{"id":5671,"date":"2020-11-03T10:11:13","date_gmt":"2020-11-03T18:11:13","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5671"},"modified":"2024-04-26T13:21:09","modified_gmt":"2024-04-26T20:21:09","slug":"ransomware-attacks-target-healthcare-sector","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/","title":{"rendered":"Ransomware Attacks Target Healthcare Sector"},"content":{"rendered":"<p>Author: Jeremy Ware and Darby Wise<\/p>\n<p>TLP:WHITE<\/p>\n<h1><\/h1>\n<h3>1.\u00a0 Executive Summary<\/h3>\n<p>On 28 October, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) published a joint advisory on threat actors targeting the Healthcare and Public Health (HPH) sector.<sup>1<\/sup> This report details the threat actors\u2019 use of Trickbot and BazarLoader malware to distribute ransomware, steal sensitive data, and attempt to interfere with healthcare services.<\/p>\n<p>BazarLoader and Trickbot are two malware loaders that threat actors tend to distribute via phishing campaigns. In these attacks targeting U.S. hospitals and healthcare providers, threat actors used these loaders to distribute follow-on malware including Ryuk and Conti ransomware.<\/p>\n<p>The report also details a new malware tool from the Trickbot developers called anchor_dns. This tool is a part of Anchor, a Trickbot module first observed in 2019, when it was used against large corporations and other high-profile organizations. Threat actors use anchor_dns to send and receive sensitive data from the victim\u2019s machine via Domain Name System (DNS) tunneling.<\/p>\n<p>The joint report included a list of indicators of compromise (IOCs) associated with Trickbot, anchor_dns and BazarLoader, many of which Infoblox has incorporated into its security products since April of this year. We included the full list of indicators at the end of this report, along with additional IOCs we were able to find in our own research.<\/p>\n<h3>2.\u00a0 Analysis<\/h3>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.1.\u00a0 Trickbot and Anchor_dns<\/h4>\n<p>Trickbot is a banking trojan that was first discovered in 2016. Threat actors primarily distribute it through malspam campaigns, or as a secondary payload to other malware such as Emotet. Since its initial discovery, Trickbot has evolved to include a full suite of tools to harvest credentials, deploy cryptominers or ransomware, and exfiltrate a multitude of data types. For a detailed analysis of Trickbot\u2019s attack chain, see the joint advisory or one of Infoblox\u2019s previous reports on this malware.<sup>2,3<\/sup><\/p>\n<p>Anchor_dns is a backdoor tool created by the Trickbot developers as part of the toolset module named Anchor.<sup>4<\/sup> With anchor_dns, threat actors communicate between the victim&#8217;s machine and the command and control (C&amp;C) servers via DNS tunneling to mimic legitimate traffic and thereby evade detection. Anchor_dns is also known to use an \u2018exclusive or\u2019 (XOR) cipher for encryption with the key <em>0xB9.<\/em><\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.2.\u00a0 BazarLoader and BazarBackdoor<\/h4>\n<p>BazarLoader and BazarBackdoor are believed to have been created by the threat actors behind Trickbot and were first observed in early 2020. They work together to infect the victim\u2019s machine, communicate with the C&amp;Cs, and according to the alert have become increasingly popular means of deploying ransomware. In the attack against the HPH sector, they downloaded Ryuk and Conti ransomware.<\/p>\n<p>Threat actors have distributed BazarLoader two ways: first, via phishing emails that carry malicious attachments; second, via links directing users to malicious DOC or PDF file on a legitimate document hosting site such as Google Drive.<sup>5<\/sup> Once the user downloads the file, BazarLoader drops the payload for BazarBackdoor, which the threat actor then uses to exploit the host machine and network.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.3.\u00a0 Ryuk Ransomware<\/h4>\n<p>Threat actors often distribute Ryuk ransomware as a follow-on payload from banking trojans such as Trickbot or Emotet. Ryuk is a derivative of Hermes,<sup>6<\/sup> a ransomware variant that injects malicious dynamic-link library (DLL) files into the memory of the victim\u2019s machine, and then spreads laterally across a victim\u2019s network. Once the Ryuk payload is dropped, it uses Advanced Encryption Standard (AES)-256 keys to encrypt the victim\u2019s files. The ransomware then drops a <em>RyukReadMe<\/em> file on the victim\u2019s machine instructing them to contact a provided Protonmail-encrypted email address for further instructions on the ransom amount and specific Bitcoin wallet to which the victim must submit their payment. Infoblox has previously written on Ryuk, providing an in-depth analysis on its distribution, attack chain, etc. For a more detailed attack chain, refer to the joint advisory or our previous report on Ryuk.