In May 2024, Ascension Health, one of the largest U.S. healthcare systems, fell victim to a ransomware attack. The breach severely impacted hospital operations across multiple states, disrupting Ascension’s electronic health record (EHR) system MyChart.
Healthcare workers were forced to revert to manual documentation, delaying and disrupting critical patient care.
We’ve uncovered everything that happened in this ruthless cyber assault on yet another major healthcare system in our Ascension Cyber Attack Timeline.
AT&T experienced a massive data breach. Earlier estimates suggested that roughly 73 existing and former customers had their data compromised. The company later confirmed that the actual number was 51 million.
The interesting twist in the tale? One threat actor claimed to have leaked this data back in 2021. Know more about this massive exposure of sensitive information and service disruption in our AT&T Cyber Attack Timeline.
Barracuda Networks disclosed a security vulnerability in its Email Security Gateway (ESG) Appliances in May 2023. Although Barracuda promptly issued a patch for this vulnerability and followed up with an additional update, numerous customers had already been impacted. But when Barracuda issued an urgent action notice advising customers with affected hardware to completely remove the vulnerable devices, the cybersecurity community was shook.
Our Visual, Summarised Barracuda Cyber Attack Timeline and detailed document captures exactly how this unprecedented turn of events came about. Read our blog on the Barracuda Email Security Gateway Attack for a quick understanding of what went down in the Barracuda Zero-Day Attacks.
In January 2023, Royal Mail experienced a significant cyber-attack, leading to a halt in its international shipment of parcels and letters via its post office branches. The attack, attributed to the LockBit ransomware group with ties to Russia, involved a substantial ransom demand for a decryption key to restore services.
Check out our educational, visual Royal Mail Ransomware Attack timeline and detailed document on the Royal Mail Ransomware Attack that chronologically details the progression of the cyber incident. This timeline categorizes the information into four distinct sections: the Incident itself, its Impact, the Suspected Threat Actors involved, and the Response to the event. Don't forget to read our blog on the Royal Mail Ransomware Attack.
Before being hit by a cyber-attack on December 31, 2019, Travelex was recognized as the world's leading foreign exchange bureau. However, within a mere four months following the attack, this formidable enterprise was put up for sale. Its parent company, Finablr, faced bankruptcy. The deadly combination of a ransomware attack and the subsequent impact of COVID-19 placed the company's 40-year legacy in major jeopardy.
Find out what exactly happened in the Travelex Attack with our Visual, Easy-to-Read Travelex Cyber Attack Timeline and Detailed Timeline Document. Do check out our blog on the Travelex Cyber Attack Timeline for a quick overview of the attack.
The ransomware incident at AIIMS Delhi significantly disrupted healthcare services, deeply affecting a nation where a substantial population relies heavily on public healthcare facilities. This event also amplified the urgency of addressing cybersecurity vulnerabilities in the healthcare sector.
Learn more about how this incident unfolded, what the impact was and how AIIMS and the Indian Government responded to this healthcare emergency. Check out our easy-to-read Visual Timeline, accompanying detailed document here: AIIMS Ransomware Attack Timeline.
You may also want to read our blog on the AIIMS Ransomware Attack.
Western Digital, a leading data storage company, suffered a cyber attack in early 2023, during which it was confirmed that hackers exfiltrated 10 terabytes of data, encompassing sensitive customer details. This breach not only disrupted services for users of its My Cloud Home and Sandisk ibi products but also raised alarming concerns due to the attackers' claims of being able to impersonate Western Digital through digitally signed files.
Check out our educational, Visual Timeline on the Western Digital Cyber Attack & the accompanying detailed document. These have been constructed to methodically document the sequence of the cyber incident as it unfolded. You might also be interested in reading our blog on the Western Digital Cyber Attack.
Want more information on the NCSC Assured Training in Cyber Incident Planning and Response? Book a no-obligation discovery call with one of our consultants.
The information on this page and related pages and documents is Copyright of Cyber Management Alliance Ltd. The VCA or Virtual Cyber Assistant term, other terms, information, concepts, ideas, workflows, processes, procedures and other content that directly or indirectly supports the VCA Service are Copyright of Cyber
Management Alliance Ltd. Copyright 2022.