Ransomware attack takes down health system network in Micronesia

Avatar

One of the four states that make up the Pacific nation of Micronesia is battling against ransomware hackers who have forced all of the computers used by its government health agency offline.

On Wednesday, the Department of Health Services for the state of Yap warned the island’s 12,000 residents that a ransomware attack hit its systems on March 11. 

“In response, the whole network was taken offline. As a result, the Department now doesn’t have internet connectivity, and all computers are returned off to prevent further damage,” officials said in a message on social media.  

The department is working with private IT contractors and other government agencies to get services back online, determine the extent of the infiltration and figure out what data has been breached.

“Email communication through the health servers and all digital health systems are shut down,” the department said in its statement. “The Department reassured the public that services are continuing but asked for your patience and understanding as the services will be slower than before due to the disruptions.”

Micronesia has a total population of more than 100,000 people spread across the states of Yap, Chuuk, Pohnpei and Kosrae — which comprise more than 600 islands. 

The island of Yap is north of Palau and south of Guam — both of which have drawn headlines in recent months for significant cyberattacks and ransomware incidents that impacted government services. Palau’s health ministry announced a ransomware attack just two weeks ago.

No hacking group has taken credit for the attack on Yap as of Thursday. Micronesia would be the latest of several Pacific islands impacted by ransomware, including Vanuatu, Tonga and the Philippines

Ransomware attacks continue to impact government agencies globally, with groups specifically targeting smaller governments that typically lack the resources to defend sprawling networks. 

CybercrimeGovernmentNews BriefsNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails

Next Post

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

Related Posts

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that could allow attackers to capture authentication credentials via pass-back attacks via Lightweight Directory Access Protocol (LDAP) and SMB/FTP services. "This pass-back style attack leverages a vulnerability that allows a malicious actor to alter the MFP's configuration and cause the MFP
Avatar
Read More

What PCI DSS v4 Really Means – Lessons from A&F Compliance Journey

Access on-demand webinar here Avoid a $100,000/month Compliance Disaster March 31, 2025: The Clock is Ticking. What if a single overlooked script could cost your business $100,000 per month in non-compliance fines? PCI DSS v4 is coming, and businesses handling payment card data must be prepared. Beyond fines, non-compliance exposes businesses to web skimming, third-party script attacks, and
Avatar
Read More