Connect with us

Malware

PharMerica Patients at Risk: Ransomware Attackers Steal Data of 5.8 Million Individuals

PharMerica, a US-based pharmacy services provider, has confirmed that it has suffered a data breach, with the personal information of over 5.8 million patients being stolen by the Conti ransomware gang. The stolen data includes patient names, dates of birth, social security numbers, and medical information, which could be used for identity theft and other fraudulent activities. PharMerica has reportedly paid an undisclosed amount to the attackers to recover the stolen data.

Published

on

A table with pills and tablets.

IT Services provider PharMerica has recently announced a significant data breach that affected more than 5.8 million patients, compromising their medical information and making it available to hackers.

PharMerica is present in 50 states in the US, operating 180 local and 70,000 backup pharmacies, and catering to 3,100 medical facilities across the country.

As per a data breach notification filed with the Office of the Maine Attorney General, PharMerica’s system was hacked on March 12th, 2023, and hackers stole the complete details of 5,815,591 individuals, including their full names, addresses, dates of birth, social security numbers (SSNs), medications, and health insurance information.

PharMerica discovered the intrusion on March 14th, 2023, and its investigation established on March 21st that hackers had been able to steal client data. However, PharMerica sent out notifications of the data breach only last Friday, May 12th, 2023.

PharMerica is offering one year of identity protection fraud monitoring services to affected individuals through Experian, and it is highly recommended that they take up the offer to minimize the risk of further attacks.

How Were Hackers Able to Steal Patients’ Information in Both the HCA and PharMerica Data Breaches?

In the face of a massive data breach at hca, hackers exploited vulnerabilities within the system, resulting in the theft of patients’ information. Similarly, PharMerica endured a similar fate as hackers targeted their network, compromising patient data. These incidents highlight the pressing need for robust cybersecurity measures to safeguard sensitive information and protect individuals from such malicious activities.

Data Exposed by Hackers

Although PharMerica did not specify the type of hacking incident, the Money Message ransomware gang claimed responsibility for the attack on March 28th, 2023, when they started publishing the stolen data.

Money Message listing PharMerica as its latest victim
Money Message listing PharMerica as its latest victim
Source: BleepingComputer

Besides PharMerica, the threat actors also listed BrightSpring, a health service provider that merged with PharMerica in March 2019. Money Message claimed to have stolen 4.7 TB of data during their attack on PharMerica, consisting of at least 1.6 million unique records of personal information.

The timer ran out on April 9th, 2023, and the threat actors published what they claim is all of the stolen data on their extortion site. Unfortunately, the files are still available for download at this time.

To make matters worse, a threat actor has already posted the entire data dump on a clearnet hacking forum, breaking the file into 13 parts for easier downloading.

Forum user reposting the PharMerica data leak
Hacker forum user reposting the PharMerica data leak
Source: KELA

Money Message is a new ransomware operation that gained attention for its attack against Taiwanese PC parts maker MSI (Micro-Star International) in March 2023.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Malware

Cisco Probes Intrusion as Stolen Data Emerges for Sale on Cybercriminal Platform

Cisco is investigating a potential breach after a hacker claimed to have stolen 200GB of sensitive data. The company is working to determine the authenticity of the claim and assess any potential impacts on its customers. Protect your network with Cisco’s integrated security solutions and stay informed with the latest cybersecurity updates.

Published

on

In a striking visual, the Cisco logo emerges against a backdrop of red and blue diagonal light streaks and dots, echoing the dynamic atmosphere where Cisco probes intrusion within cybercriminal platforms.

Recently, we received information that Cisco, a leading IT company, is investigating a possible data breach after a threat actor claimed to have stolen sensitive data and put it up for sale on a hacking forum. Don’t worry, we’ve got you covered with the latest updates on this situation.

What’s going on with Cisco?

Cisco confirmed that they are looking into these claims and have launched an investigation to assess the situation. A Cisco spokesperson stated, “We are aware of reports that an actor is alleging to have gained access to certain Cisco-related files.” The investigation is still ongoing.

This all started when a notorious threat actor going by the name “IntelBroker” claimed that they, along with two accomplices called “EnergyWeaponUser” and “zjj,” had breached Cisco on October 6, 2024, and made off with a significant amount of developer data from the company. The stolen data apparently includes GitHub projects, GitLab projects, SonarQube projects, source code, hardcoded credentials, customer documents, and much more.

What has been leaked?

IntelBroker shared samples of the alleged stolen data, which includes a database, customer information, various customer documentation, and screenshots of customer management portals. However, they did not provide any details about how they obtained the data.

It’s worth noting that back in June, IntelBroker was involved in selling or leaking data from several other companies, such as T-Mobile, AMD, and Apple. Those attacks were believed to have been carried out by targeting a third-party managed services provider for DevOps and software development. It’s not clear yet whether the Cisco breach is related to these previous incidents.

What’s the current status of the investigation?

As of now, Cisco is continuing to investigate the reports and has engaged law enforcement to assist in their efforts. So far, they have found no evidence of a breach in their systems. If any confidential customer information is confirmed to have been obtained by the threat actor, Cisco has stated that they will notify the affected customers.

In conclusion, it’s essential to stay vigilant and keep up-to-date on the latest cybersecurity news and threats. You can trust us to provide you with the most recent information and help you navigate the ever-evolving world of cybersecurity. Don’t hesitate to contact us to learn more about how to protect your organization, and keep coming back for more updates on this and other cybersecurity topics.

