regular testing and continual reviews fuel your backup strategy.Other than protecting your sensitive data, backups can help reduce severe downtime. They also improve your business’ reputation and act as a single access point for your entire database.
Even if you have all your backups in order, a negligent employee can still be a threat to your business data. In 2020, the San Jose Federal Court convicted an employee from a global MNC for carelessly deleting business-sensitive data. Thus, the only way to tackle the factor of human error is through regular security awareness training.
Always bear in mind that backups and security awareness training are equally important when it comes to your business successfully warding off cyberattacks that can result in downtime, data loss and more. Selecting one over the other can dilute your business’ counter-threat strategy. By implementing a robust backup and regular security awareness training, your business can deal with harsh times as well as cyberthreats that exploit such difficult periods.
Empower Your Business Now
If there’s one lesson the pandemic has taught businesses, it’s that it’s better to be safe than sorry. The business world is at a critical juncture and your proactive approach can make or break your business’ future. While a world without cybercriminals would be great, such a utopian world unfortunately does not exist. The only way forward is through the implementation of strategies to protect your business data, processes, systems and people. And for that, you must empower your business by integrating backups and comprehensive security awareness training.Remember, you don’t have to take the first step to a safer tomorrow alone. The right partner by your side can make your journey easier and more successful. It all begins with a simple email to us. Get in touch today!
Article curated and used by permission.
 Â
Data Sources:
- Security Magazine Verizon Data Breach Digest
- Security Magazine
- Help Net Security Magazine
- Bloomberglaw.com
The surge in cybercrimes against businesses during the COVID-19 pandemic proved how flexible cyber players are. Remember that it could happen to any organization, including yours, if you do not arm your business with robust backup and regular security awareness training.
It’s alarming that phishing shot up by 67% since the start of the pandemic. Initially, when this turn of events stunned the world and businesses struggled to adapt to the new normal, hackers pretending to be the World Health Organization (WHO) duped people into clicking on malicious links or sharing sensitive information. Such evil tricks, if not tackled, can easily violate your business network and lead to a terrible disaster, compromising invaluable data.
For instance, in November 2020, the Internal Revenue Services (IRS) issued a warning regarding an SMS-based phishing scam through which hackers cheated citizens in the name of a 'Covid-19 TREAS FUND'. When someone clicked on the link , they were redirected to a website identical to www.irs.gov which collected their data. This scam is just the tip of an iceberg of phishing scams that unfurled in 2020. What if one of your employees fell prey to such a scam? A careless mistake like that could result in a successful cyber attack on your business that can have severe repercussions. Data loss, downtime, hefty penalties, lawsuits or even permanent closure.
The sudden appearance of COVID-19 caused a sense of panic among businesses. With the virus spreading like wildfire, the work-from-home model was the only available option to maintain a safe working environment. However, the unprecedented scale of remote work has endangered the security of several businesses, including yours. If you do not fix the gap between the preparedness and efficacy of your backup and security defenses, data loss could just be the first of many problems you could face.Why Backups and Security Awareness Training Matter?
Backups can be a lifesaver for your business by protecting your valuable data from being deleted or altered by cybercriminals. Although the pandemic acted as a catalyst for backup adoption, only 41% of businesses back up their data at least once a day. That is not a very healthy practice and you must make sure proper policy development, regular testing and continual reviews fuel your backup strategy.Other than protecting your sensitive data, backups can help reduce severe downtime. They also improve your business’ reputation and act as a single access point for your entire database.
Even if you have all your backups in order, a negligent employee can still be a threat to your business data. In 2020, the San Jose Federal Court convicted an employee from a global MNC for carelessly deleting business-sensitive data. Thus, the only way to tackle the factor of human error is through regular security awareness training.
Always bear in mind that backups and security awareness training are equally important when it comes to your business successfully warding off cyberattacks that can result in downtime, data loss and more. Selecting one over the other can dilute your business’ counter-threat strategy. By implementing a robust backup and regular security awareness training, your business can deal with harsh times as well as cyberthreats that exploit such difficult periods.
Empower Your Business Now
If there’s one lesson the pandemic has taught businesses, it’s that it’s better to be safe than sorry. The business world is at a critical juncture and your proactive approach can make or break your business’ future. While a world without cybercriminals would be great, such a utopian world unfortunately does not exist. The only way forward is through the implementation of strategies to protect your business data, processes, systems and people. And for that, you must empower your business by integrating backups and comprehensive security awareness training.
Remember, you don’t have to take the first step to a safer tomorrow alone. The right partner by your side can make your journey easier and more successful. It all begins with a simple email to us. Get in touch today!
Article curated and used by permission. Â Â Data Sources:- Security Magazine Verizon Data Breach Digest
- Security Magazine
- Help Net Security Magazine
- Bloomberglaw.com
United States – MedNetwoRX
https://www.healthcareitnews.com/news/reported-ransomware-attack-leads-weeks-aprima-ehr-outagesExploit: Ransomware
MedNetwoRX: Medical Information Processing

