home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   INTERNET      The global pornography network      2,155 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,551 of 2,155   
   August Abolins to Mike Powell   
   hackers targeting hospita   
   07 May 20 21:04:00   
   
   MSGID: 2:221/1.58@fidonet e4329dc1   
   REPLY: 100.fidoinet@1:2320/105 2319aec7   
   PID: OpenXP/5.0.43 (Win32)   
   CHRS: ASCII 1   
   TZUTC: -0400   
   Hello Mike!   
      
   ** On Thursday 07.05.20 - 16:58, Mike Powell wrote to AUGUST ABOLINS:   
      
    >> Eg. People at work don't need to access Facebook or expose company   
    >> computers to malicious site   
      
    MP> Well... where I work, we have people whose job it is to locate persons.   
    MP> One of the sources they use is Facebook.  For whatever reason, a lot of   
    MP> less than intelligent crooks will try to send us false contact data but   
    MP> then post all about themselves on social media.  :)   
      
   OK..  I see the relevance for collection agencies especially when needing     
   to locate persons.  But even then, it would be wise to isolate work     
   terminals for internet searches from the internal network used for     
   accessing company accounts.   
      
   But I was thinking of places like hospitals and medical centers. In     
   October last year a large medical center with offices all over the     
   province/country was struck with a security breach.  Then, a month later     
   it was announced that is was ransomware.  This was clearly activated by     
   clicking on a false link.   
      
   https://www.cpomagazine.com/cyber-security/lifelabs-data-breach-the-    
   largest-ever-in-canada-may-cost-the-company-over-1-billion-in-class-    
   action-lawsuit/   
      
   "15 million Canadians affected is over 40% of all Canadians".   
      
   "In the public statement, LifeLabs indicated that they made some sort of a     
   payment to retrieve the stolen data. The company did not elaborate on the     
   nature of the attack."   
      
   Ha.  The nature was ransomeware, and some old ninny probably clicked on     
   fake link in their personal email or on a non-company related website.   
      
      
   Then, there were a few other ones earlier than that:   
      
   https://www.cbc.ca/news/technology/ransomware-ryuk-ontario-hospitals-    
   1.5308180   
      
   https://www.cbc.ca/news/canada/kitchener-waterloo/rural-hospitals-in-    
   southwest-ontario-hit-by-ransomware-attack-1.5301947   
      
   "The main vector for attacks is people, through phishing or the more     
   targeted spearphishing attacks," in which hackers gather information using     
   deceptive emails or websites, he explains. "Ninety percent of breaches     
   start with a person."   
      
   The solution seems simple enough.  Disallow access to unapproved     
   destinations, especially from the computers that are networked to patient     
   records!   
      
      
     ../|ug   
      
   --- OpenXP 5.0.43   
    * Origin:  (2:221/1.58)   
   SEEN-BY: 1/123 90/1 120/340 601 226/30 227/114 702 229/101 426 452   
   SEEN-BY: 229/664 1014 240/5832 249/206 317 400 292/854 317/3 322/757   
   SEEN-BY: 342/200   
   PATH: 221/1 280/464 229/101 426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca