TIP: Click on subject to list as thread! ANSI
echo: internet
to: ALL
from: AUGUST ABOLINS
date: 2020-05-06 18:52:00
subject: hackers targeting hospita

Hello!

https://krebsonsecurity.com/2020/05/europes-largest-private-hospital- 
operator-fresenius-hit-by-ransomware/

==[begin]==

06 May 20
Europe's Largest Private Hospital Operator Fresenius Hit by Ransomware

Fresenius, Europe's largest private hospital operator and a major provider
of dialysis products and services that are in such high demand thanks to
the COVID-19 pandemic, has been hit in a ransomware cyber attack on its
technology systems.

==[end===


The article doesn't report HOW the ransomeware got triggered.

But if it was by some cleverly disguised email/link originally in an  
employee's email, why can't the outbound email servers be configured to  
only allow valid domains? ..and thus sending the bogus ones to the bit  
bucket.

WRT Email: Employees at places of work like the article describes,  
shouldn't even have access to email other than to company-related  
addresses.

WRT WWW: An employee shouldn't even be able to access links that are  
designed to be phish-bait.

Can't a company's local servers simply block all www domains except the  
ones approved?

Eg. People at work don't need to access Facebook or expose company  
computers to malicious sites.

  ../|ug

--- OpenXP 5.0.43
* Origin: (2:221/1.58)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.