Once a network and devices fall prey to malware, hackers will encrypt the files and share the decryption keys until the victim pays the ransom
double-threat ransomware
Encrypt healthcare data and make a copy for themselves. Victims then receive a note demanding payment for decryption keys under threat of disclosure of data.
triple threat ransomware
Victims receive a ransom note demanding payment and threatening disclosure of protected data, but additionally patients also receive ransom notes.
Traditional Ransomware
Once a network and devices fall prey to malware, hackers will encrypt the files and share the decryption keys until the victim pays the ransom
double-threat ransomware
Encrypt healthcare data and make a copy for themselves. Victims then receive a note demanding payment for decryption keys under threat of disclosure of data.
triple threat ransomware
Victims receive a ransom note demanding payment and threatening disclosure of protected data, but additionally patients also receive ransom notes.