home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 1549 
 August Abolins to All 
 hackers targeting hospitals 
 06 May 20 18:48:00 
 
MSGID: 2:221/1.58@fidonet e42a92b9
PID: OpenXP/5.0.43 (Win32)
CHRS: ASCII 1
TZUTC: -0400
Hello!

https://krebsonsecurity.com/2020/05/europes-largest-private-hospital- 
operator-fresenius-hit-by-ransomware/

==[begin]==

06 May 20
Europe's Largest Private Hospital Operator Fresenius Hit by Ransomware

Fresenius, Europe's largest private hospital operator and a major provider
of dialysis products and services that are in such high demand thanks to
the COVID-19 pandemic, has been hit in a ransomware cyber attack on its
technology systems.

==[end===


The article doesn't report HOW the ransomeware got triggered.

But if it was by some cleverly disguised email/link originally in an  
employee's email, why can't the outbound email servers be configured to  
only allow valid domains? ..and thus sending the bogus ones to the bit  
bucket.

WRT Email: Employees at places of work like the article describes,  
shouldn't even have access to email other than to company-related  
addresses.

WRT WWW: An employee shouldn't even be able to access links that are  
designed to be phish-bait.

Can't a company's local servers simply block all www domains except the  
ones approved?

Eg. People at work don't need to access Facebook or expose company  
computers to malicious sites.

  ../|ug

--- OpenXP 5.0.43
 * Origin:  (2:221/1.58)
SEEN-BY: 1/123 90/1 103/705 120/340 601 154/10 203/0 221/1 6 360 226/30
SEEN-BY: 227/114 702 229/101 426 452 664 1014 240/5138 5832 5853 249/206
SEEN-BY: 249/317 400 280/464 5003 288/100 292/854 8125 310/31 317/3
SEEN-BY: 320/219 322/757 342/200 396/45 423/81 120 712/848 770/1 2432/390
SEEN-BY: 2452/250 2454/119
PATH: 221/1 280/464 240/5832 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca