{"id":137697,"date":"2025-09-12T12:30:38","date_gmt":"2025-09-12T12:30:38","guid":{"rendered":"https:\/\/www.newsbeep.com\/au\/137697\/"},"modified":"2025-09-12T12:30:38","modified_gmt":"2025-09-12T12:30:38","slug":"killsec-ransomware-is-attacking-healthcare-institutions-in-brazil","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/au\/137697\/","title":{"rendered":"KillSec Ransomware is Attacking Healthcare Institutions in Brazil"},"content":{"rendered":"<p>                            Introduction<\/p>\n<p>On September 8, 2025, the notorious ransomware group KillSec claimed responsibility for a cyberattack on MedicSolution, a software solutions provider for the healthcare industry in Brazil. The group has threatened to leak sensitive data unless negotiations are initiated promptly.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/cab0334b2c78d59882daa19ab5adc413.png\" data-image=\"file-0\"\/><br \/>\nHealthcare IT Supply Chain as a Target<\/p>\n<p>The attack scenario via a critical supply chain IT vendor may put many healthcare organizations in Brazil at risk, especially their patients, as such systems aggregate massive amounts of sensitive personally identifiable information (PII).\u00a0Hackers attack supply chain because it allows them to compromise multiple targets efficiently and generate more profit through large-scale data theft, ransom demands, and payment diversion. The trusted relationships between organizations and their suppliers make these attacks both lucrative and difficult to defend against.\u00a0Supply chain attacks are often difficult to trace and can persist undetected for long periods, allowing hackers to maximize their gains before being discovered.\u00a0It is not clear whether KillSec Ransomware will pivot to attacking downstream healthcare organizations, but such a scenario is possible considering the trend with victims published on their DLS website on TOR.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/605279127d216d07861499de71dcc9f8.png\" data-image=\"file-0\"\/><\/p>\n<p>MedicSolution+ delivers intuitive, cloud-based software designed to &#13;<br \/>\nstreamline clinic and practice management. Our platform empowers &#13;<br \/>\nhealthcare professionals with real-time scheduling, multi-platform &#13;<br \/>\naccess, and robust data security, ensuring seamless operations and &#13;<br \/>\nenhanced patient care. Targeting clinics and medical professionals, &#13;<br \/>\nMedicSolution+ offers a user-friendly mobile app, intelligent &#13;<br \/>\nappointment systems, and scalable cloud storage, eliminating the need &#13;<br \/>\nfor costly infrastructure. Trusted by doctors for its simplicity and &#13;<br \/>\nreliability, MedicSolution+ transforms healthcare management with &#13;<br \/>\nmodern, secure, and accessible solutions.<\/p>\n<p>Notably, it is not the first time the ransomware group has targeted Brazil. Some time ago, the actors leaked personal and business data containing CNPJ\/CPF identifiers, transaction amounts, banking information, and other data from government resources in Brazil.\u00a0At that time, the group did not clarify the full scope of the breach or its possible source. KillSec Ransomware was known for both confirmed incidents and fakes or speculations.\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/0fea24b39306e805ebb04b751f8e5c98.png\" data-image=\"file-0\"\/><\/p>\n<p>Unfortunately, this time KillSec Ransomware hit Brazil hard.\u00a0Stolen healthcare data contain sensitive laboratory results reports, medical assessments, and other privacy-sensitive information.\u00a0Resecurity identified several patients and contacted them &#8211; none of whom was aware of this incident as of today.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/a04b4ca997fec1c89df030c41eaa5701.png\" data-image=\"file-0\"\/><\/p>\n<p>Cybercriminals use stolen data from healthcare institutions for extortion, understanding that it will cause significant damage not only to the victim organization but also to its end customers, given that numerous patients do not expect their information to be published online.