<sup>7<\/sup><\/p>\n<h3>3.\u00a0 Prevention and Mitigation<\/h3>\n<p>CISA, FBI and HHS provide a set of recommendations to prevent or mitigate the effects of these kinds of cyberattacks. We include some below but a more extensive list, including preventative measures against specific ransomware, can be found in the joint report.<\/p>\n<p>Network best practices:<\/p>\n<ul>\n<li>Patch operating systems, software, and firmware as soon as manufacturers release updates.<\/li>\n<li>Regularly validate secure configurations and ensure local administration is enabled for all operating systems of organization-owned assets.<\/li>\n<li>Regularly change passwords to network systems and accounts and avoid reusing passwords for different accounts.<\/li>\n<li>Use multi-factor authentication where possible.<\/li>\n<li>Disable unused remote access\/Remote Desktop Protocol (RDP) ports and monitor remote access\/RDP logs.<\/li>\n<li>Implement application and remote access allow listing to only allow systems to execute programs known and permitted by the established security policy.<\/li>\n<li>Audit user accounts with administrative privileges and configure access controls with least privilege in mind.<\/li>\n<li>Audit logs to ensure new accounts are legitimate.<\/li>\n<li>Scan for open or listening ports and mediate those that are not needed.<\/li>\n<li>Identify critical assets; create backups of these systems and house the backups offline from the network.<\/li>\n<li>Implement network segmentation. Sensitive data should not reside on the same server and network segment as the email environment.<\/li>\n<li>Set antivirus and anti-malware solutions to automatically update; conduct regular scans.<\/li>\n<\/ul>\n<p>Ransomware mitigation best practices:<\/p>\n<ul>\n<li>Regularly back up data, air gap, and password protect backup copies offline.<\/li>\n<li>Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, secure location.<\/li>\n<\/ul>\n<h3>4.\u00a0 Indicators of Compromise<\/h3>\n<table width=\"668\">\n<tbody>\n<tr>\n<td width=\"516\">\n<p style=\"text-align: center;\"><strong>Indicator<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"152\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"516\">kostunivo[.]com<\/p>\n<p>chishir[.]com<\/p>\n<p>mangoclone[.]com<\/p>\n<p>onixcellent[.]com<\/p>\n<p>biillpi[.]com<\/td>\n<td width=\"152\">\n<p style=\"text-align: center;\">Trickbot domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"516\">\n<p style=\"text-align: center;\">23[.]95[.]97[.]59<\/p>\n<p style=\"text-align: center;\">51[.]254[.]25[.]115<\/p>\n<p style=\"text-align: center;\">193[.]183[.]98[.]66<\/p>\n<p style=\"text-align: center;\">91[.]217[.]137[.]37<\/p>\n<p style=\"text-align: center;\">87[.]98[.]175[.]85<\/p>\n<p style=\"text-align: center;\">64[.]44[.]133[.]134<\/p>\n<p style=\"text-align: center;\">66[.]70[.]218[.]54<\/p>\n<p style=\"text-align: center;\">209[.]99[.]40[.]222<\/p>\n<p style=\"text-align: center;\">209[.]99[.]40[.]223<\/p>\n<p style=\"text-align: center;\">185[.]158[.]248[.]251<\/p>\n<p style=\"text-align: center;\">96[.]9[.]73[.]73<\/p>\n<p style=\"text-align: center;\">96[.]9[.]77[.]142<\/p>\n<p style=\"text-align: center;\">45[.]89[.]127[.]92<\/p>\n<p style=\"text-align: center;\">36[.]89[.]106[.]69<\/p>\n<p style=\"text-align: center;\">103[.]76[.]169[.]213<\/p>\n<p style=\"text-align: center;\">36[.]91[.]87[.]227<\/p>\n<p style=\"text-align: center;\">5[.]2[.]78[.]118<\/p>\n<p style=\"text-align: center;\">185[.]90[.]61[.]69<\/p>\n<p style=\"text-align: center;\">185[.]90[.]61[.]62<\/p>\n<p style=\"text-align: center;\">86[.]104[.]194[.]30<\/p>\n<p style=\"text-align: center;\">31[.]131[.]21[.]184<\/p>\n<p style=\"text-align: center;\">195[.]123[.]242[.]119<\/p>\n<p style=\"text-align: center;\">51[.]81[.]113[.]25<\/p>\n<\/td>\n<td width=\"152\">\n<p style=\"text-align: center;\">Trickbot C&amp;C servers<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"516\">\n<p style=\"text-align: center;\">272602c23c69ff189ba778eff6a03cfa3a76e01423103abcdf54afe5d1c52b6d<\/p>\n<p style=\"text-align: center;\">a4483e475c6aaf235b747e99d720709ab110f68fc100802096a3566dc0da907b<\/p>\n<p style=\"text-align: center;\">0d644d9e462fa82835ada36eaafa23521272fb8e08616fef33a9d3b8c74f735b<\/p>\n<p style=\"text-align: center;\">D11866e458626e81d4aa4bd9fdb441bec5a684ccaf7b786acddb95377d66b72f<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"152\">Trickbot SHA256<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"516\">Sersd[.]xyz<\/p>\n<p>Hunopk[.]xyz<\/p>\n<p>Xyved[.]xyz<\/p>\n<p>mugtre[.]xyz<\/td>\n<td