Ingram Micro, a major distributor, confirmed a ransomware attack affecting its systems, including its AI platform, leading to order processing and shipping delays. The company is working to restore services, has notified law enforcement, and faces criticism over communication and contingency planning, raising concerns among partners about supply chain impacts.
The LockBit ransomware group is threatening to release stolen Fulton County Court documents related to Donald Trump's case unless a ransom is paid, claiming the files contain information that could impact the upcoming U.S. election. This comes shortly after the FBI's takedown of LockBit's infrastructure, with the group's leader suggesting the move was politically motivated. The group also endorsed Donald Trump for President and threatened further attacks on the government sector.
Epic Games is investigating claims of a massive ransomware attack resulting in the theft of almost 200GB of data, including sensitive information such as emails, passwords, payment details, and source code. The alleged culprits, a new ransomware group called Mogilevich, are reportedly demanding payment for the return of the data. However, Epic Games has stated that there is currently no evidence to support these claims and that they are actively investigating the situation. Users are advised to consider changing their Epic Games Store passwords as a precaution.
The 'Blackcat' ransomware gang is reportedly responsible for the recent outage at UnitedHealth's technology unit, causing disruptions in prescription deliveries at pharmacies across the United States. The hackers gained access to Change Healthcare's IT systems, triggering the six-day outage. Alphabet's cybersecurity unit Mandiant is investigating the breach, while the U.S. cyber watchdog agency and the FBI have yet to respond to the incident. The outage has impacted pharmacy chains like CVS Health and Walgreens, leading to significant backlogs of prescriptions and insurance claim transmission issues.
Lurie Children’s Hospital in Chicago is facing an eighth day of network outage, believed to be caused by a ransomware attack, leaving computers, phones, and electronic records inaccessible. Patients and staff are experiencing significant inconvenience, with one family having to seek help on social media for a life-saving prescription. Experts suspect a ransomware attack due to the hospital's sensitive data, and the hospital has established a call center to address patient needs while working with the FBI and cybersecurity experts to resolve the issue.
First American, a real estate firm, has become the latest victim of a cybersecurity incident, with certain systems being taken offline. This comes shortly after the company was fined $1 million for a previous cybersecurity violation. The incident has caused delays in closings. The title industry has recently experienced multiple cyber attacks, including a ransomware attack on Fidelity National Financial and a data breach at Mr.Cooper, resulting in class action lawsuits.
VF Corporation, the owner of popular brands like Vans, The North Face, and Timberland, has disclosed a ransomware attack that occurred on December 13, 2023. The attack resulted in operational disruptions, with some IT systems being encrypted and personal data being stolen. While the impact on physical retail stores is expected to be minimal, customers may experience delays in online order fulfillment. VF Corp is working to bring affected systems back online and assess the full extent of the breach's impact on its financials and operations.
Sony is investigating an alleged ransomware attack on Insomniac Games by the Rhysida group, which claims to have stolen sensitive data, including personal information of the voice actor for Peter Parker in Spider-Man 2. The group has posted some of the data as proof and is auctioning the full set for around $2 million worth of bitcoin. The data reportedly includes details about Insomniac's upcoming Wolverine game and scans of employees' passports. Sony has stated that it is aware of the reports but does not believe any other divisions were affected. This is not the first breach for Sony this year, and the Rhysida group's hacks are attributed to organizations lacking multi-factor authentication.
Insomniac Games, the developer behind Marvel's Spider-Man and the upcoming Wolverine game, has reportedly been targeted by a ransomware attack. The Rhysida group claims to have stolen personal data of current and former employees, including passport scans and emails, as well as unreleased information about the X-Men game. The hackers also claim to have acquired screenshots and character art for Marvel's Wolverine. They have given Insomniac Games seven days to respond or they will publish the data and are auctioning it off with a starting bid of 50 Bitcoin. Rhysida is a relatively new group known for targeting U.K. institutions, and their ransomware primarily affects Microsoft Windows users. Government agencies have warned organizations about the threat of Rhysida ransomware. Sony, the owner of Insomniac Games, has previously been hacked twice this year.
Sony's game developer Insomniac has reportedly been hit by a ransomware attack, with the hacking group Rhysida running a public auction for the stolen data, including in-game screenshots of the in-development Wolverine game. The group claims to have employee personal data, including passport images, and is demanding $2 million in bitcoin. The leaked screenshots do not reveal story spoilers, but the situation raises concerns about potential delays in game development and the release of sensitive personal information.
Norton Healthcare, a US healthcare giant, has confirmed that hackers accessed the personal data of approximately 2.5 million patients and employees during a ransomware attack in May. The sensitive information accessed includes names, dates of birth, Social Security numbers, health and insurance information, and medical identification numbers. Some individuals' data may have also included financial account numbers, driver licenses, or other government ID numbers. It is unclear if the accessed data was encrypted. Norton Healthcare did not pay any ransom and notified law enforcement about the attack. This breach is part of a growing trend of data breaches in the US healthcare sector, with a significant increase in large breaches and ransomware attacks reported in recent years.
Around 60 credit unions in the United States are facing outages due to a ransomware attack on an IT provider they use, according to the National Credit Union Administration (NCUA). The extent of the outage and its impact on credit unions is still unclear. The attack targeted Trellance, a cloud computing firm provider used by credit unions, through a third-party vendor called FedComp. Ransomware attacks have increasingly disrupted critical infrastructure in the US, including hospitals, fuel pipelines, and schools, leading the Biden administration to address ransomware as a national security crisis.
Several emergency rooms that were shut down due to a ransomware attack on Ardent Health Services are gradually resuming service, although some patients continue to face lingering issues. While some hospitals are diverting crucial patients, others have resumed normal emergency services. The attack, which occurred on Thanksgiving Day, resulted in the locking up of computer networks and a demand for ransom. Although some patients had to reschedule procedures, no deaths have been reported as a result of the cyberattack. The hackers' deliberate targeting of a healthcare system has raised concerns about patient care and cybersecurity.
Capital Health, a medical system with hospitals in Trenton and Hopewell, New Jersey, is experiencing network outages due to a suspected cybersecurity incident. While patient care continues, there are disruptions, including the prioritization of elective surgeries and the unavailability of outpatient radiology and some cardiology testing. The hospital has notified authorities, but it is unclear if there has been a breach of patient, employee, or financial data. Experts believe this is likely a ransomware attack, with organized crime groups demanding payment. Primary care doctors' offices remain unaffected, but the hospital expects to operate with system limitations for at least a week.
Hospitals operated by Ardent Health Services in at least four states have diverted patients from their emergency rooms following a ransomware attack. While patient care continues to be delivered safely, some emergency room patients have been transferred to other hospitals, and non-urgent procedures have been rescheduled. The affected hospitals include those run by Hillcrest HealthCare System, Lovelace Health System, UT Health, Hackensack Meridian's Mountainside Medical Center, and Pascack Valley Medical Center. Ardent Health Services, which owns and operates 30 hospitals and over 200 sites of care, took its network offline and suspended user access to IT applications after the cyberattack. The company is working to restore its technology operations and has reported the incident to law enforcement.