Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Trinity Double-Extortion Ransomware Group Targets Healthcare
Facebook   X   LinkedIn   Email

Trinity Double-Extortion Ransomware Group Targets Healthcare

February 1, 2025

Paying a ransom to have your organization's sensitive information returned is bad enough. But when the hacker also threatens double-extortion—publicly exposing your ransomed data if you don’t pay up, it’s even worse. That’s exactly how the hacking group behind Trinity ransomware terrorizes their victims, including the healthcare sector. It’s anything but a fair fight—and that’s the point.

In a threat alert, the Department of Health and Human Services warned critical industries in the U.S. about Trinity’s double threat. Healthcare is a favorite target for ransomware attacks since they disrupt hospitals and doctors and put patient well-being at risk. With so much in jeopardy, victims are likely to quickly pay the cryptocurrency ransom demand. In the six short months Trinity has been active, ten organizations in seven countries have been attacked, including in healthcare, finance, and education.

Trinity Troubles

Once active in a system, Trinity gets to work siphoning data from patient files before locking them with ChaCha20 encryption. Trinity hackers also operate a “leak site” that lists its victims—those they threaten to expose using double-extortion. If victims don’t contact Trinity within 24 hours, they’ll leak or sell the stolen data.

Trinity takes advantage of stolen credentials and unpatched systems, with hackers using email phishing to lure its victims. They elevate their privileges within a system, bypassing security protections and holding the data for ransom.

Anti-Phishing Tips

Always keep software updated and patched. It’s where security upgrades and bug fixes are often included. To minimize an attacker’s hold on your data, do regular backups of data using a server separate from the system and preferably stored offline. Email filters can block malicious attachments and hyperlinks, and anti-malware software can keep an infection from taking hold.

Remember the tried-and-true tips: Don’t click links or attachments that are unexpected, from unknown senders, or that seem phishy in any way. Always keep in mind that any type of attachment can be used to hide malware these days.


Ransomware’s Latest Trend: Fewer Attacks-Bigger Ransoms

Your Security

Ransomware’s Latest Trend: Fewer Attacks-Bigger Ransoms

Once again, ransom payments are on the rise and expected to reach record highs this year. What’s behind these record-breaking amounts is a new ransomware trend that’s working well—for cybercriminals, that is. Research shows the maximum and median amounts of ransom payments are sharply increasing, with median payments now averaging $1.5 million. That’s almost eight times what they were just 18 months ago. However, there is also some good news. READ FULL STORY

Carbanak Is Back! Ransomware Group Reinvents Itself

Corporate Security

Carbanak Is Back! Ransomware Group Reinvents Itself

Since the arrest of Carbanak's leader five years ago, the notorious ransomware group is back with a vengeance. The Carbanak ransomware syndicate gained notoriety as a highly effective cybercrime ring targeting financial and banking institutions worldwide. And now, the group has reinvented its method of attacks to reemerge as yet another force to be reckoned with. The group recently shifted their ransomware attacks from financial targets to posing as business software like HubSpot and Xero on compromised websites. READ FULL STORY

Chicago Kids Stricken By Hospital Cyberattack

Corporate Security

Chicago Kids Stricken By Hospital Cyberattack

Yet another hospital felt the pain of a cyberattack affecting patient services. This time, those in the crosshairs are children, the patients at Lurie Children’s Hospital in Chicago. If you're wondering who would attack a children’s hospital, you're not alone. Lurie and the FBI are working to answer that question, and in the meantime, the hospital is struggling to maintain disrupted patient services. On their website, Lurie Children’s Hospital called what they experienced a "cybersecurity matter" without further detail. READ FULL STORY

A PHI Security Epidemic! Healthcare Ransomware Attacks Threat To Patients

Corporate Security

A PHI Security Epidemic! Healthcare Ransomware Attacks Threat To Patients

It’s no secret that in the U.S., cybercriminals placed a bullseye on healthcare systems and the sensitive patient data they hold. A recent study from the Journal of the American Medical Association (JAMA) shows over a five-year period, nearly 42 million patients had their PHI (Protected Health Information) compromised by ransomware attacks. This previously unprecedented number of victims makes PHI security more important now than ever before. READ FULL STORY

Ransomware's 4 Favorite Entry Options And How To Counter Them

Corporate Security

Ransomware's 4 Favorite Entry Options And How To Counter Them

Studies show 41% of customers say they would stop buying from a business victim of ransomware. Attacks against small-to-medium sized businesses (SMBs) can be most catastrophic, with 65% closing their doors within six months of a ransomware attack. Ransomware is behind countless problems for businesses worldwide, including significant down-time, loss of reputation, and customers, and significant financial expense. Knowing the four most prevalent ways ransomware launches attacks is something every organization leader and IT department should know. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...