"FUJIFILM shuts down network after suspected ransomware attack FujiFilm is investigating a ransomware attack and has shut down portions of its network to prevent the attack's spread. FujiFilm, also known as just Fuji, is a Japanese multinational conglomerate headquartered in Tokyo, Japan, which initially started in optical film and cameras. It has grown to include pharmaceuticals, storage devices, photocopiers and printers (XEROX), and digital cameras... While FUJIFILM has not stated what ransomware group is responsible for the attack, Advanced Intel CEO Vitali Kremez has told BleepingComputer that FUJIFILM was infected with the Qbot trojan last month...'A network infection attributed to QBot automatically results in risks associated with future ransomware attacks.'..." https://www.bleepingcomputer.com/ne...wn-network-after-suspected-ransomware-attack/
The Week in Ransomware - June 4th 2021 - Where's the beef? https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-4th-2021-wheres-the-beef/
"Fujifilm refuses to pay ransomware demand, restores network from backups Japanese multinational conglomerate Fujifilm said it has refused to pay a ransom demand to the cyber gang that attacked its network in Japan last week and is instead relying on backups to restore operations. The company’s computer systems in the US, Europe, the Middle East and Africa are now 'fully operational and back to business as usual'..." https://www.verdict.co.uk/fujifilm-ransom-demand/
"ADATA struck by Ragnar Locker ransomware attack Leading Taiwan-based memory and storage manufacturer ADATA was forced to take its systems offline after it was targeted by a ransomware attack in late May, the company has admitted... Bleeping Computer says that the Ragnar Locker ransomware gang has already claimed that it was behind the ADATA attack. In fact, the gang claims to have made away with 1.5TB of sensitive data from ADATA's computers... ADATA however claims that its business operations are no longer disrupted and that it is busy restoring the affected devices..." https://www.techradar.com/news/adata-struck-by-ragnar-locker-ransomware-attack
"Foodservice supplier Edward Don hit by a ransomware attack Foodservice supplier Edward Don has suffered a ransomware attack that has caused the company to shut down portions of the network to prevent the attack's spread... Edward Don and Company is one of the largest distributors of foodservice equipment and supplies, such as kitchen supplies, bar supplies, flatware, and dinnerware... ...Edward Don suffered a ransomware attack earlier this week that has disrupted their business operations, including their phone systems, network, and email... As Edward Don is one of the leading distributors of food service supplies, this attack will cause a significant disruption in the supply chain for hospitals, restaurants, hotels, and bars..." https://www.bleepingcomputer.com/ne...pplier-edward-don-hit-by-a-ransomware-attack/
Avaddon ransomware shuts down and releases decryption keys https://www.bleepingcomputer.com/ne...ware-shuts-down-and-releases-decryption-keys/
The Week in Ransomware - June 11th 2021 - Under Pressure https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-11th-2021-under-pressure/
As Ransomware Demands Boom, Insurance Companies Keep Paying Out https://www.wired.com/story/ransomware-insurance-payments/
REvil ransomware hits US nuclear weapons contractor https://www.bleepingcomputer.com/news/security/revil-ransomware-hits-us-nuclear-weapons-contractor/
That's a big one alright. Of all agencies you would think they would have prioritized isolating and securing particular networks in a tightly wound relay limited from outside contact. Highly sophisticated don't seem to apply anymore to such agencies but certainly does to those actors who have the know how and brute to expose how open certain systems are to external infiltration.
Ransomware Poll: 80% of Victims Don’t Pay Up https://threatpost.com/ransomware-victims-dont-pay-up/166989/
‘Humber River Hospital’ Shuts Down Essential Services Due to Ransomware Attack June 16, 2021 https://www.technadu.com/humber-riv...-essential-services-ransomware-attack/283978/
The Week in Ransomware - June 18th 2021 - Law enforcement strikes back June 18, 2021 https://www.bleepingcomputer.com/ne...-june-18th-2021-law-enforcement-strikes-back/
ADATA suffers 700 GB data leak in Ragnar Locker ransomware attack June 21, 2021 https://www.bleepingcomputer.com/ne...data-leak-in-ragnar-locker-ransomware-attack/
Savannah hospitals trying to recover from ransomware attack June 21, 2021 https://www.kentucky.com/news/business/article252267143.html#storylink=mainstage_card
Lucky Star Casino hit by ransomware attack, casino confirms June 21, 2021 https://cbsaustin.com/news/nation-world/lucky-star-casino-hit-by-ransomware-attack-casino-confirms
Seems that every day a new volley of ransomware landings are literally taking down systems with reckless abandon and no end in sight. What first comes to mind is, has all those places/businesses become so irresponsibly complacent to the safeguard of their systems security, or just taking their chances (Russian roulette) or are their security systems either obsolete or practically non existent to the challenges which are sweeping across every vulnerable hole available to the perpetrators.
Ransomware Attack Leads to Class-Action Lawsuits for Scripps Health Patients say system should have protected their health information from breach June 21, 2021 https://www.medpagetoday.com/special-reports/exclusives/93200
Wake up call that if service agencies, ALL OF THEM-Responsible for clients/patients important information isn't given the priority of protection deserved and treated with priority on THEIR machine systems/networks, it's only fair, right, and duty to return a compensation for that irresponsibility. Mistakes are one matter, ignoring warnings another.
Wormable DarkRadiation Ransomware Targets Linux and Docker Instances June 22, 2021 https://thehackernews.com/2021/06/wormable-darkradiation-ransomware.html Trend Micro: Bash Ransomware DarkRadiation Targets Red Hat- and Debian-based Linux Distributions
Mysterious ransomware payment traced to a sensual massage site https://www.bleepingcomputer.com/ne...are-payment-traced-to-a-sensual-massage-site/
SonicWall sees 226.3 million ransomware attack attempts in May June 22, 2021 https://www.computerweekly.com/news...263-million-ransomware-attack-attempts-in-May
Couldn't have said it better myself. One can foresee if this trend continues to escalate, that a windfall proposal for top expert system coders to derive and fashion an entirely new makeup of operational code, completely separate and independent, (immune from disruption with current code standards) is in order for their business and systems to run within a isolated confined type of network, free from the obstructions taking current systems by storm. How genuinely cost worthy that may be is anyone's guess but the present status quo of systems code is obviously terribly vulnerable.