Carding
Professional
- Messages
- 2,870
- Reaction score
- 2,493
- Points
- 113
Data from the McAlester Clinic will be put up for a darknet auction.
McAlester Regional Medical Center in Oklahoma was targeted by a hacker group known as Karakurt. She specializes in cyber extortion. Criminals report that they stole more than 126GB of information, including vast arrays of clients ' medical records. They are going to be auctioned off to the highest bidder.
According to the group, several medical institutions will appear in the "dark fair" on August 1. A post on the website in the "Pre-Release" section says: "These are companies that refused to negotiate and will soon be put up for auction."
Karakurt claims that the "catch" includes at least 40 GB of DNA test results. Stolen genetic material can be used for blackmail and / or extortion, for example, through false paternity test results. Criminals can threaten to disclose information about predisposition to diseases and serious diagnoses that will affect employment opportunities, insurance premiums, and even social status.
Apparently, personal documents, financial and accounting reports, as well as a lot of personnel documentation were also leaked.
"Another medical center does not care about the data of its patients," the attackers said in a statement. <...> "40 GB of data on DNA tests is a bonus! Stay tuned."
McAlester Regional Hospital, located southeast of Oklahoma City, operates around the clock, offers more than 20 types of services and has a total revenue of almost $ 250 million. So far, the representatives have not made any public statements.
Another victim of Karakurt is the primary care organization Regional Family Medicine in Arkansas. In this case, according to the ransomware, more than 5 GB of employees SQL data was stolen, including social security numbers, medical reports, bank statements, invoices, and other documents.
The Karakurt group, also known as the Karakurt team or Karakurt Lair, was first designated by CISA in a newsletter issued in June 2022. Hackers often report leaks without actually encrypting infected devices or files.
The group has its own methods: annoying emails and phone calls to victims, their employees, business partners and clients. Ransom demands typically ranged from $ 25,000 to $ 13 million in bitcoin. Payment terms are set at the end of a week after the first contact with the victim.
McAlester Regional Medical Center in Oklahoma was targeted by a hacker group known as Karakurt. She specializes in cyber extortion. Criminals report that they stole more than 126GB of information, including vast arrays of clients ' medical records. They are going to be auctioned off to the highest bidder.
According to the group, several medical institutions will appear in the "dark fair" on August 1. A post on the website in the "Pre-Release" section says: "These are companies that refused to negotiate and will soon be put up for auction."
Karakurt claims that the "catch" includes at least 40 GB of DNA test results. Stolen genetic material can be used for blackmail and / or extortion, for example, through false paternity test results. Criminals can threaten to disclose information about predisposition to diseases and serious diagnoses that will affect employment opportunities, insurance premiums, and even social status.
Apparently, personal documents, financial and accounting reports, as well as a lot of personnel documentation were also leaked.
"Another medical center does not care about the data of its patients," the attackers said in a statement. <...> "40 GB of data on DNA tests is a bonus! Stay tuned."
McAlester Regional Hospital, located southeast of Oklahoma City, operates around the clock, offers more than 20 types of services and has a total revenue of almost $ 250 million. So far, the representatives have not made any public statements.
Another victim of Karakurt is the primary care organization Regional Family Medicine in Arkansas. In this case, according to the ransomware, more than 5 GB of employees SQL data was stolen, including social security numbers, medical reports, bank statements, invoices, and other documents.
The Karakurt group, also known as the Karakurt team or Karakurt Lair, was first designated by CISA in a newsletter issued in June 2022. Hackers often report leaks without actually encrypting infected devices or files.
The group has its own methods: annoying emails and phone calls to victims, their employees, business partners and clients. Ransom demands typically ranged from $ 25,000 to $ 13 million in bitcoin. Payment terms are set at the end of a week after the first contact with the victim.
