State Department offers $10M reward for info on BlackCat

The U.S. Department of State’s Rewards for Justice program, administered by the , announced a $10 million bounty Wednesday seeking more information against the BlackCat ransomware group.

The State Department said it set up a tip line to protect the safety and security of potential sources.

WHY IT MATTERS

The State Department seeks to prosecute cyber actors “under the control of a foreign that engages in certain malicious cyber activities against U.S. critical infrastructure” under the Computer Fraud and Abuse Act, according to the announcement.

ALPHV BlackCat operates as a ransomware-as-a-service in which the group’s members develop and maintain the ransomware variant and then recruit affiliates to deploy the ransomware, the RJF said.

Along with the Tor-based tip- line, the RFJ also noted that “relocation and rewards payments by cryptocurrency may be available to eligible sources.”

THE LARGER TREND

When Change Healthcare experienced a cyberattack, ransomware ultimately set off a chain reaction that reverberated across the healthcare ecosystem – from and providers to pharmacies and payers – that continues. 

Federal agencies confirmed that healthcare have been targeted since the U.S. announced the seizure of the ALPHV gang’s infrastructure in December.

But the Blackcat assault on Change’s network, which is owned by UnitedHealth Group and processes 15 billion healthcare transactions annually, underscores the need for transparency in reporting cyber incidents and highlights the urgency of contingency planning for healthcare organizations, according to Cliff Steinhauer, of information security and engagement at the National Cybersecurity Alliance. 

He told Healthcare IT News earlier this month that fostering a culture of cybersecurity awareness and conducting regular security audits are vital to bolstering an enterprise’s ability to execute transactions and protect patient care.

“This attack stands out due to its potential magnitude and the critical nature of the healthcare infrastructure it targets,” Steinhauer said.

UHG reportedly paid the ransom – about $22 million in . As Change began to restore service, one BlackCat affiliate claimed that ALPHV leaders shut down, posting a fake takedown notice, and kept the entire ransom. 

ON THE RECORD

“The ALPHV BlackCat ransomware-as-a-service group compromised computer networks of critical infrastructure sectors in the United States and worldwide, deploying ransomware on the targeted systems, disabling security features within the victim’s network, stealing sensitive confidential information, demanding payment to restore access and threatening to publicize the stolen data if victims do not pay a ransom,” the State Department said in a statement.

Andrea Fox is senior editor of Healthcare IT News.
Email: afox@himss.org

Healthcare IT News is a HIMSS Media publication.

Source link