Russian hospital faces multi-day shutdown as pro-Ukraine group claims cyberattack

Avatar

A private hospital in the Russian republic of Chuvashia experienced a multi-day disruption this week likely linked to a cyberattack claimed by a pro-Ukraine hacker group.

On Tuesday, Lecardo Clinic announced a “technical failure” that led to a three-day shutdown of its operations. 

“We’re doing everything we can to restore our operations, but it’s taking longer than expected,” they said. “Once our software is fully restored, we’ll notify you.”

Although the hospital has not disclosed specifics about the cyber incident, local authorities confirmed the attackers targeted software used to manage patient records and medical histories. They also suspect that other private clinics using the same software may have had their data compromised.

The hacker group 4B1D claimed on Telegram that it gained access to the clinic’s network via the compromised account of the clinic’s director. The group said it then wiped the clinic’s servers, deleted backups, encrypted and exported patient data, and disabled more than 100 computers. The hospital and authorities have not commented on the hackers’ statement.

To support its claims, the hacker group posted some of the leaked data, including an X-ray of a skull, on its Telegram channel. According to the group, they obtained personal data of around 52,000 patients and medical staff, with approximately 2,000 records already being sold on the dark web. These records included patient names, phone numbers, service costs, and average bill amounts.

4B1D is a little-known threat actor active since at least January, claiming responsibility for attacks on various Russian companies, including tech firms and those involved in critical infrastructure.

Local media reported that Lecardo Clinic’s management failed to report the breach promptly to authorities. In addition, some of the clinic’s data was reportedly stored without proper security measures in place. In response, local prosecutors announced plans to investigate staff compliance with information security regulations. The company did not immediately respond to a request for comment.

The incident is part of a broader surge in cyber threats faced by Chuvashia, in the country’s west. In August, the republic’s digital ministry reported a significant increase in cyberattacks, with more than 2.7 million incidents successfully repelled in 2024 alone.

The day before the cyberattack on Lecardo Clinic, Chuvashia was the target of a Ukrainian drone strike for the first time since the start of the war in Ukraine. Local authorities said the drone hit an oil terminal in the region. It is not clear if the hackers intentionally conducted the attack following the drone strike.

NewsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations

Next Post

Feds charge 12 more suspects in RICO case over crypto crime spree

Related Posts

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV

Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also profiling attacker behavior. Security teams cannot be focused on just ticking boxes, they need to inhabit the attacker’s mindset. This is where AEV comes in. AEV (Adversarial Exposure Validation) is an advanced
Avatar
Read More

North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

The North Korea-linked threat actor known as Konni APT has been attributed to a phishing campaign targeting government entities in Ukraine, indicating the threat actor's targeting beyond Russia. Enterprise security firm Proofpoint said the end goal of the campaign is to collect intelligence on the "trajectory of the Russian invasion." "The group's interest in Ukraine follows historical targeting
Avatar
Read More