Extortionists are now threatening to harm hospital patients if the medical facilities don't pay the thieves' ransom demands. They do this by reporting bomb threats or other fictitious reports to the police, causing heavily armed police to come up at victims' houses.
Criminals vowed to turn on the patients directly after breaking into the IT system of Seattle's Fred Hutchinson Cancer Center in November and taking medical documents, including Social Security numbers, diagnoses, and lab results.
The idea seems to be that the US hospital will be under pressure to pay up and stop the extortion because of those patients and the media coverage of any swatting. Similar tactics are used by other groups targeting IT service providers: in addition to extorting the suppliers, they often threaten or harass the customers of those companies.
"Fred Hutchinson Cancer Center was aware of cyber criminals issuing swatting threats and immediately notified the FBI and Seattle police, who notified the local police," a representative said. "The FBI, as part of its investigation into the cybersecurity incident, also investigated these threats."
The cancer center refuses to respond to further questions regarding the threats. The center has more than ten clinics in the Puget Sound region of Washington.
Patients were informed last month about a similar "cyber event" by Integris Health, another Oklahoman health network that runs a network of 43 clinics and 15 hospitals. During this incident, hackers may have gained access to personal information. Some of these individuals later complained that they received emails from unscrupulous people threatening to sell their personal information on the dark web.
"As we work with third-party specialists to investigate this matter and determine the scope of affected data and to whom that data relates, we are providing the latest information for patients and the public here," the spokesman for Integris said.
Some corporate types may not find these types of boilerplate responses to be as comforting as they seem. Concerning concerns are raised about how far thieves may go to obtain stolen goods in light of this most recent swatting threat.
According to Emsisoft threat analyst Brett Callow, "ransoms have been allowed to reach lottery jackpot levels, and the predictable upshot is that people are willing to use more and more extreme measures to collect a payout," The Register said.
The security shop demanded earlier this week that ransom payments be outlawed entirely, pointing out that extortion methods were evolving and now included swatting threats.
Orrick, Herrington & Sutcliffe, the San Francisco-based company revealed last week that that during an attack in March 2023, threat actors stole personal information and critical health data of more than 637,000 data breach victims.
Orrick said that the hackers had taken massive amounts of data from its systems related to security incidents at other organizations, for which he provided legal assistance, in a series of letters notifying those impacted of the data breach.
Orrick informs that the data involved in the breach involved its customers’ data, including those with dental policies with Delta Dental, a major healthcare insurance network that covers millions of Americans' dental needs, and those with vision plans with insurance company EyeMed Vision Care.
The company further added that it had contacted with the U.S. Small Business Administration, the behavioral health giant Beacon Health Options (now Carelon), and the health insurance provider MultiPlan that their data was also exposed in Orrick's data breach.
Apparently, the stolen data includes victims’ names, dates of birth, postal address and email addresses, and government-issued identification numbers, such as Social Security numbers, passport and driver license numbers, and tax identification numbers. Also, information about patient’s medical treatment and diagnosis details, insurance claim like date and service-charges, and healthcare insurance numbers and provider details have been compromised.
Orrick further says that credit or debit card details as well as online account credentials were also involved in the breach.
Since the initial announcement of the breach, the number of affected individuals have been on the rise. In its recent breach notice, Orrick states that it “does not anticipate providing notifications on behalf of additional businesses,” however the company did not specify how it came to this conclusion.
Orrick said in December to a federal court in San Francisco that it reached a preliminary settlement to end four class action lawsuits that claimed Orrick failed to disclose the breach from victims for months after it had occurred.
“We are pleased to reach a settlement well within a year of the incident, which brings this matter to a close, and will continue our ongoing focus on protecting our systems and the information of our clients and our firm,” added Orrick’s spokesperson.
A recent report highlights the illicit activities of cybercriminals exploiting the "Gold" verification badge on X (formerly Twitter). Following Elon Musk's acquisition of X in 2022, a paid verification system was introduced, allowing regular users to purchase blue ticks. Additionally, organizations could obtain the coveted gold check mark through a monthly subscription.
The decision came from the department of telecommunications (DoT), which also contacted internet service providers to block access to both the apps’ websites.
Singapore-based Airalo and Spain-based Holafly are providers of eSIMs for a number of countries and regions. eSIMs are digital SIMs that enable users to activate a mobile plan with one’s network provider without using a physical SIM card.
In India, a company require no objection certificate (NoC) from DoT to sell foreign SIM cards.
Apparently, DoT instructed Apple and Google to remove Holafly and Airalo from their apps because they lacked the necessary authorization or NoC.
The apps are now unavailable in Google PlayStore, however were found on Apple’s AppStore as of January 5.
According to a government source, Apple was in talks to remove the apps.
The apps are still accessible for users in other regions but have been blocked for Google and Apple users in India.
Organizations that plan on selling SIM cards from other countries must obtain a NOC from the DoT. According to DoT's 2022 policy, these SIM cards provided to Indian customers are solely meant to be used abroad.
The authorized dealers will need to authenticate clients with copies of their passports, visas, and other supporting documentation before they sell or rent these SIMs.
Also, the SIM providers need to provide details of global SIMs to security agencies every month.
Rules for Selling International SIMs in India/ Users can activate mobile plans using an eSIM in place of a physical SIM card. eSIMs are offered by Holafly and Airalo in a number of nations. Companies who intend to sell international SIM cards in India are required by DoT policy 2022 to obtain a NOC and to sell SIM cards only for use outside of the nation. Authorized merchants are required to use their passport, visa, and other necessary documents to confirm the identity of their consumers. These sellers also have to give security agencies regular updates on foreign SIMs.