Cyber-Crime: Why Hospitals Are The Perfect Targets For Ransomware

hospitals-ransomware-186264888-1024x768

RANSOMWARE HAS BEEN an Internet scourge for more than a decade, but only recently has it made mainstream media headlines. That’s primarily due to a new trend in ransomware attacks: the targeting of hospitals and other healthcare facilities.

The malware works by locking your computer to prevent you from accessing data until you pay a ransom, usually demanded in Bitcoin. Hospitals are the perfect mark for this kind of extortion because they provide critical care and rely on up-to-date information from patient records. Without quick access to drug histories, surgery directives and other information, patient care can get delayed or halted, which makes hospitals more likely to pay a ransom rather than risk delays that could result in death and lawsuits.

“If you have patients, you are going to panic way quicker than if you are selling sheet metal,” says Stu Sjouwerman, CEO of the security firm KnowBe4. Hospitals are a good target for another reason as well: they “have not trained their employees on security awareness … and hospitals don’t focus on cybersecurity in general,” he says. Instead, their primary concern is HIPAA compliance, ensuring that employees meet the federal requirements for protecting patient privacy.

Last month, attackers took computers belonging to the Hollywood Presbyterian Medical Center in Los Angeles hostage using a piece of ransomware called Locky. Computers were offline for more than a week until officials caved to the extortionists’ and paid the equivalent of $17,000 in Bitcoin.

Earlier this month, Methodist Hospital in Henderson, Kentucky was struck by Locky as well, an attack that prevented healthcare providers from accessing patient files. The facility declared a “state of emergency” on a Friday but by Monday was reporting that its systems were “up and running.” Methodist officials, however, said they did not pay the ransomware; administrators in that case had simply restored the hospital’s data from backups.

Then this week, news broke that MedStar Health, which operates 10 hospitals and more than 250 out-patient clinics in the Maryland/Washington, DC area, was hit by a virus that may be ransomware. MedStar wrote in a Facebook post that its network “was affected by a virus that prevents certain users from logging-in to our system,” but a number of employees told the Washington Post that they saw a pop-up screen appear on their computers demanding payment in Bitcoin. The organization responded immediately by shutting down large portions of its network. Employees were unable to access email or a database of patient records, though clinics and other facilities remained open and operating. MedStar did not respond to a call from WIRED.

Read the Remainder at WIRED 

Being a “Criminal” in a Mass Surveillance World

I want to warn you ahead of time, this article is extremely long and sometimes, dense. But Please, don’t give up on it! Read it all the way through, and then re-read it. After that, you will never look at cyber-security and cyber-surveillance “aka Big Brother” the same way again, I ASSURE YOU! Pay Close Attention to the 10 Step “ANTI-SURVEILLANCE “GUIDE at the end…some really good, practical stuff you can do NOW to protect and pre-empt invasions and attacks.

new collection

 

 Original Article:

 You’re a Criminal in a Mass Surveillance World: How Not to Get Caught 

by David Montgomery

Sometimes you just get lucky.

I was in Amsterdam when the Snowden story broke. CNN was non-stop asking politicians and pundits, “Is Edward Snowden a traitor?” Those who said he betrayed America also said something else: Mass surveillance is only an issue if you’re a criminal. If you’ve got nothing to hide then you’ve got nothing to fear.

The Snowden story hit me upon my return from – of all places on earth – the Secret Annex of the Anne Frank House. The Secret Annex is where Anne Frank and her family hid from the Nazis for two years. It was during this period of hiding in terror that Anne wrote her world-famous diary. In it she confided, “I want to be useful or bring enjoyment to all people, even those I’ve never met.”

Anne Frank House then and now

I say I was lucky because the cosmic unlikeliness of my Secret Annex visit coinciding with Snowden’s mass surveillance revelations led to some revelations of my own. My understanding of law, criminality, and mass surveillance coalesced into a horrifying picture.

It turns out we’re all criminals in a mass surveillance world. The only question is whether we’ll get caught. Let me explain.

