Home Security Windows ransomware variant targets healthcare sector
Windows ransomware variant targets healthcare sector Featured

A new variant of the Philadelphia ransomware is targeting the healthcare sector in the US, researchers from the security firm Forcepoint have found.

Philadelphia is believed to be a new version of the ransomware known as Stampado.

The method of attack is using a shortened URL sent through a spear-phishing email. Forcepoint's Roland Dela Paz said he had come across a case where an attack was attempted on a hospital in Oregon and Southern Washington.

If a user clicked on the link in the email, then a malicious Microsoft Word file would be downloaded from a personal storage site.

"This document contains the targeted healthcare organisation's logo and a signature of a medical practitioner from that organisation as bait," Dela Paz wrote. "Three document icons pertaining to patient information are present in the file."

New strain of Philadelphia ransomware.

The ransom message seen after the new variant of Philadelphia ransomware finished encrypting files on a Windows system.

If the user clicks on any of the icons, a variant of the Philadelphia ransomware is downloaded and executed.

"Believed to be a new version of the Stampado ransomware, Philadelphia is an unsophisticated ransomware kit sold for a few hundred dollars to anyone who can afford it," Dela Paz wrote. "Recently, a video advertisement of Philadelphia surfaced on YouTube."

He said upon execution, the dropped Philadelphia variant got in touch with its command and control server. System information including the operating system, username, country, and system language were transmitted and the C&C server then generated a victim ID, a Bitcoin wallet ID and the Bitcoin ransom price.

Dela Paz said his interest was piqued by a couple of things: "Aside from the tailored bait against a specific healthcare organisation, the encrypted JavaScript contained a string 'hospitalspam' in its directory path.

"Likewise, the ransomware C2 also contained 'hospital/spam' in its path. Such wordings would imply that this is not an isolated case; but that the actor behind the campaign is specifically targeting hospitals using spam (spear phishing emails) as a distribution method."

He added that based on the directory timestamp found on the ransomware C2, it looked like this particular campaign against hospitals started in the third week of March.

Forcepoint principal security analyst Carl Leonard said: “While processing our open source intelligence feeds we discovered Philadelphia, currently a cheap, poorly written ransomware that is available cheaply to script kiddies.

"Although the ransom is currently only 0.3 BTC, the command and control paths suggest that the actor is targeting hospitals for this campaign so there are likely to be other targets.

"While this might not seem like a huge attack on the healthcare sector, should this trend catch on, collectively this represents a huge risk to the industry.”

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect