Skip to content

Biotech company Miltenyi recuperating from malware attack, focusing on COVID-19 research efforts

Company successfully handles and resolves separate instances of malware in its IT system, ensuring resumption of operations with no forecasted interruptions in order fulfillment.

Biotech company Miltenyi regains function after a malware attack, continuing to contribute to...
Biotech company Miltenyi regains function after a malware attack, continuing to contribute to COVID-19 research efforts

Biotech company Miltenyi recuperating from malware attack, focusing on COVID-19 research efforts

In the past two weeks, global biotech company Miltenyi Biotec, based in Germany, has disclosed cases of malware in its IT infrastructure. The malware strain believed to be responsible for the cyberattacks is Mount Locker ransomware, according to reports.

The healthcare industry has been a prime target for ransomware attacks this year, with 39% of the attacks tracked between December 31, 2019, and September 2020 targeting healthcare providers. Mount Locker, similar to Maze, discloses data if a ransom isn't paid, as reported by Bleeping Computer.

The group behind Mount Locker ransomware claimed to have breached Miltenyi Biotec on November 3. Files encrypted by Mount Locker receive .ReadManual.ID extensions. Engaging with a file triggers the loading of the ransom note named RecoveryManual.html.

Smaller players in the healthcare industry's supply chain often lack the IT and security support for sufficient prevention, making them vulnerable to such attacks. During the COVID-19 pandemic, the Cybersecurity and Infrastructure Security Agency (CISA) extended support for the healthcare industry through Operation Warp Speed.

CISA has also included more indicators of compromise and YARA Rules for Trickbot detection in their advisory. Trickbot is a known malware used as a precursor to ransomware attacks.

Despite the attack, Miltenyi Biotec has contained and recovered the affected systems. The company did not specify the malware strain found in its systems.

Healthcare providers continue to be a prime target for ransomware actors during the pandemic. Mike Towers, CISO at Takeda Pharmaceuticals, mentioned that the cyber containment part of recovery from attacks is usually the shortest, but recovery is the longest part. The company does not expect delays in manufacturing or distributing orders.

The FBI, Department of Homeland Security, and Department of Health and Human Services warned the healthcare industry about a widespread ransomware threat, likely Ryuk or Conti strains, in October. It is unclear whether this warning was related to the recent attack on Miltenyi Biotec.

Mount Locker uses ChaCha20 for file encryption and an embedded RSA-2048 public key for encryption key encryption. This method is designed to make it difficult for security teams to decrypt the files without the attackers' private key.

The statement was made during Druva's virtual Cloud Data Protection Summit. The summit aimed to discuss the challenges and solutions in data protection and cybersecurity in the cloud era.

Read also:

Latest

Inquiry

Investigation

BAW Acquired Platforms for Old Saab 9-3 and 9-5 Models from GM, Prior to Spyker's Purchase. BAW Exhibited Both Models, Sporting Different Designs at the Show.

Uncover: Query

Locate

Chinese auto manufacturer Huatai boldly challenges Porsche in the SUV market, showcasing bravery unseen in competitors like BYD as it offers a uniquely distinct new model.