a $ 55,000 ransomAttack.Ransomto hackers to regain access to its computer systems , hospital officials said . Part of the health network had been held hostageAttack.Ransomsince late Thursday , when ransomware locked files including patient medical records . The hackers targeted more than 1,400 files , the names of every one temporarily changed to “ I ’ m sorry. ” They gave the hospital seven days to payAttack.Ransomor the files would be permanently encrypted , officials said . An analysis since the attack confirmed no personal patient information was takenAttack.Databreachby the hackers , believed to be located in eastern Europe , said Hancock Health CEO Steve Long . The affected files were backed up and could have been recovered , but restoring them would take days — maybe even weeks — and would be costly , Long said . From a business standpoint , paying a small ransomAttack.Ransommade more sense , he said . The hacker asked forAttack.Ransomfour bitcoins — a virtual currency used to make anonymous transactions that are nearly impossible to trace . At the time of the transfer , those four bitcoins were valued at about $ 55,000 .
Last week HackRead exclusively reported on a vendor sellingAttack.Databreachover 1 million Gmail and Yahoo accounts on a Dark Web marketplace . Now , the same vendor is back with yet another listing and this time the victims are PlayStation users . The vendor who goes by the handle of “ SunTzu583 ” is sellingAttack.Databreach640,000 accounts of PlayStation users in just USD 35.71 ( 0.0292 BTC ) stolenAttack.Databreachfrom an unknown database . These accounts contain emails along with their clear-text passwords . According to SunTzu583 , the database was not directly stolenAttack.Databreachfrom PlayStation servers , but it does contain unique accounts of PlayStation users . SunTzu583 goes on to explain that these accounts may also work on other sites however they can be mainly used for PlayStation-related activities . It must be noted that in 2015 , 2.5 million Xbox ( Xbox 360 ISO ) and Playstation accounts ( PSP ISO ) were stolenAttack.Databreachand leakedAttack.Databreachon the Dark Web marketplaces in February 2017 . Also , about five months ago several PlayStation users were complaining that their accounts have been hackedAttack.Databreachand in some cases , their funds were missing . While the vendor has already announced that the database is not directly stolenAttack.Databreachfrom PlayStation servers , it is quite possible that it was takenAttack.Databreachfrom a third party server . We at HackRead can not confirm the authenticity of this database , but if you have an account on PSN , it is advisable to change its password and also use a different password on other sites .
The vulnerability was in Struts2 , a release of an Apache web server project . Officials could not say how long the affected software was used by the government , but the vulnerability was fixedVulnerability-related.PatchVulnerabilityon Sunday . `` These types of vulnerability reports are issuedVulnerability-related.DiscoverVulnerabilitydaily , '' said Scott Jones , Deputy Chief of IT Security in Canada 's Communications Security Establishment , the country 's NSA analogue , during a call with media outlets including Motherboard . `` Some hackers on the internet were actively attempting to exploit this vulnerability . '' No other government sites use the affected software , Jones added , but others may be affected . `` Anyone using this technology in the private or public sector should immediately installVulnerability-related.PatchVulnerabilitythe patches , '' he said . `` The unpatched version of the software [ … ] had the potential to be exploited , '' Jennifer Dawson , Deputy Chief Information Officer for the Treasury Board of Canada Secretariat , also said during the call with journalists . According to Gabrielle Beaudoin , director of communications at Statistics Canada , no personal information was takenAttack.Databreachby the hacker . `` We have data tables , publications [ on that server ] , '' Beaudoin said , adding that no personal or sensitive information was available . `` It 's all information that 's already in the public domain , but there was an intrusion on that server .
HipChat has reset all its users ' passwords after what it called a security incident that may have exposedAttack.Databreachtheir names , email addresses and hashed password information . In some cases , attackers may have accessedAttack.Databreachmessages and content in chat rooms , HipChat said in a Monday blog post . But this happened in no more than 0.05 percent of the cases , each of which involved a domain URL , such as company.hipchat.com . HipChat did n't say how many users may have been affected by the incident . The passwords that may have been exposedAttack.Databreachwould also be difficult to crack , the company said . The data is hashed , or obscured , with the bcrypt algorithm , which transforms the passwords into a set of random-looking characters . For added security , HipChat `` salted '' each password with a random value before hashing it . HipChat warned that chat room data including the room name and topic may have also been exposedAttack.Databreach. But no financial or credit information was takenAttack.Databreach, the company said . HipChat is a popular messaging service used among enterprises , and an attackAttack.Databreachthat exposedAttack.Databreachsensitive work-related chats could cause significant harm . The service , which is owned by Atlassian , said it detected the security incident last weekend . It affectedVulnerability-related.DiscoverVulnerabilitya server in the HipChat Cloud and was caused by a vulnerability in an unnamed , but popular , third-party library that HipChat.com used , the company said . No other Atlassian systems were affected , the company said . “ We are confident we have isolated the affected systems and closed any unauthorized access , ” HipChat said in its blog post . This is not the first time the messaging service has faced problems keeping accounts secure . In 2015 , HipChat reset user passwords after detecting and blocking suspicious activity in which account information was stolenAttack.Databreachfrom less than 2 percent of its users . When breaches occur , security experts advise users to change their passwords for any accounts where they used the same login information . Users can consider using a password manager to help them store complex , tough-to-memorize passwords . HipChat has already sent an email to affected users , informing them of the password reset . In 2015 , rival chat application Slack reported its own breach , and as a result rolled out two-factor authentication to beef up its account security . HipChat does not offer two-factor authentication .