fbpx
Search
Close this search box.

Hackers Demand $1.75M in North Carolina Ransomware Attack

Open laptop with coding in different colors.

Hackers Used Ransomware to Attack North-Carolina Healthcare Provider

Allergy Partners, an Asheville, N.C.-based healthcare provider, fell victim to a ransomware attack that lasted 8 days. According to reports, hackers infected Allergy Partners’ computer systems with ransomware and demanded a $1.75 million payment in exchange for giving the clinic access to its own encrypted data.

Ransomware has rapidly become the number one cyber threat to organizations globally and the effects can be disruptive and devastating. Cybercriminals are using ransomware to attack organizations because they are extremely lucrative. In fact, large attacks can yield pay off’s of one million dollars or more.  Cybersecurity experts are now seeing Ransomware as a Service (RaaS) being developed, sold and leased on the dark web.   

Does Your Business have Compromised Employee Credentials on the Dark Web?

Ransomware as a service (RaaS) is a new business model for ransomware developers. Ransomware developers sell or lease their ransomware variants to affiliates who then use them to perform an attack. RaaS makes non-developers or non-computer savvy individuals capable of cyber threats to individuals or organizations. This increase and availability of ransomware through RasS has expanded the threat landscape exponentially while decreasing the risk to the ransomware developers.

What Can You Do to Ensure Your Organization Is Protected From Ransomware?

While basic measures such as firewalls or antivirus are a good first step, they do not keep you completely protected. For example, antivirus is simply good practice and should be considered the first step in your foundational security, but it is not effective for stopping advanced security threats such as ransomware.

Endpoint Detection and Response is an effective solution to detecting malware because it doesn’t rely on a single approach, but instead, utilizes multiple methods for detecting malware and malicious actions within your network environment. EDR helps combat threats to your organization by recognizing:

  • Misuse of legitimate applications (Powershell, WMI, MSHTA)
  • File-based attacks (Microsoft Office, Adobe PDF, etc.)
  • Unwanted software (browser toolbars, PUPs)
  • Insider threats (malicious employee, compromised credentials, accidental release of data)
  • Suspicious user activity

Risk Assessment services can also be helpful in determining what gaps exist in your current cybersecurity posture. These assessments can also prioritize where to start with mitigating risks. Many assessments, like those we offer, will also provide companies with a roadmap to get to their desired level of cybersecurity and compliance.

If you’d like to learn more about how to protect your organization from ransomware or other cyber-attacks, we’d love to hear from you. Give us a call at (877)367-9348 or reach out to us here to schedule a consultation. We are a full-service award-winning managed security provider with a team of professionals with vast knowledge in our tools we provide and we are able to consult and design a plan based on your specific business needs.

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

IT Outsourcing Company Trends - Corsica Technologies

11 Emerging Trends in Technology and IT Outsourcing

Things change fast in the world of technology. From emerging trends in cybersecurity to EDI and data integration, it’s challenging for midmarket companies to meet the technology needs of their internal and external customers. For many organizations, outsourcing is the

Read more
EDI Issues and Challenges - Corsica Technologies

7 Pitfalls To Avoid On Your EDI Journey

Electronic Data Interchange (EDI) is an essential technology for exchanging transactional data between business partners, also known as Trading Partners in the EDI community. From orders, invoices, and advance shipment notifications to benefit enrollments, claims processing, and payment authorizations, numerous

Read more
Cybersecurity Trends 2024 - Corsica Technologies

10 Cybersecurity Trends Emerging In 2024

When it comes to cybersecurity, things are never static. So far, 2024 is consistent with this theme. We’re seeing a mix of familiar trends intensifying alongside startling new developments. From the cybersecurity skills crunch to AI-powered attacks, 2024 is shaping

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.