home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 1469 
 Mike Powell to MICKEY 
 Ransomware disruptions co 
 27 Jun 25 10:17:00 
 
TZUTC: -0500
MSGID: 1202.consprcy@1:2320/105 2cc3f6b1
REPLY: 93.consprcy@1:229/308 2cc31202
PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0
TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0
BBSID: CAPCITY2
CHRS: ASCII 1
>  MP> Ransomware disruptions contributed to a patient death, NHS finds

>  MP> Its said that Qilin, the ransomware gang, demanded $50 million from
>  MP> Synnovis in return for the stolen data, but reports suggest that
Synnovis
>  MP> either refused or failed to pay the ransom, and the data was then
>  MP> published online.

> backups... Backups...  BACKUPS.

While that is an obvious reaction, you would have to know how long the
ransomeware was on your network before it was activated.  If it had sat
there a while, the backups would likely all be infected, too.


 * SLMR 2.1a * Driving Lesson One: Shiny side up; rubber side down.
--- SBBSecho 3.20-Linux
 * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)
SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700
SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428
SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200
SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35
PATH: 2320/105 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca