Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 1469  |
|  Mike Powell to MICKEY  |
|  Ransomware disruptions co  |
|  27 Jun 25 10:17:00  |
 TZUTC: -0500 MSGID: 1202.consprcy@1:2320/105 2cc3f6b1 REPLY: 93.consprcy@1:229/308 2cc31202 PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0 TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0 BBSID: CAPCITY2 CHRS: ASCII 1 > MP> Ransomware disruptions contributed to a patient death, NHS finds > MP> Its said that Qilin, the ransomware gang, demanded $50 million from > MP> Synnovis in return for the stolen data, but reports suggest that Synnovis > MP> either refused or failed to pay the ransom, and the data was then > MP> published online. > backups... Backups... BACKUPS. While that is an obvious reaction, you would have to know how long the ransomeware was on your network before it was activated. If it had sat there a while, the backups would likely all be infected, too. * SLMR 2.1a * Driving Lesson One: Shiny side up; rubber side down. --- SBBSecho 3.20-Linux * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105) SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700 SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428 SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200 SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35 PATH: 2320/105 229/426 |
[ << oldest | < older | list | newer > | newest >> ]