HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 6, HOSPITAL HIJINKSOrhan Sari
As we saw in the Hospital Hijinks Episode, Michael had a dream that he clicked on a link in a suspicious email that installed the necessary software to launch a Ransomware attack. As a result of doing this, critical computers at the Hospital were rendered useless. Luckily for Michael, this was just a dream and he didn’t actually click the link to launch the attack.
Ransomware is currently one of the most destructive threats on the Internet today. It can be contracted through various methods, such as email phishing attacks, websites that have been compromised, ads on suspicious websites, infected USB drives, etc. It is extremely important that you use caution when coming across anything suspicious.
1- HOW IT REALLY HAPPENED: CALIFORNIA HOSPITAL PAYS $17,000 TO HACKERS IN ‘RANSOMWARE’ ATTACK 1
A hospital in California was the victim of Ransomware after an attacker successfully convinced a hospital worker to click a malicious link. The link pointed to Ransomware software that encrypted critical hospital files and forced them to pay the ransom to regain access.
2- WHY HOSPITALS ARE THE PERFECT TARGETS FOR RANSOMWARE 2
Hospitals have numerous personal identifiable information (PII) stored for thousands of users. This is what makes them a great target for hackers. This article explains why the latest rounds of Ransomware attacks have targeted hospitals.
3- LOCKY RANSOMWARE INFECTING 90,000 SYSTEMS DAILY3
Locky is a common Ransomware program spreading on the internet. This article explains its growth, what it does to the victim’s data, and the red flags associated with receiving a malicious email that contains the link to its executable.
4- DON’T FALL VICTIM TO RANSOMWARE 4
The key to avoiding Ransomware is to identify it when it’s sent through email. Ransomware is downloaded and an executable runs on the machine. This article describes Ransomware and ways to avoid being a victim.
Ransomware is often included in Word documents in malicious macro downloads. This article explains two attachments that should be avoided when the suspicious email is sent to you.
Try our gamified cybersecurity awareness training for free
Phishing simulation for free– Test your employees’ vulnerability against phishing attacks.