Healthcare giant catering health, which manages 14 medical centers in Ohio, confirmed that the interlock ransomware group violated its network and stole data in a May Cyber attack.
Catering Health operates over 120 outpatient features and employs more than 15,000 people, including more than 1,800 physicians.
Healthcare network Noted in a Thursday statement Its network devices have been secured, and its team is now working on re -establishing communication channels with patients disrupted by outage launched by the previous month’s ransomware attack.
“The equipment and firmness mechanisms used by the third-party group have been erased, and all affected systems have been secured,” it said. “Intensive reviews of all systems were organized by external partners and our internal team, and all necessary safety protocols, including network segmentation, enhanced monitoring and all the necessary safety protocols including the updated access control.”
Catering Health revealed the cyber attack on May 20, saying that the resulting outage left the medical staff without access to the computerized charting system and forced its care teams. Back to pen and paperWhile the cyber attack also affected its call center and some patient care systems, causing alternative procedures to cancel, the emergency rooms and clinics of the health giant remained open.
On Monday, health network said Restored for its Electronic Health Record (EHR) system And is working to bring the Mychart Medical Record Application System online for patients and call centers.
The interlock ransomware gang claimed responsibility for the attack this week and published samples of allegedly stolen data, saying they exfilted 941 GB files, including more than 20,000 folders with 732,489 documents, including sensitive information.

The alleged stolen information includes scans of identity documents including data, pharmacy and blood bank documents, bank reports, payroll information, files of health police personnel and passports.
Interlock is a relatively new ransomware operation that emerged in September and took responsibility for several attacks on victims worldwide, many of which were against healthcare organizations.
This cybercrime gang is also associated with clickfix attacks, including IT equipment to achieve initial access to the network of its goals. Interlock operators have also deployed an already unknown remote access Trojan (RAT) in the name Nodesanek in attacks against Universities in the UK.
Recently, interlock claimed a violation of Davita, a fate 500 kidney care provider, operating more than 2,600 dialysis centers across the United States, leaked 1.5 terrabite data allegedly stolen from the victim’s compromise systems.