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/d2c9cf051cd146756077bbf074411c0f.png\" data-image=\"file-0\"\/><\/p>\n<p>By attacking a major element of the healthcare IT supply chain, KillSec ransomware actors quadrupled their results compared to an attack against an individual target. By compromising a software vendor, they affected other healthcare institutions at scale. Resecurity observed documents belonging to local healthcare institutions and medical labs in Brazil, including, but not limited to, Vita Exame, Clinica Especo Vida, Centro Diagnostico Toledo, Labclinic, Laborat\u00f3rio Alvaro, and many others.<\/p>\n<p>Data Breach Scope<\/p>\n<p>The total volume of stolen data exceeds 34 GB, containing over 94,818 files. The compromised data include:<\/p>\n<p>&#8211;\u00a0Medical evaluations<br \/>&#8211;\u00a0Medical lab results<br \/>&#8211;\u00a0X-rays<br \/>&#8211;\u00a0Unredacted patient pictures, including those showing body parts<br \/>&#8211;\u00a0Records related to minors<\/p>\n<p>Critical Timing<\/p>\n<p>Notably, KillSec ransomware actors also targeted healthcare institutions in Colombia, Peru, and the United States a few days before Brazil. Such timing demonstrates the increasing interest of cybercriminals in the healthcare field.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/a2b788679b2df9d41655316301f23b37.png\" data-image=\"file-0\"\/><\/p>\n<p>Two days ago, actors announced the successful compromise of several notable healthcare organizations:<\/p>\n<p>&#8211;\u00a0Archer Health (USA)<br \/>&#8211;\u00a0Suiza Lab (Peru)<br \/>&#8211;\u00a0GoTelemedicina (Colombia)<br \/>&#8211;\u00a0eMedicoERP (Colombia)<\/p>\n<p>One month ago, the actors leaked data from Doctocliq, a prominent healthcare software platform in Peru that serves over 3,500 doctors across more than 20 countries. The platform is designed for medical and dental professionals.\u00a0In the past, the group also targeted the Royal Saudi Air Force (RSAF) and released several new leaks from sectors outside healthcare, including the compromise of Nathan and Nathan (UAE), an HR, staffing, and technology solutions provider, as well as Ava Senior Connect (USA), a communication platform designed for senior living communities.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/8b67a44120e45d1a6947cf6c69109436.png\" data-image=\"file-0\"\/><\/p>\n<p>Unfortunately, Brazil is the latest target of KillSec ransomware, resulting in significant privacy damage to its citizens.<\/p>\n<p>Root Cause of the Breach<\/p>\n<p>What do all these data breaches affecting healthcare organizations have in common? Resecurity was able to conduct an investigation based on available artifacts and locate stolen files stored in exposed AWS cloud buckets.\u00a0Our specialists from the HUNTER team were able to map the stolen data to specific S3 storage locations, and they had a listing of all exposed files in plaintext.\u00a0<\/p>\n<p>Notably, at the time of the ransomware claims, the issue had not been contained and the data remained vulnerable to remote exfiltration, which demonstrates substantial gaps in incident response and a lack of awareness among victim organizations operating in the healthcare field.\u00a0Resecurity reached out to the victim but received no response. To facilitate incident containment, our team has shared available\u00a0findings with <a href=\"https:\/\/cert.br\" target=\"_blank\" rel=\"nofollow noopener\">CERT.br <\/a>(Computer Emergency Response Team Brazil)\u00a0and the <a href=\"https:\/\/www.gov.br\/anpd\/pt-br\" target=\"_blank\" rel=\"nofollow noopener\">Autoridade Nacional de Prote\u00e7\u00e3o de Dados<\/a> (ANPD), which oversees LGPD compliance, investigates breaches, and imposes sanctions.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/d557bd8f688f6f08690e076e681c680f.png\" data-image=\"file-0\"\/><\/p>\n<p>KillSec Ransomware exploited &#8216;low-hanging fruit&#8217; to steal data without actual hacking or penetration into the IT environment. Based on their recent victim history, this vector appears to be frequently leveraged by them.