Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 573

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 573

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 574

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 574

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 575

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 575

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 597

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 597

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 598

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 598

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 599

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php on line 599

Warning: Cannot modify header information - headers already sent by (output started at /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php:573) in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/plugins/wp-force-ssl/wp-force-ssl.php on line 929
Hackers assail UK-based medical agency working on COVID-19 vaccine | The Cybersecurity Times
data security

Hackers assail UK-based medical agency working on COVID-19 vaccine

Hammersmith Medicines Research (HMR) facility is on standby to help test vaccine for the coronavirus, but unfortunately cyber criminals have hit this organization with a cyberattack, stealing information of the patients and publishing it online. Maze threat actors a few days back promised they aren’t going to target healthcare and medical agencies during this pandemic; however, it appears they were the ones behind this attack and it wasn’t appropriate to expect morals from cyber criminals, as their clear motive is to make money even during the worst times. 

Healthcare organizations are undergoing tremendous pressure, stress and anxiety over the last two months, treating the coronavirus infected patients by working around the clock.

Maze threat actors reneged their statement

Maze threat actors pledged they won’t hit the medical agencies, but reneged it by attacking the Hammersmith Medicines Research (HMR) facility in United Kingdom. This medical had worked on Ebola vaccine during that epidemic. Considering any information about a COVID-19 cure or vaccine at this point of time could be the moenymaker for cyber criminals, their motive hasn’t changed even during these perplexing times.

It is also believed that rather than just breaching into the facility the hackers have also published the patient records over the web, and claims are that they are selling the information over the dark web. Malcolm Boyce, clinical director of Hamersmith Medicines Research have claimed that the Maze actors have published a post of their attack citing their organization as the ‘New client’ (Maze actors call their victims as clients). Boyce have also mentioned there is zero intention of paying the ransom, and said he would better run of out business than facilitating the hackers.

How can HMR be pushed to the bottleneck of paying the ransom

Hackers will continue to publish the stolen patient records one by one, creating pressure on HMR.ltd. Since the news is already out, HMR is already under pressure of data theft and hackers will further escalate this as per their modus operandi by further data leaks. If the company is still stubborn enough and doesn’t pay the ransom, the hackers could publish this stolen data in a random Russian cybercrime forum and request the audience to use it as per their wish. 

Continues coronavirus themed cyberattacks, healthcare targeted malicious actors, and data theft are rising during this pandemic. Organizations are advised to keep their security strategies robust and employees cyber aware. Employ the right tools at the optimal budget and keep the data protected. 

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

2 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

2 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

2 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

3 months ago

Warning: Cannot modify header information - headers already sent by (output started at /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/themes/grandnews/lib/custom.lib.php:573) in /home2/rulin9py/public_html/thecybersecuritytimes.com/wp-content/plugins/accelerated-mobile-pages/includes/vendor/amp/amp.php on line 100