When it comes to making money though hacking, no sector is off limits to hackers. One such incident happened recently when hackers attacked a healthcare firm. A digital dental data backup provider firm fell prey to Sodinokibi ransomware attack.
Sodinikibi Ransomware Targeted Dental Data Backup Company
Reportedly, a digital dental data backup firm has fallen prey to a ransomware attack. As revealed through the company’s disclosure, the firm PerCSoft suffered the ransomware attack on August 26, 2019. Consequently, they faced encryption of their data affecting most DDS Safe practices.
Following the attack, the company began decrypting the data by collaborating with a software firm. Nonetheless, even after continuing the process for two days, they were having some difficulty restoring some files. Though, they kept updating customers until August 29, 2019.
While the process is seemingly still in progress, PerCSoft has clarified that the attack did not lead to compromise of the data. Rather it was a ransomware attack that encrypted the data.
Please also note this was a virus attack, not a data hack. No data is accessed or moved in these instances, it is locked and then has to be unlocked.
Possible Sodinokibi Attack
Though, PerCSoft has not officially revealed any detail about the kind of ransomware that attacked their systems. However, as revealed by KrebsOnSecurity, things hint towards a possible attack by Sodinokibi (or REvil) ransomware. This ransomware emerged as a new threat for the users after the departure of GandCrab.
According to Krebs, a private Facebook group of IT professionals serving the dental industry shared information in this regard. The same also shared screenshots that hint that the victim firm has paid the ransom to decrypt the data. Although, in their disclosure, PerCSoft mentioned about contacting some software company for decryption.
For now, no further (official) details are available. Nonetheless, it seems that the company will soon complete the decryption process for the data.
Let us know your thoughts in the comments.