en

KillSec Ransomware Attacks Healthcare

KillSec Ransomware Attacks Healthcare
Datami Newsroom
Datami Newsroom Datami Newsroom
Nov 18, 2025

The hacker group KillSec, founded in 2021, has recently made medical institutions a priority target. Since 2025, the KillSec ransomware has been actively attacking the IT systems of the healthcare sector in Latin America and other countries, marking the beginning of one of the most high-profile cyber incidents in recent years.

How it started

The key story is the breach of the Brazilian medical software provider MedicSolution. According to News Interpretation, hackers downloaded gigabytes of data from poorly protected cloud storages through misconfigured AWS S3 buckets. Some of the information remained accessible for months before being discovered.

As a result, tens of gigabytes and nearly 95,000 files were stolen — medical records, test results, X-rays, and even unprocessed patient photographs, including images involving children.

KillSec’s campaign extended beyond a single company: the case also encompasses attacks on medical organizations in other countries — named victims include Doctocliq and Suiza Lab (Peru), GoTelemedicina and eMedicoERP (Colombia), Medical File (Mexico), Ocuco (Ireland), and the U.S.-based Archer Health.

How it happens

According to Cyber Security News, the attackers’ modus operandi looks like this:

  1. Hackers find vulnerabilities on websites or open cloud buckets and gain access.
  2. Sometimes the victim is sent a forged document — when opened, a hidden command is executed that loads the encryptor directly into the computer’s RAM (i.e., without visible files on disk).
  3. Once inside the network, the attackers move laterally across servers using standard remote-access tools to collect and copy medical records.
  4. The stolen data is published on the Tor network to extort organizations and demand ransom.

Digital shield under attack – a symbol of the KillSec strike on medical systems.

Why is this particularly dangerous for healthcare

The loss or leakage of medical data entails serious reputational, financial, and legal consequences. In light of the intensifying cyberattacks, companies in the healthcare sector need to strengthen protection measures and regularly conduct audits of IT infrastructure security. 

This applies not only to large clinics — it is often easier for hackers to attack a hundred insufficiently protected small firms than a single major player: less public attention and higher chances of a successful extortion.

free_consultation

Fill out the form below, and we’ll get in touch with you right away to discuss a plan to protect your business!

Updated: 18.11.2025
(0 assessments, average 0/5.0)

Related content

Datami at the Barcelona Cybersecurity Congress 2025: New Horizons in Cybersecurity Datami Newsroom
Datami Newsroom

Datami at the Barcelona Cybersecurity Congress 2025: New Horizons in Cybersecurity

Datami took part in the Barcelona Cybersecurity Congress 2025, one of Europe’s key events dedicated to cybersecurity innovations and technologies.

Jun 3, 2025
TOP 5 Largest Cryptocurrency Hacks in History Datami Newsroom
Datami Newsroom

TOP 5 Largest Cryptocurrency Hacks in History

The cryptocurrency industry is still in its formative stage, and its highly complex technologies are not always adequately protected. In addition, inexperienced users often make serious mistakes in securing their assets. This creates various opportunities

Jun 3, 2025 4 min
Top 10 Cyberattacks That Brought Global Corporations to a Halt Datami Newsroom
Datami Newsroom

Top 10 Cyberattacks That Brought Global Corporations to a Halt

Cyberattacks today pose a serious threat not only to individual users but also to global corporations. Criminals use increasingly sophisticated methods, causing companies billions in losses and disrupting the operation of critical systems.

Jun 17, 2025 3 min
Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s Datami Newsroom
Datami Newsroom

Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s

Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.

Sep 5, 2025 2 min
Dangerous Calendar: A New Tool for Phishing Attacks Datami Newsroom
Datami Newsroom

Dangerous Calendar: A New Tool for Phishing Attacks

Did you know that an ordinary calendar can become a tool for a hacker attack? Google researchers discovered that the hacker group APT41 is using Google Calendar to send commands to infected systems.

Sep 2, 2025 3 min
Phishing is Evolving: What Are the Main Threats in 2025 and How to Counter Them Datami Newsroom
Datami Newsroom

Phishing is Evolving: What Are the Main Threats in 2025 and How to Counter Them

This method of digital deception has been known for several decades, yet it remains one of the most dangerous cyber threats for both individual users and companies. 75% of organizations worldwide encountered at least one phishing attempt.

Jun 20, 2025 3 min
Back to home page
Order a free consultation
We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy