wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/03\/28\/children-data-fortra-ransomware\/<\/a><\/br> The fallout from Fortra\u2019s mass ransomware attack<\/a> continues to widen as the hackers claim a new victim: a children\u2019s virtual mental health care startup.<\/p>\n In a data breach disclosure<\/a> filed with the Maine attorney general\u2019s office, U.S. healthcare giant Blue Shield of California confirmed that one of its providers, Brightline, had data stolen from data stored in its GoAnywhere file transfer tool.<\/p>\n Brightline, which provides virtual coaching and therapy to children, was identified by TechCrunch last week as a likely victim<\/a> of the mass breach.<\/p>\n The breach notification confirmed that hackers \u2014 presumably the Russia-linked Clop ransomware gang<\/a> that claimed to have breached over a hundred organizations by using an undisclosed security flaw \u2014 accessed and potentially exfiltrated the personal data of more than 63,000 patients.<\/p>\n Clop\u2019s dark web leak site, which the gang uses to publish the stolen files unless a ransom is paid, says that the gang will leak the data stolen from Brightline \u201csoon.\u201d<\/p>\n Brightline has yet to publicly acknowledge the breach, either on its website or social media channels. Brightline spokesperson John O\u2019Conner declined to answer TechCrunch\u2019s questions, but did not dispute that the breach affects 63,000 individuals. It\u2019s unclear how many of Brightline\u2019s child users are affected.<\/p>\n In its breach notification, Blue Shield said that the breach affected includes patient names, addresses, dates of birth, gender, Blue Shield subscriber ID numbers, phone numbers, e-mail addresses, plan names and plan group numbers.<\/p>\n Brightline is said to be\u00a0one of 130 organizations<\/a> hit by the Clop group, but not the only healthcare company. US Wellness<\/a>, which offers corporate health and wellness programs, also confirmed that hackers had accessed the personal data of its users, including names, addresses, dates of birth and member ID numbers.<\/p>\n The impact of the Fortra vulnerability on healthcare organizations is so widespread that it prompted the U.S. government\u2019s\u00a0health sector cybersecurity coordination center \u2014 or HC3 \u2014\u00a0 to issue a warning<\/a> in February to help safeguard against Clop\u2019s attacks.<\/p>\n Outside of healthcare organizations, the group\u2019s ever-growing list of known victims includes the City of Toronto, Canadian financing giant Investissement Qu\u00e9bec and Virgin Red.<\/p>\n Jodie Burton, a spokesperson for Virgin Red, told TechCrunch that it learned that attackers had \u201cillegally\u00a0obtained some Virgin Red files via\u00a0a cyber-attack on our supplier,\u00a0GoAnywhere\u201d after being contacted by Clop. TechCrunch has heard from other victims that they, too, only learned that data had been stolen after receiving a ransom demand \u2014 despite Fortra having assured them that their data was safe<\/a>.<\/span><\/p>\n Fortra spokespeople Mike Devine and Rachel Woodford have repeatedly declined to answer TechCrunch\u2019s questions.<\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nChildren\u2019s data feared stolen in Fortra ransomware attack<\/br>
\n2023-03-28 21:47:17<\/br><\/p>\n