Ransomware represents a major threat to every industry. In recent years, infiltrators have increasingly targeted companies with Ransomwari, and their databases are locked unless a ransom is paid. In some cases, they also threaten the leakage of stolen data on the Internet if the company refuses to comply, as shown in UNITEDHELHE, where infiltrators demanded $ 22 million.
However, ransom attacks are not limited to companies.
According to the latest warning from the FBI, they also target employees, especially companies executives.
The agency warns that Internet criminals send blackmail messages, threatening to issue sensitive information to victims unless a ransom is paid.
The infiltrator in the work (Cyberguy “Knutsson)
What you need to know
the FBI warning Companies, especially companies in the health care sector, about the fraud that involves material ransom messages sent through the American Post service. These messages, which falsely claim to be from the Ransomware Group Bianlian collection, require Bitcoin payments from $ 150,000 to $ 500,000 for not leaking stolen data.
The messages claim that “sensitive time to time” immediately, stating that the attackers have been able to reach through social engineering and sensitive files offered. However, no evidence was provided, and investigations have not found any signs of actual ransom interventions in affected organizations. The letters seem to have been concluded, with only minor differences, and include the rapid response code associated with Bitcoin. Some also have a password, likely to make the threat look more credible.
What is artificial intelligence (AI)?
These messages were sent from Boston with American flag stamps, and they differ greatly in the tone and drafting from the well -known communications. The authorities believe that this is a fraud that depends on fear designed to deceive organizations to pay a ransom to violate that has never happened.

A man running on his mobile phone (Cyberguy “Knutsson)
Data removal does what VPNS does not do: Here is the reason for the possibility of both of them
The healthcare industry needs to work on cybersecurity
Ransomware reaches health care It is more difficult than ever. It is now the third most targeted industry after financing and manufacturing, as the attacks increased by more than 32 % from 2023 to 2024. These attacks are not only at risk. It also disrupts hospitals, slows care and creates chaos for doctors and patients.
the Ascending electronic attack In May 2024 a clear example. The infiltrators closed the medical staff from the critical systems, closed the prohibited phone lines and tools needed for tests, procedures and medicines. Initially, the violation was reported with an estimated 500 people affected, but by December, this number jumped to approximately 5.6 million.
Of the experts, the health care unit at UNITEDHELHELTH Breaking databases In February 2024, the most prominent of the sector’s weakness. She initially mentioned that it affected about 100 million people, later the number grew to 190 million, making it the largest violation of medical data in the history of the United States.
This breach affected nearly half of the country’s population. UNITEDHELTH attributed the attack to Alphv/Blackcat, a Russian -speaking Ransomwari group that later demanded responsibility for the attack before its dismantling by the law application.
Get Fox Business on the Go by clicking here

A woman uses multiple devices (Cyberguy “Knutsson)
It displays the violation of huge health care data more
7 Ways to avoid Ranouwari attacks (and fake ransom tricks)
1. Install strong anti -virus programs and update software regularly: The first line of defense against Ransomware guarantees that your systems are equipped with the latest safety tools. Maintain all programs and devices to update To avoid weaknesses that the infiltrators can exploit. Installing the walls of the protection, Strong antivirus program And infiltration detection systems to prevent malicious activities before causing harm. Regularly correct operating systems and applications to remain advanced on Internet criminals. The best way to protect yourself from malicious links that prove harmful programs, which may reach your own information, is to install a strong antivirus program on all your devices. This protection can also be alerted to relieving emails and fraud on Ransomwari, and maintaining your personal information and digital assets. Get my choices for the best winners to protect antivirus 2025 for Windows, Mac, Android and iOS devices.
2. Implementing strong password policies and used password manager: Ensure that all passwords are unique, with a length of at least 15 characters and include a mixture of large, small letters, numbers and symbols. Also, consider using the password manager to create and store complex passwords safely. This reduces the risk of reusing the password and weak passwords, which are common entry points for ransom attacks. Get more details about my country The best password managers reviewed by experts in 2025 here.
3. Education and training employees on awareness of cybersecurity: Many Ransomware attacks begin with deceptive email messages or social engineering tactics. As described in the fraud that targets executives, attackers often use fear -based tactics to treat victims to act quickly. Training your employees, especially high -level executives, to learn about suspicious emails, fraudulent requests and attempts to hunt.
4. Backup data and maintain a safe recovery plan: The backup of the data is decisive protection against Ransomwari. Regularly reserve the important data to secure the websites that are not connected to the Internet that Ransomware cannot access. Test your recovery plans often ensures that if an attack occurs, you can recover quickly with the minimum effect on operations. In addition, consider using a cloud service with encryption to ensure that even if the attack occurs, the backup version remains safe.
5. Take advantage of dual -factors authentication (2FA): Dual factors authentication It is a basic safety measure that adds an additional layer of protection to sensitive systems and data. With 2FA, even if the attackers can obtain the entry login accreditation data, they will not be able to access the critical systems without the second factor of authentication, whether it is a symbol that is sent to a phone or verified vitality.
6. Check the threats before taking the actions: If you receive a ransom request (digital or physical), his legitimacy is attached to him. Fraud operations often lack the proof of data violations or a network compromise. Consult the cybersecurity or law enforcement before the response.
7. Reporting suspicious activity: Notify the application of law or organizations such as the online crime complaints center at the FBI if it faces fraud or ransom threats. Reporting the authorities helps to track and reduce these activities.
The FBI’s warning of the dangerous “Smorish” fraud that targets your phone
Court Kisa Curt
Health care is dangerous when it comes to cybersecurity. It is crazy that many health institutions do not have CISO or a dedicated security team. Instead, the Information Technology Department, which has not always been trained in cybersecurity, stumbles in an attempt to deal with everything. With a lot of sensitive data, it is shocking that many health care organizations still treat cybersecurity as a subsequent idea.
The e -attacks will only increase, and unless the industry is from its game, this is just a matter of time before more hospitals, clinics and health systems reach. It is time to take security seriously.
Click here to get the Fox News app
Do you think these companies do enough to protect your data, and is the government enough to arrest electronic attacks? Let’s know through our writing in Cyberguy.com/contact.
For more technical advice and security alerts, participated in the free newsletter of Cyberguy Report by going to Cyberguy.com/newsledter.
Ask Court a question or tell us about the stories you want to cover.
Follow Court on his social channels:
Answers to the most amazing Cyberguy questions:
New from Court:
Copyright 2025 Cyberguy.com. All rights reserved.
adxpro.online