Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 1549  |
|  August Abolins to All  |
|  hackers targeting hospitals  |
|  06 May 20 18:48:00  |
 MSGID: 2:221/1.58@fidonet e42a92b9 PID: OpenXP/5.0.43 (Win32) CHRS: ASCII 1 TZUTC: -0400 Hello! https://krebsonsecurity.com/2020/05/europes-largest-private-hospital- operator-fresenius-hit-by-ransomware/ ==[begin]== 06 May 20 Europe's Largest Private Hospital Operator Fresenius Hit by Ransomware Fresenius, Europe's largest private hospital operator and a major provider of dialysis products and services that are in such high demand thanks to the COVID-19 pandemic, has been hit in a ransomware cyber attack on its technology systems. ==[end=== The article doesn't report HOW the ransomeware got triggered. But if it was by some cleverly disguised email/link originally in an employee's email, why can't the outbound email servers be configured to only allow valid domains? ..and thus sending the bogus ones to the bit bucket. WRT Email: Employees at places of work like the article describes, shouldn't even have access to email other than to company-related addresses. WRT WWW: An employee shouldn't even be able to access links that are designed to be phish-bait. Can't a company's local servers simply block all www domains except the ones approved? Eg. People at work don't need to access Facebook or expose company computers to malicious sites. ../|ug --- OpenXP 5.0.43 * Origin: (2:221/1.58) SEEN-BY: 1/123 90/1 103/705 120/340 601 154/10 203/0 221/1 6 360 226/30 SEEN-BY: 227/114 702 229/101 426 452 664 1014 240/5138 5832 5853 249/206 SEEN-BY: 249/317 400 280/464 5003 288/100 292/854 8125 310/31 317/3 SEEN-BY: 320/219 322/757 342/200 396/45 423/81 120 712/848 770/1 2432/390 SEEN-BY: 2452/250 2454/119 PATH: 221/1 280/464 240/5832 229/426 |
[ << oldest | < older | list | newer > | newest >> ]