Tuesday, 16 May 2023 13:28

Money Message Ransomware Group Hits PharMerica and Steals 5.8 million Patient Records

Written by

Reading time is around minutes.

The same Ransomware gang that hit MSI recently also appears to have hit Pharmacy services provider PharMerica and stole information on 5.8 million patents. The data that was exfiltrated as part of the attack includes social security numbers, full name and address, health insurance, medications, and date of birth. PharMerica disclosed the breach to the Maine Attorney General on March 12th, 2023.

The attack was identified on the 14th of March and finished on the 21st of March when the data theft was discovered. Affected individuals were not notified until May 12th. As is common, PharMerica is offering identity protection services for anyone that was part of the data stollen. Money Message is who claimed the attack on the 28th with a publication of some of the data that was stollen (like in the MSI breach). PharMerica had not publicly disclosed the type of attack that resulted in the data loss, but it now would appear to potentially have been ransomware related.

Money Message, in addition to MSI, has also claimed to have data from BrightSpring which merged with PharMerica in 2019, The 4.7 TB of data that Money Message stole was published in its entirety at the beginning of April when the clock ran out on the data disclosure clock. According to some reports the data is still available for download while someone else has made the data available on a hacking forum in smaller to download chunks.

Once again Ransomware is going to be a big thing in 2023 and into 2024, threat groups are working on new methods for deploying their wares. The leak of the Babuk source code and increased revenue sharing from Ransomware as a Service groups will put this into the forefront very quickly. There are ways to protect against it and ways to recover from it. The challenge is to stop it, before it can even start as recovery tools are no longer effective from data disclosure threats. Even if a company refuses to pay for the stollen data it just means that others are at risk and the data can be used for follow-on attacks. It is almost a no-win to some extent. For now, increased training, modern MDR/XDR and Network tools to monitor for data exfiltration are the best bet to head off this threat.

Read 774 times Last modified on Tuesday, 16 May 2023 13:29

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.