Security

Cyber-crime

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks


Planned Parenthood of Montana's chief exec says the org is responding to a cyber-attack on its systems, and has drafted in federal law enforcement and infosec professionals to help investigate and rebuild its IT environment.

This comes as ransomware crew RansomHub boasted it had broken into the nonprofit, and stolen its data, which it is threatening to leak unless payment is made.

According to Martha Fuller, CEO and president of the US state's Planned Parenthood office, a network intrusion – or a "cybersecurity incident" as the org put it – was spotted on August 28. 

"We immediately implemented our incident response protocols, including taking portions of our network offline as a proactive security measure," Fuller told The Register in an emailed statement.

"We are grateful to our IT staff and cyber security partners, who are working around the clock to securely restore impacted systems as quickly as possible, and who are tirelessly investigating the cause and scope of the incident," she added. "That investigation is ongoing."

RansomHub claims to have snatched 93 GB of the organization's data, and says it will share it online in seven days unless the nonprofit pays. We should note: Nonprofits are not known for their deep pockets and ability to pay multi-million ransom demands.

Fuller declined to answer specific questions about the network intrusion, including what, if any, data was stolen in the attack, and if RansomHub was behind the break-in. She did, however, acknowledge the criminals' claims and threats to leak the stolen data.

"We are aware of the RansomHub post, and want to assure our community that we are taking this matter very seriously," Fuller said. "We have reported this incident to federal law enforcement, and will support their investigation."

The FBI did not immediately respond to The Register's inquiries.

The Planned Parenthood office security breach, however, happened a day before the FBI, CISA, and other US government agencies issued a security alert warning that RansomHub was aggressively targeting victims as recently as August.

The criminal organization, which has been scooping up former LockBit and ALPHV gang members as law enforcement has disrupted those groups, has hit at least 210 victims since February, according to the Feds.

These victims span water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services, commercial facilities, critical manufacturing, transportation, and communications critical infrastructure sectors.

May we add, infecting a nonprofit that provides reproductive healthcare services across the country is an especially low act, even for a ransomware crew. ®

Send us news
15 Comments

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals

Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom

Sordid search history 'evidence' in case that could see him spend 35 years for extortion and wire fraud

Seattle airport 'possible cyberattack' snarls travel yet again

No word yet on if ransomware is to blame