Started By
Message

re: Baton Rouge General hit by serious malware/ransomware attack?

Posted on 7/5/22 at 1:31 pm to
Posted by fightin tigers
Downtown Prairieville
Member since Mar 2008
73681 posts
Posted on 7/5/22 at 1:31 pm to
Might be cheaper to pay the ransom than the insurance, and what comes with it.
Posted by KLSU
Baton Rouge
Member since Sep 2003
10327 posts
Posted on 7/5/22 at 1:32 pm to
Can confirm.
Posted by LSU5508
New Orleans
Member since Nov 2007
3619 posts
Posted on 7/5/22 at 1:32 pm to
quote:

Even if you have a system that has all the patches and normal security holes fixed, all it takes is one dumbass opening the wrong email to spread something like this.


True but most good IT companies these days have tools that monitor servers and can shut down the entire system as soon as it sees a single file get encrypted. Now the desktop is probably screwed. Have had this happen to me got 3 files instead of a million.
This post was edited on 7/5/22 at 1:33 pm
Posted by Loup
Ferriday
Member since Apr 2019
11453 posts
Posted on 7/5/22 at 1:33 pm to
quote:

Just heard a nurse from BR General saying they got hit by a "cyber attack"


personally I'd wait and see what a doctor has to say about it.
This post was edited on 7/5/22 at 1:34 pm
Posted by ElderTiger
Planet Earth
Member since Dec 2010
7015 posts
Posted on 7/5/22 at 1:33 pm to
All you men who went to The General with the clap, you fixin’ to be outed…
Posted by Weekend Warrior79
Member since Aug 2014
16469 posts
Posted on 7/5/22 at 1:37 pm to
quote:

Every business of any kind should buy Cyber insurance.

What would this cover? Potential lawsuits for losing people's confidential information? Cost for someone to recover your data? The ransom?

Business Interruption is always a different cost.
If you have a robust backup system, you shouldn't lose more than a few days, depending on when hit compared to when you run the backup.
Posted by ABearsFanNMS
Formerly of tLandmass now in Texas
Member since Oct 2014
17505 posts
Posted on 7/5/22 at 1:43 pm to
Did she tell you while doing a combo jig and twerk dance where she looks like she is having a full on grand mal seizure?
Posted by fightin tigers
Downtown Prairieville
Member since Mar 2008
73681 posts
Posted on 7/5/22 at 1:45 pm to
quote:

f you have a robust backup system, you shouldn't lose more than a few days, depending on when hit compared to when you run the backup.


Depends on the method involved, all your backups can be infected just the same.

The ransomware can lay in wait for years if needed to.


Ransomware insurance used to be cheap, but now it is modifying into highly controlled with mandatory protections and stress tests of systems.
This post was edited on 7/5/22 at 1:47 pm
Posted by Breauxken
Baton Rouge
Member since Aug 2013
26 posts
Posted on 7/5/22 at 1:47 pm to
quote:

When you come up with a system that is 100% guaranteed to stop this you let me know.


This would make alot of money. You cant ever guarantee 100%. If hackers want to get in, they will. The only thing you can guarantee is that you can restore the environment quickly. You do that through fail-over environments, back ups, snapshots, etc. Looks like BR general was lacking in DR planning.
This post was edited on 7/5/22 at 1:57 pm
Posted by Breauxken
Baton Rouge
Member since Aug 2013
26 posts
Posted on 7/5/22 at 1:48 pm to
quote:

What would this cover? Potential lawsuits for losing people's confidential information? Cost for someone to recover your data? The ransom?


Yes, Yes and Yes. It also can cover a portion of lost revenue during the outage.
Posted by Y.A. Tittle
Member since Sep 2003
101668 posts
Posted on 7/5/22 at 1:50 pm to
quote:

Might be cheaper to pay the ransom than the insurance, and what comes with it.



I would suggest this is the type of thing that our FBI should be much more aggressive on policing.
Posted by jdd48
Baton Rouge
Member since Jan 2012
22127 posts
Posted on 7/5/22 at 1:52 pm to
Just so insane that institutions with the money to put a solution in place to prevent most of these types of attacks don't in this day and age.
This post was edited on 7/5/22 at 1:56 pm
Posted by fightin tigers
Downtown Prairieville
Member since Mar 2008
73681 posts
Posted on 7/5/22 at 1:54 pm to
And to think TSA is rolling back some of the language covering critical infrastructure

tsa
Posted by jdd48
Baton Rouge
Member since Jan 2012
22127 posts
Posted on 7/5/22 at 1:55 pm to
quote:

When you come up with a system that is 100% guaranteed to stop this you let me know.



You can't. However you can have good measures in place to be prepared for if and when it does. Often leadership will balk at the capital expenditure required to get a solution in place, but fire the same IT guy that proposed the solution when something like this does happen.
Posted by SingleMalt1973
Member since Feb 2022
12138 posts
Posted on 7/5/22 at 2:04 pm to
[quote]I wonder if the newer nurses even know how to do things manually?[/quote

[/URL][/img]

This post was edited on 7/5/22 at 2:05 pm
Posted by Y.A. Tittle
Member since Sep 2003
101668 posts
Posted on 7/5/22 at 2:05 pm to
You sound like you know a bit about this.

Do these people ever get caught? What sorts of efforts are ever taken to find them? Is it completely futile?

I'm guessing much of this is emanating internationally, but I'd think there has got to be SOME WAY to start policing it, no?
Posted by danilo
Member since Nov 2008
20258 posts
Posted on 7/5/22 at 2:07 pm to
Which employee opened up the phishing email?
Posted by SantaFe
Baton Rouge
Member since Apr 2019
6607 posts
Posted on 7/5/22 at 2:08 pm to

Wouldn't this be tantamount to paying the Mob protection money ?
Posted by lostinbr
Baton Rouge, LA
Member since Oct 2017
9573 posts
Posted on 7/5/22 at 2:09 pm to
quote:

I would suggest this is the type of thing that our FBI should be much more aggressive on policing.

I’d be curious to know what percentage of these attacks originate from within the US or from countries with which we have strong law enforcement relationships (e.g. from places where there is a realistic chance of apprehension and conviction).

My guess is that it’s small, but I could be wrong.
Posted by jdd48
Baton Rouge
Member since Jan 2012
22127 posts
Posted on 7/5/22 at 2:17 pm to
quote:

You sound like you know a bit about this.

Do these people ever get caught? What sorts of efforts are ever taken to find them? Is it completely futile?

I'm guessing much of this is emanating internationally, but I'd think there has got to be SOME WAY to start policing it, no?


You can report it to the FBI, but unless it's part of some large operation that affects a few large influential companies, they're not likely going to get caught. Most of it is likely coming from international parties. I won't even use the word "hackers" because that would imply there's some skill involved. Some 15 year old kid with little hacking skill these days can buy a ransomware package and target just about anyone. All it takes is 1 naive user to click a legit looking link. Targets are usually not hard to find based on how much people like to publicly live their lives in social media and post their places of employment,etc. If you wanted to target an executive of a company? No problem there as well. Most companies publish their leadership by name on their public company website.

This post was edited on 7/5/22 at 2:26 pm
first pageprev pagePage 2 of 3Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram