A federal grand jury in Pittsburgh indicted six members of a Russian military intelligence agency of computer system hacking to support the Russian federal government. The indictment likewise declares the accuseds were associated with malware attacks on the Ukraines power grid and the 2018 Pyeongchang Winter Olympics participants, guests and hosts.
Six Russian military officers have actually been charged in worldwide computer hacking events, consisting of the June 2017 malware attack on Beaver, Pa.-based Heritage Valley Health System..
1. Four of the defendants, Yuriy Sergeyevich Andrienko, Sergey Vladimirovich Detistov, Pavel Valeryevich Frolov and Petr Nikolayevich Pliskin, are implicated of establishing parts of NotPetya, the malware that hindered Heritage Valleys computer system.
2. The malware interrupted the IT systems at Heritage Valleys 2 healthcare facilities, 60 workplaces and 18 satellite centers. Care service providers lost access to patient lists, client histories, physical examination types and laboratory records.
3. The health system lost access to its medical care computer system for a week and its administrative computer system systems for almost a month.
4. The malware also impacted a large U.S. pharmaceutical manufacturer and TNT Express, a FedEx subsidiary. The malware caused nearly $1 billion in combined losses for its victims.
The malware disrupted the IT systems at Heritage Valleys two hospitals, 60 workplaces and 18 satellite facilities. The malware likewise affected a large U.S. pharmaceutical maker and TNT Express, a FedEx subsidiary. The malware caused nearly $1 billion in combined losses for its victims.
More short articles on health care: Michigan Medicine mistake exposes clients e-mail address, health details: 3 details4 healthcare companies that paid $1M+ this year to settle HIPAA violationsSouth Carolina medical facility billing mistake blended up addresses for 12,636 clients
© Copyright ASC COMMUNICATIONS 2020. Interested in LINKING to or REPRINTING this content? View our policies by clicking here.