State hackers breach defense, energy, healthcare orgs worldwide
MediaMarkt hit by Hive ransomware, initial $240 million ransom
REvil ransomware affiliates arrested in Romania and Kuwait
Pwn2Own: Printer plays AC/DC, Samsung Galaxy S21 hacked twice
NUCLEUS:13 TCP security bugs impact critical healthcare devices
TeamTNT hackers target your poorly configured Docker servers
Microsoft: Windows 10 2004 reaches end of service next month
Microsoft urges Exchange admins to patch bug exploited in the wild
Qualys BrowserCheck
STOPDecrypter
AuroraDecrypter
FilesLockerDecrypter
AdwCleaner
ComboFix
RKill
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Toksearches.xyz Search Redirect
Remove the Smashapps.net Search Redirect
Remove the Smashappsearch.com Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
eLearning
IT Certification Courses
Gear + Gadgets
Security
medical cross
Medatixx, a German medical software vendor whose products are used in over 21,000 health institutions, urges customers to change their application passwords following a ransomware attack that has severely impaired its entire operations.
The firm clarified that the impact has not reached clients and is limited to their internal IT systems and shouldn’t affect any of their PVS (practice management systems).
However, as it is unknown what data was stolen during the attack, threat actors may have acquired Medatixx customers’ passwords.
Therefore, Medatixx is recommending that customers perform the following steps to make sure their practice management software remains secure:
The firm explained that the above are precautionary measures, but they should be applied as soon as possible.
The software products whose users should respond to this emergency are the following:
The ransomware attack on Mediatixx took place last week, and the company is still recovering, so far only managing to restore e-mail and central telephone systems.
Also, regional sales partners and all customer support lines are up and running, so clients can reach out to company representatives to address any concerns they may have.
There’s no estimate for when the company will return to normal operational status.
Finally, it has not been determined if the actors managed to exfiltrate any client, doctor, or patient data. However, the company states they informed Germany’s data protection authority has about the incident and will issue an update after the investigations are concluded.
“It is not known at this point whether or not, and to what extent any data was stolen. It can therefore not be ruled out that the data stored by us has been stolen,” Mediatixx explained in the translated advisory.
According to Heise Online, Mediatixx solutions are used in about 25% of all medical centers in Germany, and this could be the biggest cyberattack ever to hit the country’s healthcare system.
Moreover, the German news outlet speculates that the actors could exfiltrate user credentials from remote maintenance systems.
This incident is happening at the worst possible moment, as Germany is dealing with a record-high number of COVID-19 cases.
The pandemic already strains hospitals in the country, and the last thing they needed was losing access to essential support software tools or performing system-wide resets.
German investigators identify REvil ransomware gang core member
United Health Centers ransomware attack claimed by Vice Society
US seizes $6 million from REvil ransomware, arrest Kaseya hacker
Clop gang exploiting SolarWinds Serv-U flaw in ransomware attacks
U.S. offers $10 million reward for leaders of REvil ransomware
Not a member yet? Register Now
MediaMarkt hit by Hive ransomware, initial $240 million ransom
State hackers breach defense, energy, healthcare orgs worldwide
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.

source

You May Also Like

REvil ransomware affiliates arrested in Romania and Kuwait

State hackers breach defense, energy, healthcare orgs worldwideMediaMarkt hit by Hive ransomware,…

Facebook to delete 1 billion faceprints in Face Recognition shutdown

CISA orders federal agencies to fix hundreds of exploited security flawsUS sanctions…

New Windows 10 zero-day gives admin rights, gets unofficial patch

Hackers exploit Microsoft MSHTML bug to steal Google, Instagram credsApple sues spyware-maker…

US emergency directive orders govt agencies to patch Log4j bug

TellYouThePass ransomware revived in Linux, Windows Log4j attacksGoogle Calendar now lets you…