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/55b4e4c11e6fe9dbbc9372e8aac15060.png\" data-image=\"file-0\"\/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/f235aeb7b43f1a92e2e34523b9d34000.png\" data-image=\"file-0\"\/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/au\/wp-content\/uploads\/2025\/09\/5702a53920e17f679da38d5d3425ad8c.png\" data-image=\"file-0\"\/><br \/>\nSignificance<\/p>\n<p>Resecurity is aware of one more victim from the healthcare sector in Brazil, which has not been disclosed today by KillSec Ransomware yet. The group may be developing a compromise and delaying publication to ensure the current victims can be properly monetized. Notably, at the beginning of September 2025, the actors released a record-breaking lineup of hacks into healthcare organizations in the US and Latin America &#8211; by intensity and\u00a0the number of affected victims, compared to their previous activities.<\/p>\n<p>Unless the root cause of the incident becomes clear, the unfortunate side is that the ransomware group has already exfiltrated data and will likely use it in a hack-and-leak operation to extort patience and related organizations. This issue highlights the importance of cybersecurity audits aimed at uncovering possible vulnerabilities that could lead to data leakage and prevent potential damage at an early stage.<\/p>\n<p>Based on Resecurity&#8217;s analysis, KillSec Ransomware has found a sweet spot targeting healthcare organizations.\u00a0Healthcare organizations store vast amounts of sensitive and valuable data, including personal identification, medical histories, insurance details, and payment information. Hackers target these organizations because stolen medical records can be sold on the black market for significant sums. This makes healthcare data breaches highly lucrative for cybercriminals.<\/p>\n<p>Compliance and Preventative Measures<\/p>\n<p>Healthcare organizations are required to:<\/p>\n<p>&#8211;\u00a0Implement robust data protection policies and technical safeguards.<br \/>&#8211;\u00a0Obtain explicit consent for processing sensitive health data.<br \/>&#8211;\u00a0Limit access to authorized personnel.<br \/>&#8211;\u00a0Report breaches to the ANPD and affected individuals within three business days.<br \/>&#8211;\u00a0Regularly train staff and conduct security audits<\/p>\n<p>Resecurity also recommends implementing ongoing <a href=\"https:\/\/www.resecurity.com\/context\" target=\"_blank\" rel=\"nofollow noopener\">Cyber Threat Intelligence<\/a> gathering and <a href=\"https:\/\/www.resecurity.com\/risk\" target=\"_blank\" rel=\"nofollow noopener\">Digital Risk Monitoring<\/a>, especially aimed at detecting possible threats originating from third parties and the supply chain.\u00a0<\/p>\n<p>The rapid digital transformation in healthcare &#8211; such as the adoption of electronic medical records, connected medical devices, and cloud services &#8211; has expanded the attack surface. Many healthcare systems have legacy infrastructure and may lack robust cybersecurity defenses, making them easier targets for hackers. <\/p>\n<p><a href=\"https:\/\/www.resecurity.com\/easm\" target=\"_blank\" rel=\"nofollow noopener\">Attack surface management (ASM)<\/a> enables organizations to identify and mitigate vulnerabilities before attackers can exploit them. By continuously monitoring all digital assets &#8211;\u00a0such as servers, applications, and cloud services &#8211;\u00a0security teams can spot weaknesses early and address them, reducing the risk of cyberattacks.<\/p>\n<p>Resecurity is aware of the significant cyber threats facing companies in the healthcare industry worldwide. All companies in this sector face more significant threats than nearly any other industry.  This risk is compounded by the fact that many healthcare organizations are under financial distress. Although Resecurity\u2019s Risk platform is a cost-effective solution for companies and governments globally, some organizations lack the budget to enhance their security posture. Therefore, in Brazil, Resecurity is offering grants to healthcare companies that cannot typically afford robust CTI services like Risk. In some cases, these grants can cover 100% of the cost, enabling healthcare providers to better protect their company, staff, and patients from being victimized by breaches like the one described in this blog.<\/p>\n<p>Litigation Practice<\/p>\n<p>The litigation and enforcement landscape for data breaches in Brazil\u2019s healthcare sector is shaped primarily by the Lei Geral de Prote\u00e7\u00e3o de Dados (LGPD), Brazil\u2019s General Data Protection Law, which came into full effect in 2020. The LGPD applies to all organizations processing personal data in Brazil, with health data classified as \u201csensitive personal data\u201d and subject to heightened protection and stricter processing requirements.