FBI Healthcare Ransomware Cybercrime Warning

As you may have seen, Federal agencies have issued an unprecedented warning against “an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.” (see statement below) While the warnings are focused on the healthcare industry, it is important to note that the Ryuk ransomware involved is not specific to any particular industry. We are sending this email out to give you a heads up about this Cybercrime threat and we wanted to make sure that you let your employees know to be extra vigilant with their emails. 

Ransomware usually comes into a company via an email that looks legit with a link or attachment. For example, the hackers can send an email that looks like it is coming from UPS or FedEx with a tracking number or from Amazon with a status update of your order.  If the employee clicks on the link or opens the attachment, it then downloads Ransomware malicious code into your network and encrypts all your data which shuts everything down. This attack is called Ransomware because the hackers usually charge a Ransom in bitcoin to send you the de-encryption codes in order to get your data back (in a sense, they are holding your data hostage). Please note that even with all the security controls in place, the hackers are finding new ways to make emails look legitimate and with an employee clicking on the email link inside the trusted network, it is bypasses a lot of the security controls already in place.

You usually can recover your data without paying these terrorists by having good backups and restoring the data. But, please keep in mind that most companies that are hit with Ransomware are down for several days as the clean up and restore process takes time. This would obviously be disastrous for your operation so we want to prevent any Ransomware issues at all costs. Also, Microsoft Office 365 and Google G-Suite is not immune to Ransomware and is actually a popular target for the hackers. Though Microsoft and Google both have some protection against Ransomware and some backup features, we highly recommend investing in a 3rd party SaaS Office 365 backup.

If you are interested in getting further information on how you can protect your environment, please contact BNMC.



Ransomware Activity Targeting the Healthcare and Public Health Sector

10/28/2020 07:38 PM EDT

Original release date: October 28, 2020

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers. 

CISA, FBI, and HHS have released AA20-302A Ransomware Activity Targeting the Healthcare and Public Health Sector that details both the threat and practices that healthcare organizations should continuously engage in to help manage the risk posed by ransomware and other cyber threats. The advisory references the joint CISA MS-ISAC Ransomware Guide that provides a ransomware response checklist that can serve as a ransomware-specific addendum to organization cyber incident response plans. 

CISA, FBI, and HHS are sharing this information in order to provide a warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats. CISA encourages users and administrators to review CISA’s Ransomware webpage for additional information. 

Comment for this post has been locked by admin.


By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Privacy Email Cloud Microsoft Network Security Software Hackers Efficiency Business Hosted Solutions Data Workplace Tips Computer Malware Hardware Communication Google IT Services IT Support Small Business Smartphone Mobile Devices Internet Cloud Computing Android Tech Term Mobile Device Managed IT Services Data Recovery Backup Smartphones Phishing Users Ransomware Innovation Outsourced IT Windows VoIP Saving Money Upgrade Information Disaster Recovery Miscellaneous communications Windows 10 Facebook Cybersecurity Network Data Backup Social Media Business Management Server Office 365 Browser Microsoft Office Business Continuity Passwords Productivity Quick Tips Managed IT Services Windows 10 Data Management Internet of Things Managed Service Remote Monitoring Apps Collaboration Word Save Money Analytics Gadgets Gmail COVID-19 App Vulnerability Remote Work Mobile Office Encryption Chrome Conferencing Artificial Intelligence Managed Service Provider Government Money Infrastructure Information Technology Networking Google Drive Display VPN Access Control Applications Router Settings Employer-Employee Relationship Company Culture Virtual Reality Tip of the week Paperless Office IT Support Remote Workers Spam WiFi BYOD Website HIPAA Office Tips BDR Content Filtering Bandwidth Maintenance IT Management Data Security Firewall Business Technology Big Data Virtual Private Network Document Management Apple Robot Education Storage Automation End of Support Employee-Employer Relationship Hacker Data storage Avoiding Downtime YouTube Development Antivirus Operating System Computers Risk Management Unified Threat Management Hosted Solution Telephone Systems Humor Search Retail Alert Administration Best Practice desktop Laptop Mobile Security Mouse The Internet of Things Going Green Vendor Management Server Management Monitors Touchscreen Chromebook Compliance Business Intelligence iOS Downtime Managed IT Solid State Drive Printing How To Marketing Wireless Tablet Regulations Password Training Managed Services Hard Disk Drive Augmented Reality Remote Computing MSP IT Two-factor Authentication Managing Stress Social Network OneNote SaaS Managed IT Service Computing Data Breach Customer Relationship Management Scam Wi-Fi Outlook Windows 7 Holiday Bring Your Own Device Virtualization Break Fix Data loss LiFi Social Software as a Service Screen Reader Charging Slack Hard Disk Drives Buisness Smart Office Typing Print Toner Myths Black Friday Current Events Messaging Emergency Payment Card Politics Sports Licensing Dongle Digital Payment Content Huawei Servers Google Calendar Reviews Virtual Desktop Wires Dark Web Logistics Work/Life Balance Assessment Digital Digital Signage Data Warehouse Network Management PCI DSS Customer Service Solar Meetings Disaster Entertainment Vendor Smart Tech Monitoring Solid State Drives Health Private Cloud Work Cryptocurrency Shortcuts Mobile Management Cyber Monday Office Samsung IT solutions Employee-Employer Relationships Inventory Tech Support Cooperation Service Level Agreement Streaming Google Docs Processor Legislation Remote Voice over Internet Protocol Microsoft Excel Asset Management Hotspot Internet Exlporer Spyware Troubleshooting Business Analysis SharePoint Battery Uninterrupted Power Supply Hacks Hybrid Cloud Cybercrime Connectivity Computer Care IBM Spying Google Wallet National Security Techology Peripheral IT Technicians Optimization File Sharing Bitcoin Security Cameras Profiles Smart Technology Social Engineering Analysis Students Lenovo Shadow IT Websites Staff Leominster Business Growth Human Error Memory Statistics Twitter Modem FinTech Mail Merge Blockchain Memes Language Value Identity Theft Legal Virus Downloads Files Scalability Safety IoT Corporate Profile Unified Communications Drones Updates VoIP Unified Threat Management Management Mirgation Recycling Windows 8 Utility Computing Shortcut Distributed Denial of Service G Suite Mixed Reality Firefox Superfish Gamification K-12 Schools Automobile Device Reducing Cost Bluetooth Comparison Cookies Mobile Device Management Migration Consulting Address Permissions Halloween Computing Infrastructure Professional Services Deep Learning LED Threats RMM Network Congestion Social Networking Dell Star Wars WannaCry PowerPoint User Error Policy Chatbots eWaste Cabling Laptops Patch Management Nanotechnology Wearable Technology Network upgrade Google Maps Alt Codes Mobility Batteries Specifications Writing Holidays Scary Stories Alerts USB Co-Managed IT Heating/Cooling Multi-Factor Security Banking Motherboard Cables Distribution Running Cable Fraud Cost Management Onboarding Budget GDPR Time Management Printer Procedure Dark Data Update Identity Continuity Managed Services Provider IT Consultant Computer Repair Relocation Mobile Data Cameras How To Tracking Recovery Regulation Cleaning CCTV Black Market Law Enforcement Webcam Notifications Electronic Medical Records Physical Security Error user treats Upgrades Gadget Printers Emoji Point of Sale Ben McDonald shares Crowdsourcing Travel Personal Information Botnet 3D Printing Supercomputer CrashOverride Cortana Staffing Motion Sickness Taxes Machine Learning Administrator Processors Mobile Computing Unsupported Software IT Budget Financial Web Server what was your? GPS

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3