I do ransomware response for really critical infrastructure - like electric power, water, transit systems, manufacturing, oil for a living. I have to be mostly be emotionally detached, even when lives are at risk - that's triage.

Sometimes, when nobody gets hurt I even raise an eyebrow or raise a glass at a new tactic. But let's make one thing clear:

If you ransom a children's cancer hospital, you are irredeemable scum. You know exactly what you're doing, and you chose to potentially delay or disrupt treatment for suffering little kids.

https://therecord.media/lurie-childrens-hospital-chicago-ransomware-rhysida?&web_view=true

Ransomware gang seeks $3.4 million after attacking children’s hospital

Lurie Children's Hospital in Chicago had announced a cybersecurity incident earlier this month. The attackers have claimed intrusions into more than a dozen other hospitals' networks.

People actually up in my thread like, "BuT Us HOSpiTAls R ProFITEEring" like both cannot be true, and like kids don't need chemo today.
I ain't got the time man, you don't come for kids around me.

@hacks4pancakes +1

I want CxO's and CISO be forced to pay for the emergency datarecovery, restore and mitigation measures with their own personal money!
https://infosec.space/@kkarhan/112419987210524570

Kevin Karhan :verified: (@[email protected])

@[email protected] the problem is that those who are in charge (i.e. #CISO) and those that could've prevented that (basically all the CxO's) chose not to. And as long as ransoms get paid and #ITsec as well as #InfoSec is not being deemed critical, [shit will continue]( https://infosec.space/@kkarhan/112419956348096557 ). Thus I don't blame the patients that basically got taken as *remote hostages* but rather the people that made this shite possible to begin with and that refuse to take #consequences from anything like this happening - not only to themselves but like competitors...

Infosec.Space