<\/p>\n<p>The main regulatory authority for data protection enforcement is the <a href=\"https:\/\/www.gov.br\/anpd\/pt-br\" target=\"_blank\" rel=\"nofollow noopener\">Autoridade Nacional de Prote\u00e7\u00e3o de Dados<\/a> (ANPD), which oversees LGPD compliance, investigates breaches, and imposes sanctions. Sector-specific regulators, such as the <a href=\"https:\/\/www.gov.br\/anvisa\/pt-br\" target=\"_blank\" rel=\"nofollow noopener\">Ag\u00eancia Nacional de Vigil\u00e2ncia Sanit\u00e1ria<\/a> (ANVISA) and the <a href=\"https:\/\/portal.cfm.org.br\" target=\"_blank\" rel=\"nofollow noopener\">Conselho Federal de Medicina<\/a> (CFM), also play roles in enforcing data security and confidentiality in healthcare in Brazil.<\/p>\n<p>Brazilian courts have generally sided with claimants in healthcare data breach cases, especially when fundamental rights to privacy are at stake. Courts often recognize the violation of privacy and emotional distress, awarding moral damages.\u00a0Courts frequently apply a strict liability standard to healthcare providers and insurers, holding them responsible for breaches regardless of intent, due to the sensitivity of health data.<\/p>\n<p>Notable Litigation Outcomes:<\/p>\n<p>Hospital Ransomware Case (2021): A major S\u00e3o Paulo hospital was found liable for failing to implement adequate security measures after a ransomware attack. The court ordered compensation ranging from R$5,000 to R$20,000 per claimant, depending on the extent of exposure and emotional distress.<\/p>\n<p>Health Insurance Data Leak (2022): A large insurer was ordered to pay collective moral damages and implement a comprehensive data protection compliance program, monitored by the ANPD.<\/p>\n<p>Public Health System (SUS) Data Exposure (2023): A breach affecting millions led to a court order for the Ministry of Health to enhance security protocols and pay collective damages to be distributed through public health initiatives.<\/p>\n<p>Documented Fines in the Healthcare Sector:<\/p>\n<p>The ANPD fined 15 healthcare institutions a total of BRL 12 million (~$2.4 million USD) for lacking encryption and breach response plans as a result of the\u00a02024 Healthcare Sector Audit. Additional corrective measures included mandatory penetration testing and staff training.\u00a0Since 2023, the ANPD has imposed over BRL 98 million (~$20 million USD) in fines across all sectors, with healthcare representing a significant portion due to repeated vulnerabilities and sector-wide audits.<\/p>\n<p>The ANPD\u2019s enforcement is robust and proactive, with a clear focus on healthcare due to the high risk and sensitivity of medical data. The risk of financial penalties, operational sanctions, and reputational harm is substantial for non-compliant organizations. In conclusion, litigation and regulatory enforcement for healthcare data breaches in Brazil are active and evolving, with courts and the ANPD imposing both financial and operational penalties to ensure compliance and protect patient privacy.<\/p>\n","protected":false},"excerpt":{"rendered":"Introduction On September 8, 2025, the notorious ransomware group KillSec claimed responsibility for a cyberattack on MedicSolution, a&hellip;\n","protected":false},"author":2,"featured_media":137698,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[64,63,137,500],"class_list":{"0":"post-137697","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-healthcare","8":"tag-au","9":"tag-australia","10":"tag-health","11":"tag-healthcare"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/137697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/comments?post=137697"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/posts\/137697\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media\/137698"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/media?parent=137697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/categories?post=137697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/au\/wp-json\/wp\/v2\/tags?post=137697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}