The U.S. Department of Justice, United Kingdom and other global partners have seized control of used by the LockBit ransomware-as-a-service group, charging five of the group鈥檚 affiliates for their participation in a conspiracy to attack over 2,000 victims and demand over $120 million in ransom payments. The agencies obtained decryption keys from the seized infrastructure and encourage victims to contact the to learn whether these can help them regain access to their data. In addition, the State Department will reward up to $15 million for information about LockBit associates.

鈥淟ockBit has hurt thousands of victims across the country and around the world to include in recent years, targeting all sectors, from government and public sector companies, such as hospitals and schools, to high-profile, global companies,鈥 FBI Cyber Deputy Assistant Director Brett Leatherman, adding that the agencies will continue gathering evidence to drive arrests, seizures and other operations against the group.

John Riggi, AHA鈥檚 national advisor for cybersecurity and risk, said, 鈥淭he LockBit gang was one of the most prolific ransomware groups targeting hospitals and health care business associates over the past few years. Their attacks have disrupted and delayed health care delivery and posed a risk to patient safety. Previous health care LockBit victims with encrypted files are urged to contact the FBI to determine if the recovered decryption keys may assist in full recovery of the data. The disruption of the LockBit technical infrastructure along with the charging of affiliated Russian nationals is to be applauded. As we have said for several years, cyber defense measures by hospitals alone will not stem the tide of the threats we face. However, defensive measures combined with aggressive cyber offensive operations by allied governments as part of a long-term strategy will help to reduce the threat and impact of cyberattacks against hospitals, health systems and the nation.鈥

For more information on this or other cyber and risk issues, contact Riggi at鈥jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit鈥aha.org/cybersecurity.

Related News Articles

Headline
The National Security Agency April 23 released a report on operational technology systems that includes recommendations for security policies and technical鈥
Chairperson's File
Public
Cybersecurity and physical threats are unfortunately significant enterprise risks for health care, regardless of size or location. Every hospital, physician鈥
Headline
The Cybersecurity and Infrastructure Security Agency April 17 released guidance to reduce risks associated with a reported breach of Oracle cloud services.鈥
Headline
The National Counterintelligence and Security Center, the FBI, and the Defense Counterintelligence and Security Center yesterday released guidance on鈥
AHA Cyber Intel
While the rate of cyberattacks on hospitals has risen dramatically, the severity of the impacts has also grown exponentially. Let鈥檚 look at the state of cyber鈥
Headline
The House Energy and Commerce Oversight and Investigations Subcommittee April 1 discussed cybersecurity threats in legacy medical devices during a hearing. The鈥