width=\"152\">\n<p style=\"text-align: center;\">BazarLoader domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"516\">62[.]108[.]35[.]103<\/p>\n<p>86[.]104[.]194[.]108<\/td>\n<td width=\"152\">\n<p style=\"text-align: center;\">BazarLoader C&amp;Cs<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"516\">\n<p style=\"text-align: center;\">31bfe5b4514382dc550445bbdde3c281256b878c83409edcc1540dd790d25ea1<\/p>\n<p style=\"text-align: center;\">3e3008cf6a8335dbda7d120bf79c7f4f7393b98351e70b26b5d385880a1017ff<\/p>\n<p style=\"text-align: center;\">B6ec3a1f620913caf7b47450d2c74fb2f483eab50804a0e34b6c09827d21e728<\/p>\n<p style=\"text-align: center;\">bf1b48ea7cd8812f6d2e8f7cd620dd79f3ffc383ac9d907086df8a1e414ea96c<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"152\">BazarLoader SHA256<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"516\">6bf0900bbe9e98d2ba63f50aff91e5d8fa1165ac6a4c75a76c9a0c436a2bf305<\/p>\n<p>2aa995b0a818fa730f176f261b23dab7a32d49de598ad7dbb35f913a1fa4bd48<\/p>\n<p>d584e868f867c6251e115b7909559da784f25b778192c6a24e49685f80257e4d<\/p>\n<p>137ecfef47e767c9bf6db5d958800201c058e4d69321fb736a880508f9697ac5<\/p>\n<p>3c4b9645d821827d367ec4e605a708186fb29e7780db97a693220146701730e5<\/p>\n<p>18d347001057c68c4f2ad1d2f5af73e2dfa69aa46466fa43b40d7da360b79c01<\/p>\n<p>9469f92e61d75e88ccc854ac6febd2df4a2a5ee7ec4ecea152b82e05df905325<\/p>\n<p>D5440b90f2392f378b84be359201cb2870681d9483ec692bd16a8b00ec22122b<\/p>\n<p>9f2a5f2ca86b24191370315c30a78f8adda1a04e3acac4edb3ac8f1cdc58c20c<\/td>\n<td width=\"152\">\n<p style=\"text-align: center;\">Anchor_DNS SHA256<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Endnotes<\/h4>\n<ol>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf\">https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--77\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;77<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--66\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;66<\/a><\/li>\n<li><a href=\"https:\/\/cyware.com\/news\/trickbot-anchor-malware-infects-both-linux-and-windows-systems-cfbe68d7\">https:\/\/cyware.com\/news\/trickbot-anchor-malware-infects-both-linux-and-windows-systems-cfbe68d7<\/a><\/li>\n<li><a href=\"https:\/\/isc.sans.edu\/forums\/diary\/BazarLoader+phishing+lures+plan+a+Halloween+party+get+a+bonus+and+be+fired+in+the+same+afternoon\/26710\/?_hsmi=98108296&amp;_hsenc=p2ANqtz--ljGhOfCvkpHP8QWsJI_dK73jhzUQ9j6RbjdLkFIt6nKwC8do9_OP1H0Q48uebHH3uwRmjJrDysxbqidQpjcy1LlVdm4yqXjEO27OANzPnnM6BoEE\">https:\/\/isc.sans.edu\/forums\/diary\/BazarLoader+phishing+lures+plan+a+Halloween+party+get+a+bonus+and+be+fired+in+the+same+afternoon\/26710\/?_hsmi=98108296&amp;_hsenc=p2ANqtz&#8211;ljGhOfCvkpHP8QWsJI_dK73jhzUQ9j6RbjdLkFIt6nKwC8do9_OP1H0Q48uebHH3uwRmjJrDysxbqidQpjcy1LlVdm4yqXjEO27OANzPnnM6BoEE<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--5\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;5<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--3\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;3<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Jeremy Ware and Darby Wise TLP:WHITE 1.\u00a0 Executive Summary On 28 October, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) published a joint advisory on threat actors targeting the Healthcare and Public Health (HPH) sector.1 This report details the threat [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":4365,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[189,346,288],"class_list":{"0":"post-5671","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-cybersecurity","9":"tag-healthcare","10":"tag-ransomware","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware Attacks Target Healthcare Sector<\/title>\n<meta name=\"description\" content=\"On 28 October, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Health and Human Services (HHS) published a joint advisory on threat actors targeting the Healthcare and Public Health (HPH) sector.1 This report details the threat actors\u2019 use of Trickbot and BazarLoader malware to distribute ransomware, steal sensitive data and attempt to interfere with healthcare services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Attacks Target Healthcare Sector\" \/>\n<meta property=\"og:description\" content=\"On 28 October, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Health and Human Services (HHS) published a joint advisory on threat actors targeting the Healthcare and Public Health (HPH) sector.1 This report details the threat actors\u2019 use of Trickbot and BazarLoader malware to distribute ransomware, steal sensitive data and attempt to interfere with healthcare services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-03T18:11:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:21:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-494280935-1024x969.