Subj : hackers targeting hospitals To : All From : August Abolins Date : Wed May 06 2020 06:48 pm Hello! https://krebsonsecurity.com/2020/05/europes-largest-private-hospital- operator-fresenius-hit-by-ransomware/ ==[begin]== 06 May 20 Europe's Largest Private Hospital Operator Fresenius Hit by Ransomware Fresenius, Europe's largest private hospital operator and a major provider of dialysis products and services that are in such high demand thanks to the COVID-19 pandemic, has been hit in a ransomware cyber attack on its technology systems. ==[end=== The article doesn't report HOW the ransomeware got triggered. But if it was by some cleverly disguised email/link originally in an employee's email, why can't the outbound email servers be configured to only allow valid domains? ..and thus sending the bogus ones to the bit bucket. WRT Email: Employees at places of work like the article describes, shouldn't even have access to email other than to company-related addresses. WRT WWW: An employee shouldn't even be able to access links that are designed to be phish-bait. Can't a company's local servers simply block all www domains except the ones approved? Eg. People at work don't need to access Facebook or expose company computers to malicious sites. ../|ug --- OpenXP 5.0.43 * Origin: (2:221/1.58) .