{"id":77274,"date":"2024-01-15T03:19:04","date_gmt":"2024-01-15T08:19:04","guid":{"rendered":"https:\/\/blog.cyberconservices.com\/?p=77274"},"modified":"2024-01-13T12:20:14","modified_gmt":"2024-01-13T17:20:14","slug":"swatting-becomes-latest-extortion-tactic-in-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2024\/01\/15\/swatting-becomes-latest-extortion-tactic-in-ransomware-attacks\/","title":{"rendered":"&#8216;Swatting&#8217; Becomes Latest Extortion Tactic in Ransomware Attacks"},"content":{"rendered":"<p><a class=\"Contributors-ContributorName\" href=\"https:\/\/www.darkreading.com\/author\/kristinabeek\" data-testid=\"contributor-name\">By Kristina Beek<\/a> &#8211;\u00a0<span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Using a tactic known as &#8220;swatting,&#8221; threat actors are\u00a0<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/ardent-health-hospitals-disrupted-after-ransomware-attack\" target=\"_blank\" rel=\"noopener\">targeting medical institutions<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">\u00a0via their patients, in order to convince hospitals to pay ransom demands.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Swatting is an extreme form of prank-calling in which calls are repeatedly made to the police about a certain individual \u2014 in this case patients \u2014 regarding bomb threats or other highly concerning allegations, leaving authorities no choice but to show up at these unknowing victims&#8217; homes heavily armed.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">These threat actors seem to think that putting this kind of pressure on US hospitals will\u00a0<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" href=\"https:\/\/www.darkreading.com\/cyber-risk\/healthcare-providers-and-hospitals-under-ransomware-s-siege\" target=\"_blank\" rel=\"noopener\">force a ransom payment<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> if it means patients will stop being targeted, such as when medical records were stolen from Fred Hutchinson Cancer Center in Seattle last November. The threat actors in that case threatened to heighten the stakes by targeting the center&#8217;s patients with the swatting technique.\u00a0\u00a0<\/span><a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/swatting-latest-extortion-tactic-ransomware-attacks&amp;ct=ga&amp;cd=CAEYACoTOTkyMjA4NTk0MjQ2NTUyNjExNTIaZjk1ZDdkNTc3NTkyZGUyMTpjb206ZW46VVM&amp;usg=AOvVaw1dawbNeTqrEtXt16W9xtnr\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors leave medical centers with the difficult choice of paying the ransom or witnessing patients suffer the consequences.<\/p>\n <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2024\/01\/15\/swatting-becomes-latest-extortion-tactic-in-ransomware-attacks\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a>","protected":false},"author":1,"featured_media":77275,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636,1269],"tags":[637,1270],"class_list":["post-77274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-swatting","tag-ransomware","tag-swatting"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.cyberconservices.com\/wp-content\/uploads\/2024\/01\/High-resolution-image-of-police-with-guns.png","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=77274"}],"version-history":[{"count":1,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77274\/revisions"}],"predecessor-version":[{"id":77277,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77274\/revisions\/77277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media\/77275"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=77274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=77274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=77274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}