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"969\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Ransomware Attacks Target Healthcare Sector\",\"datePublished\":\"2020-11-03T18:11:13+00:00\",\"dateModified\":\"2024-04-26T20:21:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/\"},\"wordCount\":1321,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-494280935.jpg\",\"keywords\":[\"Cybersecurity\",\"Healthcare\",\"Ransomware\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/\",\"name\":\"Ransomware Attacks Target Healthcare Sector\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-494280935.jpg\",\"datePublished\":\"2020-11-03T18:11:13+00:00\",\"dateModified\":\"2024-04-26T20:21:09+00:00\",\"description\":\"On 28 October, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Health and Human Services (HHS) published a joint advisory on threat actors targeting the Healthcare and Public Health (HPH) sector.1 This report details the threat actors\u2019 use of Trickbot and BazarLoader malware to distribute ransomware, steal sensitive data and attempt to interfere with healthcare services.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-494280935.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-494280935.jpg\",\"width\":4108,\"height\":3888,\"caption\":\"Group of Multiethnic People Using Digital Devices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ransomware-attacks-target-healthcare-sector\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware Attacks Target Healthcare Sector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware Attacks Target Healthcare Sector","description":"On 28 October, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Health and Human Services (HHS) published a joint advisory on threat actors targeting the Healthcare and Public Health (HPH) sector.1 This report details the threat actors\u2019 use of Trickbot and BazarLoader malware to distribute ransomware, steal sensitive data and attempt to interfere with healthcare services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Attacks Target Healthcare Sector","og_description":"On 28 October, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Health and Human Services (HHS) published a joint advisory on threat actors targeting the Healthcare and Public Health (HPH) sector.1 This report details the threat actors\u2019 use of Trickbot and BazarLoader malware to distribute ransomware, steal sensitive data and attempt to interfere with healthcare services.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/","og_site_name":"Infoblox Blog","article_published_time":"2020-11-03T18:11:13+00:00","article_modified_time":"2024-04-26T20:21:09+00:00","og_image":[{"width":1024,"height":969,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-494280935-1024x969.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Ransomware Attacks Target Healthcare Sector","datePublished":"2020-11-03T18:11:13+00:00","dateModified":"2024-04-26T20:21:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/"},"wordCount":1321,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-494280935.jpg","keywords":["Cybersecurity","Healthcare","Ransomware"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/","name":"Ransomware Attacks Target Healthcare Sector","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-494280935.jpg","datePublished":"2020-11-03T18:11:13+00:00","dateModified":"2024-04-26T20:21:09+00:00","description":"On 28 October, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Health and Human Services (HHS) published a joint advisory on threat actors targeting the Healthcare and Public Health (HPH) sector.1 This report details the threat actors\u2019 use of Trickbot and BazarLoader malware to distribute ransomware, steal sensitive data and attempt to interfere with healthcare services.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-494280935.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-494280935.jpg","width":4108,"height":3888,"caption":"Group of Multiethnic People Using Digital Devices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ransomware-attacks-target-healthcare-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Ransomware Attacks Target Healthcare Sector"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5671"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5671\/revisions"}],"predecessor-version":[{"id":5845,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5671\/revisions\/5845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4365"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}