%3CLINGO-SUB%20id%3D%22lingo-sub-1353066%22%20slang%3D%22en-US%22%3ENew%20Ransomware%20Group%20Targets%20Healthcare%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1353066%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20Microsoft%20Threat%20Protection%20Intelligence%20Team%20posted%20article%20in%20their%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eblog%3C%2FA%3E%20on%20April%2028th%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F04%2F28%2Fransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CFONT%20size%3D%226%22%3E%3CSTRONG%3ERansomware%20groups%20continue%20to%20target%20healthcare%2C%20critical%20services%3B%20here%E2%80%99s%20how%20to%20reduce%20risk%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20blog%20post%20digs%20deep%20into%20a%20new%20ransomware%20technique%20that%20our%20threat%20team%20is%20seeing%20in%20the%20wild.%20I%20am%20posting%20in%20the%20Healthcare%20and%20Life%20Sciences%20blog%20to%20make%20sure%20as%20many%20people%20see%20the%20blog%20post%20as%20possible.%20Please%20read%20the%20post%20and%20follow%20the%20guidance%20at%20the%20bottom%20of%20the%20article.%20I%20am%20not%20going%20to%20repost%20what%20the%20team%20wrote%20on%20this%20blog%20because%20the%20team%20goes%20into%20great%20detail%20on%20systems%20that%20are%20affected%20and%20how%20to%20mitigate%20the%20risks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3EThis%20is%20a%20very%20skilled%20ransomware%20hacking%20group%20that%20can%20cause%20a%20lot%20of%20damage.%20Please%20follow%20good%20cybersecurity%20practices%20and%20ensure%20your%20systems%20are%20up%20to%20date%20on%20their%20patches.%20As%20always%2C%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Threat%20Protection%3C%2FA%3E%20platform%20can%20help%20with%20protection%2C%20detection%20and%20response%20to%20these%20types%20of%20threats.%20Customers%20can%20also%20take%20advantage%20of%20our%20services%20like%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2Fmicrosoft-detection-and-response-team-dart-blog-series%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Detection%20and%20Response%20Team%20(DART)%3C%2FA%3E%26nbsp%3Bto%20help%20investigate%20and%20remediate%20attacks.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1353066%22%20slang%3D%22en-US%22%3E%3CP%3ERansomware%20that%20targets%20Healthcare%20customers%20during%20COVID%20outbreak.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1353066%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Ehealthcare%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Eransomware%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1358046%22%20slang%3D%22en-US%22%3ERe%3A%20New%20Ransomware%20Group%20Targets%20Healthcare%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1358046%22%20slang%3D%22en-US%22%3E%3CP%3EIts%20always%20import%20for%20companies%20to%20invest%20in%20cyber%20security.%20Our%20company%20have%20always%20partnered%20with%20Microsoft%20to%20offer%20good%20%3CA%20title%3D%22IT%20Companies%20in%20Kenya%22%20href%3D%22https%3A%2F%2Fpechanttelec.co.ke%2Fsolutions%2Fcyber-security%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIT%20Security%20Services%20in%20Kenya%3C%2FA%3E%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

The Microsoft Threat Protection Intelligence Team posted article in their blog on April 28th

 

Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk

 

This blog post digs deep into a new ransomware technique that our threat team is seeing in the wild. I am posting in the Healthcare and Life Sciences blog to make sure as many people see the blog post as possible. Please read the post and follow the guidance at the bottom of the article. I am not going to repost what the team wrote on this blog because the team goes into great detail on systems that are affected and how to mitigate the risks.

 

This is a very skilled ransomware hacking group that can cause a lot of damage. Please follow good cybersecurity practices and ensure your systems are up to date on their patches. As always, the Microsoft Threat Protection platform can help with protection, detection and response to these types of threats. Customers can also take advantage of our services like the Microsoft Detection and Response Team (DART) to help investigate and remediate attacks.