Risk to Business:Â 1.607= Severe
A reported ransomware attack on MedNetwoRX has impeded medical providers’ access to their Aprima electronic health record systems for more than two weeks. This hack impacts medical practices, clinics and hospitals of all sizes, from solo providers to conglomerates that rely on MedNetworx to host the Aprima electronic medical records system from vendor CompuGroup eMDs. MedNetworx says that on April 22, it experienced a network outage that resulted in a temporary disruption to its servers and other IT systems. Two major clients, Arthritis & Osteoporosis Center of Kentucky, the Alpine Center for Diabetes, Endocrinology and Metabolism, have been identified as victims as well as many small single and partner practices. The incident is under investigation and some functionality has been restored.
Customers Impacted:Â Unknown
How It Could Affect Your Business: This is the kind of third-party service provider incident that reverberates for months as rolling damage becomes apparent. With no clear word on what if any data was stolen, your clients could be waiting for a nasty surprise.
United States – City of Tulsa
https://therecord.media/city-of-tulsa-hit-by-ransomware-over-the-weekend/Exploit:Â Ransomware
City of Tulsa: Municipality

Risk to Business:Â 1.722= Severe
The city of Tulsa, Oklahoma, has been hit by a ransomware attack that affected the city government’s network and brought down official websites. The attack, which took place on the night between Friday and Saturday, is under investigation and city IT crews have begun restoring functionality and data from backups. This follows a string of ransomware attacks on other US municipalities in recent weeks. City officials were careful to note that no customer information has been compromised, but residents will see delays in-network services. While emergency response is not hampered, 311, some credit card payment systems and the city’s new online utility billing system were impacted.
Customers Impacted:Â Unknown
How it Could Affect Your Business:Â Ransomware has been an especially nasty foe for government entities, especially cities and towns. Cybercriminals know that these targets are likely to pay ransoms and unlikely to have strong security or security awareness training in place.
United States – Fermilab
https://www.govinfosecurity.com/us-physics-laboratory-exposed-documents-credentials-a-16536Exploit: Credential Compromise
Fermilab: Research Laboratory

Risk to Business:Â 1.523 = Severe
The Fermilab physics laboratory has taken action to lock down its systems after security researchers found weaknesses exposing documents, proprietary applications, personal information, project details and credentials. Fermilab, which is part of the US Department of Energy, is a world-famous particle accelerator and physics laboratory in Batavia, Illinois. One database the researchers discovered allowed unauthenticated access to 5,795 documents and 53,685 file entries. One entry point led into Fermilab’s IT ticketing system, which displayed 4,500 trouble tickets. Also found was an FTP server that required no password and allowed anyone to log in anonymously. Other impacted systems exposed credentials, experiment data and other proprietary information that were stored with no security.
Customers Impacted:Â Unknown
How it Could Affect Your Business: Proprietary data needs to be stored securely. Not only does it give your competition an edge if they can see what you’re doing, but it also gives cybercriminals an edge when they’re crafting a cyberattack against your company.
United States – BlueForce Inc.
Exploit: Ransomwarehttps://searchsecurity.techtarget.com/news/252500356/US-defense-contractor-BlueForce-apparently-hit-by-ransomware
BlueForce: Defense Contractor

Risk to Business:Â 1.668 = Severe
Someone who runs training programs may need to upgrade their security awareness training. Defense contractor BlueForce has been hit by the Conti ransomware group. The gang posted data from the operation on its leak site along with supposed chat records from its negotiation with BlueForce. The Conti gang has demanded 17 bitcoin for the decryption key. BlueForce is a Virginia-based defense veteran-owned contractor that works with the US Department of Defense and the US Department of State on program management, training and development initiatives.
Customers Impacted:Â Unknown
How it Could Affect Your Business: Increased security awareness training makes organizations up to 70% less likely to experience damaging cybersecurity incidents like this one.
United States – CaptureRX
https://www.infosecurity-magazine.com/news/capturerx-data-breach-impacts/Exploit: Ransomware
CaptureRX: Medical Software Company

Risk to Business:Â 1.907 = Severe
Texas-based CaptureRx, fell victim to a ransomware attack in which cybercriminals snatched files containing the personal health information (PHI) of more than 24,000 individuals. The security breach impacted 17,655 patients of Faxton St. Luke’s Healthcare and a further 6,777 patients at Gifford Health Care as well as an indeterminate number of Thrifty Drug Store patients. CaptureRx is currently unclear how many of its healthcare provider clients have been affected by the attack. Nor has the company finished its final tally of how many individuals had their PHI exposed because of the incident.