Continue Reading

Malware

Game Freak Confirms Massive Breach: Stolen Pokémon Data Exposed Online

Game Freak, the developer behind Pokémon, has confirmed a security breach after stolen data leaked online. The leaked data includes information on unreleased games, potentially impacting both the company and fans. Game Freak is working to address the situation and strengthen their security measures to prevent future incidents.

Published

on

An animated character in an orange outfit and hat stands beside a fox-like creature with large ears in a sunlit forest, reminiscent of a Game Freak creation.

Imagine spending years of your life working on a top-secret project, only for it to be stolen and leaked online. That’s what happened to Game Freak, the Japanese video game developer behind the wildly popular Pokémon series, in August 2024. And now, we’re learning just how extensive the damage was.

A Digital Heist in the World of Pokémon

Game Freak has been at the forefront of the Pokémon gaming world since 1996, when they released Pokémon Red and Blue for the Nintendo Game Boy. Since then, they’ve produced countless titles for various Nintendo platforms, as well as for iOS and Android devices.

But in August, things took a turn for the worse. Screenshots of source code and development builds for upcoming Pokémon games started appearing on leak sites and channels like Discord, Reddit, and X. While Game Freak didn’t acknowledge the leak of the game data, they did confirm something even more concerning: the personal information of their workforce, contractors, and former employees was stolen in the cyberattack.

Damage Control and Apologies

In a machine-translated notice, Game Freak stated, “We deeply apologize for any inconvenience and concern this may have caused to all concerned parties.” They went on to explain that the leaked information included full names and company email addresses. While this doesn’t put people at risk for identity theft, it does leave them vulnerable to phishing and targeted brute-forcing attacks.

Game Freak is working to contact those affected by the incident individually, but they published the notice on their site because not everyone can be reached. On a positive note, it seems that Pokémon player data hasn’t been impacted. Game Freak has completed a detailed investigation of the breached servers and implemented security measures to prevent similar incidents in the future.

Not an Isolated Incident

Game Freak isn’t the only gaming company to fall victim to a cyberattack recently. Earlier this month, Canadian video game developer Red Barrels warned its community that an attack could cause delays on patches and additional content for existing Outlast games and upcoming titles. The Nitrogen ransomware group later claimed responsibility for the attack, boasting that they had stolen 1.8 TB of confidential data from Red Barrels.

As for the attack on Game Freak, no one has claimed responsibility yet. But the fact remains that this is a stark reminder of the vulnerability of even the most successful companies in the gaming industry.

What You Can Do to Help

As fans and consumers, it’s essential for us to stay informed and vigilant about cybersecurity. By keeping up-to-date with the latest news and best practices, we can help protect ourselves and the companies we love from these devastating cyberattacks.

But you don’t have to do it alone. Our IT Services team is here to help you navigate the ever-evolving landscape of cybersecurity. Don’t hesitate to contact us with any questions or concerns you might have. And remember to keep coming back for the latest information and advice on staying secure in the digital world.

Continue Reading

Malware

Casio Reveals Alarming Customer Data Breach in Recent Ransomware Assault

Casio has confirmed that customer data was stolen during a ransomware attack on its Brazil-based subsidiary in July. The company is working with the authorities and has implemented additional security measures to prevent future incidents. Learn more about the compromised data and Casio’s response to the attack.

Published

on

A red background with the word Casio on it, attracting customers.

Did you hear about the recent cyberattack on Casio? The company has now confirmed that it suffered a ransomware attack earlier this month. Worse still, the personal and confidential data of employees, job candidates, and some customers was also stolen. We want to help you understand the implications of such attacks and how to protect your own information.

Details of the Casio Ransomware Attack

The attack came to light when Casio warned that it was facing system disruption and service outages due to unauthorized access to its networks during the weekend. The Underground ransomware group later claimed responsibility for the attack, leaking various documents allegedly stolen from the Japanese tech giant’s systems. Today, Casio has published a new statement admitting that sensitive data was indeed stolen during the attack on its network.

What Information Was Compromised?

According to Casio’s ongoing investigation, the following information has been confirmed as likely compromised:

  • Personal data of both permanent and temporary/contract employees of Casio and its affiliated companies.
  • Personal details related to business partners of Casio and certain affiliates.
  • Personal information of individuals who have interviewed for employment with Casio in the past.
  • Personal information related to customers using services provided by Casio and its affiliated companies.
  • Details related to contracts with current and past business partners.
  • Financial data regarding invoices and sales transactions.
  • Documents that include legal, financial, human resources planning, audit, sales, and technical information from within Casio and its affiliates.

However, Casio has clarified that customer data exposed in the breach does not include credit card information, as payment data isn’t stored on its systems. Additionally, the company says service systems like CASIO ID and ClassPad.net were not affected by the incident, as they are not hosted on the breached server infrastructure.

What Can You Do?

As the investigation continues, the scope of the impact may broaden. If you believe you may be affected, remain vigilant against unsolicited emails. Casio also requests internet users to avoid sharing any leaked information online, as doing so only worsens the situation for those affected by the data breach. In their updated statement, Casio says, “Please refrain from spreading this information through social media, etc., as it could increase the damage caused by the leak of information on this case, violate the privacy of those affected, have serious effects on their lives and businesses, and encourage crime.”

The police and Japan’s Personal Information Protection Commission have been informed about the situation since earlier this week. Authorities are now involved in the investigations and remediation efforts.

Stay Informed and Stay Safe

Unfortunately, cyberattacks like the one on Casio are becoming all too common. It’s crucial for everyone to stay informed about cybersecurity and take steps to protect their personal information. Keep coming back to learn more about the latest developments in cybersecurity and how you can safeguard your information from cyber threats. If you have any questions or concerns, don’t hesitate to reach out to us for assistance.

Continue Reading

Trending