Tag Archive for: chain

How a ransomware attack would disrupt the food supply chain


Massive financial gains continue to be one of the top motivating factors behind cyberattacks.

The Information Technology – Information Sharing and Analysis Center (IT-ISAC) has been tracking ransomware incidents and trends since 2021.

Despite government and law enforcement efforts to take down malicious infrastructure, new ransomware strains continue to emerge.

The company just released its analysis of the 2023 ransomware landscape report and insights for 2024.

Jonathan Braley, Director of the Food and Ag-ISAC joins Veronica Dudo to discuss. #IN AMERICA TODAY #featured #ransomware #ransomwareattacks #foodsupplychain

Source…

More than $80m in crypto stolen in Orbit Chain hack


The blockchain platform is working with numerous agencies including the Korean National Police Agency to support its investigation.

South Korea’s Orbit Chain, a platform designed to function as a multi-asset blockchain hub, has confirmed it suffered a major breach on the last day of 2023.

The company confirmed there was an “unidentified access to Orbit Bridge”, its decentralised cross-chain protocol, which resulted in more than $80m worth of cryptocurrency being stolen.

In a series of posts on X, Orbit Chain revealed details of the hack, saying the hacker used cryptocurrency mixer Tornado Cash to fund an initial Ethereum wallet before attacking Orbit Chain’s Ethereum vault. Tornado Cash hit headlines last year when its co-founders were charged with money laundering.

The stolen funds were then sent to numerous Ethereum wallets. Blockchain analytics platform Arkham Intelligence showed Orbit Chain’s Bridge balance plummet from $115m to $31m between 31 December and 1 January.

In a post on X yesterday (2 January), Orbit Chain said the stolen assets “remain unmoved” at the time of posting and the team is constantly monitoring the stolen assets.

“Orbit Chain team has developed a system for investigation support and cause analysis with the Korean National Police Agency and KISA (Korea Internet and Security Agency), enabling a more proactive and comprehensive investigation approach. Furthermore, we are also discussing close cooperation with domestic and foreign law enforcement agencies,” the company said in a post.

“We sincerely request that all members of the Orbit Chain community and the Web3 ecosystem help spread this information as widely as possible.”

Crypto chaos

The crypto sector has come under increased scrutiny over the past couple of years, with many dubbing it an unregulated ‘wild west’.

2023 in particular saw a number of high-profile crypto hacks take place. In March, UK-based crypto platform Euler Finance lost an estimated $197m from hackers exploiting vulnerable code. However, the hackers later returned the funds.

Meanwhile, Ethereum-based crypto exchange Curve was targeted in a major hack in July 2023 and a few…

Source…

Orbit Chain tracking down hackers after the new-year eve $81M hack


In what appears to be a 2024 bad start, Orbit Chain, a platform specializing in cross-chain transactions, suffered an $81 million hack on Dec-31-2023 at 08:52 PM UTC.

Despite the setback, the platform is taking robust measures to address the situation, involving collaborations with Korean authorities, security agencies, and law enforcement globally. Here are the key details of the hack and the proactive steps taken by Orbit Chain to recover the funds and secure its ecosystem.

Orbit Chain collaborating with Korean National Police and KISA

Orbit Chain swiftly responded to the hack by initiating a collaborative effort with the Korean National Police Agency and KISA. In addition, the platform’s development team has engineered a specialized system for investigation support and cause analysis.

This collaborative approach with Korean authorities aims to enhance the investigation’s comprehensiveness and proactiveness. Discussions are also underway for close cooperation with domestic and foreign law enforcement agencies.

This collaborative effort signals a dedicated pursuit of justice, leveraging the expertise of both technology professionals and law enforcement agencies. By aligning forces with government entities, Orbit Chain seeks to bring the perpetrators to justice and reinforce the security of its cross-chain platform.

On January 2, 2024, the Orbit Chain team updated its community on X stating that it was also trying “to communicate with the attackers of the Orbit Bridge.” They said that they “delivered a second message to them (Jan-01-2024 01:08:35 PM +UTC).”

Besides collaborating with law enforcement agencies, the Orbit Chain team is urging the community and the wider Web3 ecosystem to disseminate information about the incident. This community-driven approach is seen as a strategic move to heighten awareness and potentially aid in the…

Source…

Ransomware attack prompts multistate hospital chain to divert some emergency room patients elsewhere


NASHVILLE, Tenn. (AP) — A ransomware attack has prompted a health care chain that operates 30 hospitals in six states to divert patients from some of its emergency rooms to other hospitals while postponing certain elective procedures.

Ardent Health Services said it took its network offline after the Nov. 23 cyberattack, adding in a statement that it suspended user access to information technology applications such as software used to document patient care.

By Tuesday afternoon, more than half of Ardent’s 25 emergency rooms had resumed accepting some patients by ambulance or by fully lifting their “divert” status, Ardent spokesperson Will Roberts said. Divert status means hospitals have asked ambulances to take people needing emergency care to other nearby facilities. Roberts said hospitals nationwide have at times used divert status during flu season, COVID-19 surges, natural disasters and large trauma events.

The company said it could not yet confirm the extent of any compromised patient health or financial information. It reported the issue to law enforcement and retained third-party forensic and threat intelligence advisers, while working with cybersecurity specialists to restore IT functions as quickly as possible. There was no immediate timeline for resolving the problems.

Based in the Nashville, Tennessee, suburb of Brentwood, Ardent owns and operates 30 hospitals and more than 200 care sites with upwards of 1,400 aligned providers in Oklahoma, Texas, New Jersey, New Mexico, Idaho and Kansas.

Ardent said each hospital is still providing medical screenings and stabilizing care to patients arriving at emergency rooms.

In Amarillo, Texas, William Spell said he and his mother have had flu-like symptoms for days but couldn’t make a doctor’s appointment through an online patient portal because of the cyberattack.

“We are trying to figure out other options as to what to do next,” said Spell, 34.

BSA Health System – the Ardent umbrella provider for Spell’s clinic and other facilities in the city – said it was working to restore its patient portal and system for video doctors’ visits. Spell said his…

Source…