Risk to Business:Â 1.959 = Severe
Data exposed and stolen by the ransomware attackers included names, dates of birth, prescription information, and, for a limited number of patients, medical record numbers. Affected healthcare provider clients were notified of the incident by CaptureRx between March 30 and April 7.
How it Could Affect Your Business: The medical sector has been absolutely battered by ransomware in the last 12 months. Breaches at service providers like this and Accellion show that cybercriminals are playing smart by hitting targets that offer them access to a variety of information that has value for future attacks.
United States – Alaska Court System (ACS)
https://thehill.com/policy/cybersecurity/551463-alaska-court-system-forced-offline-by-cyberattackExploit: Ransomware
Alaska Court System: Judicial Body

Risk to Business:Â 1.572 = Severe
The Alaska Court System (ACS) was forced to temporarily disconnect its online servers this week due to a cyberattack that installed malware on their systems, disrupting virtual court hearings. The court’s website had been taken offline and the ability to search court cases had been suspended while it worked to remove malware that had been installed on its servers. Activities that may be impacted by the ACS taking its website offline include the ability of the public to view court hearings over Zoom, online bail payments, submitting juror questionnaires and sending or receiving emails to or from an ACS email address.
Customers Impacted:Â Unknown
How it Could Affect Your Business: Ransomware is the weapon of choice for cybercrime especially against local, state and municipal governments with often weak or outmoded IT departments.
Australia – NSW Labor Party
https://www.smh.com.au/national/nsw/police-investigate-cyber-attack-on-nsw-labor-party-20210505-p57p4y.htmlExploit: Ransomware
NSW Labor Party: Political Organization

Risk to Business:Â 2.109 = Severe
The ransomware group Avaddon is threatening to release a trove of sensitive information including images of passports, driver’s licenses and employment contracts from a ransomware hit on the NSW Labor Party. The cybercriminals have demanded a response to its ransom request within 240 hours and threatened to launch a denial of service attack against the party if it did not pay. NSW Police has come on board in the investigation.
Customers Impacted:Â Unknown
How it Could Affect Your Business: Ransomware is the modern cybercriminal’s weapon of choice. Make sure your clients are taking every possible precaution because 61% of organizations worldwide experienced a damaging ransomware incident in 2020.
Australia – Schepisi Communications
https://www.news.com.au/technology/online/hacking/telstra-service-provider-hit-by-cyber-attack-as-hackers-claim-sim-card-information-stolen/news-story/2ff32b2e3634506882102e9c9d012994Exploit:Â Hacking
Schepisi Communications: Cloud Storage

Risk to Business:Â 2.307 = Severe
Melbourne-based Schepisi Communications has been the victim of a suspected ransomware attack. The company’s website has been offline for days after a hacker group said it infiltrated the company’s data systems and posted a disturbing ransom note on the dark web. The company is a service provider for Telstra that supplies phone numbers and cloud storage services. Among Schepisi’s other customers that appeared to have had their information exposed were global food conglomerate Nestle, a Melbourne radio station, an Australian property management firm, and a financial services company based in Victoria.
Customers Impacted:Â Unknown
How it Could Affect Your Business: Malware and ransomware have been the plague of increasingly beleaguered service providers.
India – WedMeGood
https://www.hackread.com/shinyhunters-leak-india-wedmegood-database/Exploit:Â Hacking
WedMeGood: Wedding Planning

Risk to Business:Â 1.817 = Severe
Legendary cybercrime gang ShinyHunters has dumped a database belonging to WedMeGood, a popular Indian wedding planning platform. WedMeGood is yet to verify the data breach. Dark web analysts say that the database contains 41.5 GB worth of data. Lately, the hacking group has been focusing on leaking databases of Indian entities.

Risk to Business:Â 1.773 = Severe
Impacted users have had PII exposed including full names, city, gender, phone numbers, email addresses, password hashes, booking leads, last login date, account creation date, Facebook unique ID numbers, vacation descriptions for Airbnb and other wedding details. Site users will want to be aware of the potential of spear-phishing attacks using this data.
How it Could Affect Your Business: Ransomware attacks have been especially prevalent against targets in India recently. Every organization in the sector should step up phishing resistance training to reduce the chance of falling prey to an attack.