Breaking News: Kettering Health Faces Data Breach as Interlock Ransomware Leaks Stolen Data
Interlock Ransomware Claims Kettering Health Breach, Leaks Stolen Data
Summary
The Interlock ransomware gang has claimed a major cyberattack on the Kettering Health healthcare network.
Not only have these cyber criminals confirmed their involvement, but they have also started leaking data they supposedly stole from the compromised systems.
The Attack
Ohio-based Kettering Health fell victim to a sophisticated cybersecurity breach recently.
After a thorough analysis, it was discovered that the attack was orchestrated by Interlock, a notorious ransomware group known for its steadily escalating cybercrime activities.
Invasion and Impact
The modus operandi of this attack resembles prior cyber incursions by this band of cybercriminals.
Kettering Health reports that a trojan likely infiltrated its network initially, establishing a backdoor for the subsequent ransomware attack.
Once the security perimeter was breached, the hackers reportedly managed to access confidential data and in some instances encrypted this information, holding it hostage.
It is currently unclear what volume of data has been affected or the full extent of the information extracted.
Data Leak
Worse still, the Interlock gang has begun leaking some of the stolen data on its dark web portal, as a pressure tactic to enforce ransom payment.
This compromises the personal and medical data of potentially thousands of affected patients.
Response and Mitigation
In response, Kettering Health has engaged in a full-scale remediation strategy.
They have involved external cybersecurity experts and law enforcement agencies in their endeavors to investigate the breach, recover stolen data, and reassert security.
Furthermore, they are offering identity protection services to the affected patients.
Preventive Measures
The episode underlines the vulnerability of healthcare networks to such egregious breaches from ransomware attackers.
Healthcare organizations are urged to practice robust cybersecurity hygiene: keep software and systems updated; educate staff about phishing scams; double down on encryption and use multi-factor authentication; and regularly backup and store data securely off-site.