Back to Ransomware

Ransomware

Pharmaceutical firm affected by ransomware

On April 17, 2020, US-based pharmaceutical firm ExecuPharm revealed a data breach incident. Compromised personal data includes Social Security numbers, driver licenses, national insurance numbers, national ID numbers, beneficiary information, bank account details, passport details, and credit card information.

The incident

The ransomware attack was detected on March 13. The attackers infiltrated the network via phishing emails and injected ransomware, which encrypted ExecuPharm and parent company's personnel files.

“ExecuPharm immediately launched an investigation, alerted federal and local law enforcement authorities, retained leading cybersecurity firms to investigate the nature and scope of the incident, and notified all potentially impacted parties,” said ExecuPharm operations chief David Granese. The company did not give in to the ransom demands. After the incident, the internal security team worked with a leading cybersecurity forensic firm to restore the services. To prevent future attacks, ExecuPharm upgraded its security measures by implementing multi-factor authentication (MFA) and endpoint protection tools.

Ransomware attacks can be costly. Invest in a tool like ManageEngine DataSecurity Plus to secure data and mitigate ransomware attacks. Download a free, 30-day trial of DataSecurity Plus today.

How ManageEngine can help.

Investing in a ransomware detection tool helps you detect and respond to ransomware attacks in real time to minimize the impact on your organization. Here are some best practices DataSecurity Plus can help you implement to handle ransomware attacks.

  • Detect ransomware with real-time mass access alerts. Monitor the frequency of file modifications by a user, and issue alerts whenever the number of modifications crosses a threshold within a specified time.
  • Quarantine ransomware and shut down infected devices with a customizable and automated response system. Set automated alert responses through the execution of a batch file to respond to mass access alerts.
  • View in-depth details of events for further investigation. Generate customizable, audit-ready reports on all file-related changes, access attempts, and share permissions.

Learn more about the eight best practices that can help you avoid cyberattacks and protect your organization. Start your free, 30-day trial of DataSecurity Plus today.

Share:

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.