Ransom Spread to Another Hospital
24:14–25:19 · 65s
After being blocked in one network, attackers pivot through interconnected VPN tunnels to a different hospital, exfiltrating terabytes of data and demanding payment.
24:14–25:19 · 65s
After being blocked in one network, attackers pivot through interconnected VPN tunnels to a different hospital, exfiltrating terabytes of data and demanding payment.
We use cookies to understand how you use our platform and to improve your experience. Click "Accept All" to consent, or "Decline non-essential" to opt out of non-essential cookies. Read our Privacy Policy.