Read the Remainder at Bananas.Liberty.Me

Cyber-Spook Tradecraft

cyber

 

Originally titled Spyfiles 4 on WikLeaks, this very revealing article reveals some very nasty programs that governments around the world use to spy on their citizens. (Please be careful if you choose to download any of the files on that LINK, as the page warns, even though they have been renamed and compressed, they are still WEAPONIZED GRADE MALWARE.

Beware the Ransomware!

hacker

You know, as we steadily progress into the 21st Century, I for one am seeing a lot of criminal behavior CHANGING; or should I say, EVOLVING into something much more devious and utterly mind-blowing than anyone, especially me, could have ever imagined 20 years ago. Now, you don’t need a gun and a mask to rob a bank or hold something or someone hostage…No, all you need is a DSL connection and hacker tradecraft, and you are IN.

I mean let’s face it, Hackers ARE a threat on many fronts; not only can they can steal your money and your identity, they can also threaten your NATIONAL SECURITY by hacking into critical infra-structure like nuclear power plants, water plants or hospital records. It was recently discovered that Russian hackers had planted malware into a US Nuclear Power Plant Data base; they also hacked Sony and the White House Non-Classified data base (so they are telling us). I mean these guys are into EVERYTHING and ANYTHING.

But, as the bad guy leader Hans said in the 80’s action Hit “Die Hard”...”Who said we were terrorist? We are thieves!” the base instinct in most criminals, cyber or analog, is greed, and to be honest, it is this trait that makes these types of hackers a tad easier to predict and understand than the other 2 types. I mean the ideological types are typically just thieves masquerading as political activist anyways; but the hardest to understand are those purely MALICIOUS assholes that do it just to ruin your day (and your computer typically). And the REALLY bad part (and the one that stings the most for me at least)  is that they typically wind up being some 13-year-old pimped faced kid in their parent’s basement laughing their ass of while at the same time playing World of Warcraft or some other escapist video game. Ughhh..can you feel the utter contempt??

But these hackers, being as forward-thinking as they are daring, decided to not just be satisfied with draining bank accounts to satisfy their greed, no, they had to step it up a notch and enter the realm of DATA RANSOM using you guessed it, RANSOMWARE. Although there has been many reported cases, the latest trend seems to be to strike Police Departments. Read about the latest incident HERE.

When you look at this crime from a broad perspective, you really do see the genius in it. I mean, think about just your average suzy homemaker..she probably has at a minimum, 75 to 100% of her household financial information, not to mention a large portion of her families private information, stored on the HDD of her home computer. Now expand that same principle to critical infrastructure like a city or state police department, or maybe a State Health Department, and you get the picture (and the possibility for mayhem) these kind of people create.

It is interesting to note that in cyber-warfare, just like in standard warfare, for every move, their is a counter-move, and with that counter-move, a chance to again, for an enterprising individual to make BIG money (legally this time). Companies have now sprung up that offer to store your critical data OFF-SITE on a Secure cloud based server for a nominal fee. Companies like  Carbonite and Iron Mountain have made solid reputations for themselves in this field.

So where does this leave the CO? Well first and foremost, back up ALL your critical data! and if you have anything you don’t want stolen, store it Off-site! And, like anything else in the digital age, Knowledge is Power. Learn everything you can about Malware and Ransomware. Understand the depth of this kind of threat, not only to local and state agencies, but also Government agencies, where critical national security information could be stolen and held for ransom. It should also be noted that this type of cyber-crime is an INTEGRAL branch of Fourth Generation Warfare for both State actors and Non-State Actors (terrorist groups like ISIS) to finance their operations. Read what the folks at MalwareBytes had to say about Cryptolocker Ransomware HERE. Sophos also published a very informative piece HERE.

Stay Alert, Stay Informed, Stay Armed and Stay Dangerous!

 

Using a LiveCD (or LiveUSB) Operating System

 

By: HCS Technical Staff

(Author’s Note to the Reader: If there is any jargon that you do not know, please type the word into Wikipedia.)


What if you could try a new operating system on your computer without having to wait an hour or two for the operating system to install and not erase everything on your hard drive?

Thanks to advances made over the past ten years by open source software enthusiasts you can do such a thing.

For those who may feel a little lost here, think of open source software enthusiasts as the computer world’s equivalent of American gun tinkerers and geniuses like John Moses Browning.

