According to sources, Group Health Cooperative (a Medical organization in Wisconsin) was hit with a cyber attack. It was first reported on 2024-04-10.

If You're in Wisconsin, You're at Increased Risk

Specialized Cybersecurity for Critical Infrastructure

Manage your organization’s attack surface with SecuLore’s passive cyber threat detection.

  • Asset Discovery
  • Vulnerability Assessments
  • Risk Prioritization
  • 24/7 Active Threat Detection

  • Continuous Monitoring

Source 1  |  2024-04-10

530k Impacted by Data Breach at Wisconsin Healthcare Organization

“Group Health Cooperative of South Central Wisconsin (GHC-SCW) has disclosed a ransomware attack that occurred on January 25, affecting over 530,000 individuals.“

“Although no file-encrypting ransomware was deployed, the attackers exfiltrated personal and protected health information, including names, addresses, Social Security numbers, and more. GHC-SCW confirmed the breach after the attackers claimed responsibility and contacted the organization.“

“While there’s no evidence of data misuse, GHC-SCW has been working with authorities, implementing enhanced security measures, and notifying affected individuals. The cybercrime group responsible for the attack, although unnamed by GHC-SCW, was listed as BlackSuit ransomware gang, known for targeting the healthcare sector“

Guarding Against Ransomware

  • August 16, 2023

    Ransomware is on the Rise Again: Defense Against New Players

  • November 9, 2022

    Ransomware’s Hidden Costs: What You Need To Know

  • August 11, 2021

    How to Prevent and Respond to Ransomware Attacks

  • January 25, 2017

    How to Defend Public Safety from Ransomware

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis