How it really happened : NINJIO Season 1, Episode 6, Hospital Hijinks

As we saw in the Hospital Hijinks Episode, Michael had a dream that he clicked on a link in a suspicious email that installed the necessary software to launch a Ransomware attack.  As a result of doing this, critical computers at the Hospital were rendered useless.  Luckily for Michael, this was just a dream and he didn’t actually click the link to launch the attack.

Ransomware is currently one of the most destructive threats on the Internet today.  It can be contracted through various methods, such as email phishing attacks, websites that have been compromised, ads on suspicious websites, infected USB drives, etc.  It is extremely important that you use caution when coming across anything suspicious.

 

How it Really Happened:  California Hospital Pays $17,000 To Hackers In ‘Ransomware’ Attack

A hospital in California was the victim of Ransomware after an attacker successfully convinced a hospital worker to click a malicious link. The link pointed to Ransomware software that encrypted critical hospital files and forced them to pay the ransom to regain access.

 

Why Hospitals Are the Perfect Targets for Ransomware

Hospitals have numerous personal identifiable information (PII) stored for thousands of users. This is what makes them a great target for hackers. This article explains why the latest rounds of Ransomware attacks have targeted hospitals.

 

Locky Ransomware Infecting 90,000 Systems Daily

Locky is a common Ransomware program spreading on the internet. This article explains its growth, what it does to the victim’s data, and the red flags associated with receiving malicious email that contains the link to its executable.

 

Don’t Fall Victim to Ransomware

The key to avoiding Ransomware is to identify it when it’s sent through email. Ransomware is downloaded and an executable runs on the machine. This article describes Ransomware and ways to avoid being a victim.

 

Ransomware in your inbox: The rise of the malicious JavaScript attachment

Ransomware is often included in Word documents in malicious macro downloads. This article explains two attachments that should be avoided when suspicious email is sent to you.

 

7 Comments
  • Bob Pessell
    Posted at 19:25h, 21 June

    Great info

  • GRAHAM WHALEY
    Posted at 20:55h, 21 June

    Don’t click on any link you don’t know.

  • Benda DeGrazio
    Posted at 15:37h, 24 June

    Why aren’t more institutions using Apple computers?

  • Margarita
    Posted at 22:08h, 30 June

    Very Informative

  • Ed anderson
    Posted at 23:17h, 31 August

    Very Helpful.

  • Ed anderson
    Posted at 19:38h, 06 September

    Nice job, very useful.

  • element factory
    Posted at 18:49h, 24 October

    A Scary situation not knowing how to protect oneself.