There are reasons that you would want to use a LiveCD or LiveUSB operating system can basically boil down to:

  1. Using an unknown computer for work purposes (hotel business center, etc.) safely.
  2. Needing a place to quarantine a work file download (Word Document, Adobe PDF, etc.) to ensure that it is not carrying any malware (virus, trojan, worm, etc.)
  3. Examining files on a hard drive or backing up files from a disabled instance of Windows or other hard drive installed operating system.

In terms of selecting a Live Operating system to use on your computer there are hundreds of “distros” or variations out there made by enthusiasts and organizations with different goals and skill levels. 

Live Operating systems run completely in RAM and do not operate from the hard drive like Windows or MacOS X does.

Getting Started

CD-R Method

  1. The first thing you need to do is download an ISO Image file. ISO Image files (.iso) are needed to burn a DVD or data CD-ROM from a computer.
  2. To burn an ISO file to CD-ROM, go here http://windows.microsoft.com/en-US/windows7/Burn-a-CD-or-DVD-from-an-ISO-file
  3. After you have burned the ISO image file to a blank CD-R, shut down your computer and power it back on.
  4. As your computer turns on, access the boot menu in the BIOS (the screen with the black background and white text) by pressing the appropriate button (usually ESC, F2, F8, or F9).
  5. You will need to look up the make and model of your computer to find out how to access the boot menu.
  6. When you are in the boot menu, select the CD-ROM and press ENTER. The LiveCD operating system will start.

USB Stick Method

  1. Download UNetbootin
  2. Download your ISO image file
  3. Insert your blank and formatted USB stick
    • Be sure to note the drive letter
  4. Open UNetbootin
    • Select your ISO image file
    • Select your USB Drive’s Letter
  5. Click OK
  6. After you have burned the ISO image file to a USB stick, shut down your computer and power it back on.
  7. As your computer turns on, access the boot menu in the BIOS (the screen with the black background and white text) by pressing the appropriate button (usually ESC, F2, F8, or F9).
  8. You will need to look up the make and model of your computer to find out how to access the boot menu.
  9. When you are in the boot menu, select the USB stick and press ENTER. The LiveUSB operating system will start.

Things to Remember

  1. Use a USB stick or portable hard drive to save any documents you make on your LiveCD OS.
    • If the power goes out and you didn’t save your files to a USB stick or portable hard drive, then you are SOL.
  2. Not all LiveCD Operating systems will work with all hardware. Some laptop wireless cards will not work with your LiveCD OS and hardware older than 10 years or so may not run the LiveCD OS very well.

Major LiveCD Operating Systems

  • Ubuntu Linux at http://www.ubuntu.com
    • Pros
      • Compatible with most wireless cards and laptop hardware
      • Full software suite available (Office programs, Mozilla Firefox Web Browser, etc)
    • Cons
      • Large in size (Fills up about 670 MB out of 700MB available on a CD-R)
      • Needs at least 1 GB of RAM to run smoothly.
  • DOD Lightweight Portable Security at http://www.spi.dod.mil/lipose.htm
    • Pros
      • Small in size (about 130 MB)
      • Runs Very Fast
      • Full software suite (Office programs, Mozilla Firefox Web Browser, etc) available on 330MB .iso file version.
      • Compatible with Smart Card Readers for those who have to use them.
    • Cons
      • May not be compatible with all wireless hardware on all laptops
      • DoD built it so the paranoid may not want to use it
      • No apps to install
      • No TOR!
  • Puppy Linux at http://www.puppylinux.org
    • Pros
      • Small in size (about 130 MB)
        • This makes it great for restoring old computers
      • Runs very fast.
      • Large Support Community with lots of applications to install
      • Full Web Browser included (Just like Internet Explorer…)
    • Cons
      • Lots of variants with odd names may be confusing to the novice. (Puppy, Racy, Murga, etc…)
  • Temporary Amnesiac Incognito Live System at https://tails.boum.org
    • Pros
      • All communications are routed through TOR
        • Please read the literature out there about TOR
      • Fast to boot up
      • Includes Encryption tools
    • Cons
      • Security and Convenience are inversely related…

If anyone has any questions feel free to leave them in the comments and I can answer them to the best of my knowledge.

References