Posted on 08/04/2023 10:17:00 AM PDT by Alas Babylon!
Cybercriminals attacked the computer systems of a California-based health care provider causing emergency rooms in multiple states to close and ambulance services to be redirected. The data breach happened at Prospect Medical Holdings of Los Angeles, which has hospitals and clinics in Connecticut, Pennsylvania, Rhode Island and Texas. Prospect Medical is working on resolving the issue, the company said in a statement Friday. "Upon learning of this, we took our systems offline to protect them and launched an investigation with the help of third-party cybersecurity specialists," the company told the Associated Press. "While our investigation continues, we are focused on addressing the pressing needs of our patients as we work diligently to return to normal operations as quickly as possible."
(Excerpt) Read more at msn.com ...
Chinese assets poking around the edges???
All cyberattacks like this should be answered by nukes.
Answer:
I couldn't find any technical details about the attack. However, the cybercriminals attacked the computer systems of Prospect Medical Holdings of Los Angeles, which has hospitals and clinics in Connecticut, Pennsylvania, Rhode Island and Texas. The company is working on resolving the issue and has taken its systems offline to protect them.
The fact that a cyber attack is happening is interesting, but I'm on the lookout for how they got in, to further work with people to close any open/unsafe mechanisms.
So far, we don't know a thing except their systems have been taken offline.
Technically, that right there is a successful "denial of service" overall, if not a technical denial of service.
By the way, I am a retired Computer Scientist and Trainer who is now doing advanced computer help articles for free as a way to have fun.
Thank You for the information. Please keep us updated.
What a mess! It’s scary how vulnerable we are in so many sectors of society these days.
Sounds like deep state warning their own as to what they are planning.
Yes, but so many are because they're not applying good security.
This is certainly bad for a company that is doing it's bisuness on the Internet.
The problem is that for the best customer service and fewest technical support calls, it's good to be almost wide open to the least common denominator of the stupidest end user.
On the other hand, tightening security, just a bit, makes you far less vulnerable, but much more likely that those same careless/stupid users/workers then have problems getting in to do legitimate stuff.
It's like half the people here complain about Microsoft updates, but there are so many day-to-day refinements on security and vulnerability on any software, which includes operating systems, that it needs to be almost constantly patched.
Not wanting to do updates because you're busy or you fear some driver won't work on the other side of the update will cause your system to fail.
Yet your system could very well fail when successfully attacked because you didn't have the patch.
Make a bootable restore disk or usb stick, learn how to roll back updates and above all back up critical data always!
I hope they find out who did it, and let them rot in prison
for a half century or so.
Not good enough.
Feed them to a wood chipper, feet first, slowly.
In public.
With a live stream over the internet.
5G warfare maybe.
I consider it a serious crime, and these types of attacks
should be dealt with quickly and harshly.
I wouldn’t support your idea, because opening up cans of
worms generally wind up with blow-back on our own folks
at some point.
Let’s not open up that kind of thing as a punishment,
when we have idiots trying to punish Conservatives for
January 6th.
I hear you, but for me, I’m no longer interested in who did it, since we all know the major and minor players, but rather how they did it.
If that sounds like closing the door after the horse gets out, maybe, but so many never hear this part, and just become the bad guys’, no matter who they are, next victim.
We all know polar bears will kill and eat humans, now imagine how dumb humans would be to go out and play on the ice without a weapon and a lookout, and a clear intel report on local bears and their habits...
I care who did it. I don’t know the major players behind
this instance.
I do want to know how, to try and prevent the next breach.
The barn door issue seems a poor argument to me, but I wasn’t
thinking you were claiming it as much as point out that it
was an after event...
Hmm. And Moochelle Obama got paid to do that. She must be pissed.
It really is.
Well, okay, my suggested punishment was clearly hyperbole, since death by wood chipper doesn't pass the "cruel and unusual" prohibition of the Bill of Rights.
But I do think that publicly streamed capital punishment has potential deterrent value, if we use one that passes the prohibition. Any of the currently acceptable execution methods is fine. I especially would like to see firing squad or hanging. Electric chair is okay; lethal injection is too calm and anti-climatic.
But seriously, as one who has designed, built, used, and supported computer systems for 50 years, I am convinced that, just like pedophiles, cyber-criminals are rarely if ever "curable", and so a finite prison sentence does nothing but make them determined to get back into crime upon release.
Cyber-crime undercuts the very fabric of our communications, wrecks businesses and finances, destroys livelihoods, and literally kills people (when it hits hospitals and such).
Cyber-crime deserves the death penalty, no less than mass first-degree murder does. There is no real difference.
> ...cyber-criminals are rarely if ever "curable"...
I'm not referring to random trouble-making kids and lightweight hackers, etc. By and large they can be "scared straight" and will stay out of serious trouble thereafter. I'm not talking about simple or unintentional mistakes.
I'm referring to professional cyber-criminals who know exactly what they are doing, and have depraved indifference to the fact that their actions are likely to cause the death of many innocent people. That's why it's like murder-1.
The other articles I’ve read didn’t specify what the problem is. This article says it’s a ransomware attack.
They should have protocols in place to resume operations after a ransomware attack. They might lose a little more recent data, but they should be able to get up and running.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.