The attacks hampered the newspapers’ print operation, and the newspaper was forced to shut down its newsroom until at least Tuesday so that its employees could cover an expensive and highly competitive mayoral race.
"The incident was the greatest publication disruption to Pennsylvania's largest news organization since the blizzard of Jan. 7-8, 1996, and it came just days before Tuesday's mayoral primary election," the Inquirer's Jonathan Lai said.
Lisa Hughes, spokesperson for The Philadelphia Inquirer stated "We appreciate everyone's patience and understanding as we work to fully restore systems and complete this investigation as soon as possible[…]We will keep our employees and readers informed as we learn more."
Reportedly, on Thursday, the newspaper discovered “anomalous activities” on select computer systems. The systems were taken down immediately.
Following the attacks, the regular Sunday newspapers could not be published. Instead, a Sunday "early edition," which went to press on Friday evening, was delivered to print subscribers. The newspaper stated on Sunday that it was "sometimes slower than normal" to upload and update content on its website, Inquirer.com.
The Inquirer has also contacted the FBI regarding the cyber intrusion and hired Kroll to help with the investigation and response.
While Hughes was unable to provide information about what was included in the attacks or they gained access to customers' or employees' sensitive information, she confirms that the newspaper would inform those who might have had their data impacted in the incident.
Nearly 200 years after it was first published in 1829, The Philadelphia Inquirer today reaches a rising readership of over 13 million people each month through its newspaper, e-paper, and other platforms.
Moreover, it was also revealed by News Corporation, a mass media and publishing giant and owner of the New York Post, The Wall Street Journal, Dow Jones, MarketWatch, Fox News, Barron's, The Sun, and the News UK, that in February 2023 that Chinese-linked attackers had access to its network between February 2020 and January 2022.
Apparently, the attackers had access to an email and document storage system used by a number of News Corp businesses. As a result, they gained access to emails and business documents containing sensitive data, including employees' personal information.
The firm disclosed the incident on its blog on May 10, alleging that it took place on May 8 where hackers acquired access to SharePoint and the Dragos contract management system by compromising a new sales employee's personal email address before the employee's start date. The hacker then impersonated the employee to complete the first steps of Dragos' employee-onboarding procedure using the stolen personal information from the hack.
After infiltrating Dragos’ SharePoint cloud platform, the hackers apparently downloaded “general use data” and access 25 intel reports, generally only made available to the customers.
“Dragos' swift response prevented the threat group from achieving its objective — the deployment of ransomware — or to engage in further activity, such as lateral movement, escalating privileges, establishing persistent access, or making changes to any Dragos infrastructure[…]No Dragos systems were breached, including anything related to the Dragos Platform,” the company noted.
Due to role-based access control (RBAC) regulations, the threat actors were unable to access several Dragos systems during the 16 hours they had access to the employee's account, including its messaging, IT helpdesk, finance, request for proposal (RFP), employee recognition, and marketing systems.
Eleven hours into the attack, after failing to break into the company's internal network, they sent an email of extortion to Dragos executives. Because the message was sent after business hours, it was read five hours later.
Five minutes into reading the extortion message, Dragos disabled the compromised user account, terminated all open sessions, and prevented the hackers' infrastructure from accessing company resources.
The cybercriminal group also attempted to extort the firm by threatening to make the issue public in emails sent to CEOs, senior employees, and family members of Dragos who have public contacts.
One of the IP addresses specified in the IOCs is 144.202.42[.]216, earlier discovered hosting SystemBC malware and Cobalt Strike, both frequently used by ransomware gangs for remote access to compromised systems.
"While the external incident response firm and Dragos analysts feel the event is contained, this is an ongoing investigation. The data that was lost and likely to be made public because we chose not to pay the extortion is regrettable," Dragos said.
"Security, in all its forms, is a top priority for NextGen Healthcare. When we learned of the incident, we took steps to investigate and remediate, including working together with leading outside cybersecurity experts and notifying law enforcement. The individuals known to be impacted by this incident were notified on April 28, 2023, and we have offered them 24 months of free fraud detection and identity theft protection," company spokesperson Tami Andrade stated.
In regards to the information compromised in the data breach, the company confirms that their “investigation has revealed no evidence of any access or impact to any of your health or medical records or any health or medical data.” However, on being asked if the company has any means, such as records, to ascertain what data has been exfiltrated, Andrade declined to respond.
While reporting the issue to the Maine attorney general’s office, the firm noted that it was alerted of the suspicious activities on March 30. They further discovered that hackers had gained access to its networks between March 29 and April 14, 2023. According to the notification, the attackers used client credentials that "appear to have been stolen from other sources or incidents unrelated to NextGen" to log into its NextGen Office system, a cloud-based EHR and practice management solution.
Prior to this incident, in January, NextGen had witnessed a ransomware attack, reportedly conducted by the ALPHV ransomware gang (also known as BlackCat). Fragments of data stolen in the attack, such as employee names, addresses, phone numbers, and passport scans were apparently seen listed on ALPHV’s dark web leak site.
The darker the colour, the more number of infected devices. |