American Associated Pharmacies (AAP), a major healthcare organization, was allegedly targeted by the ransomware group Embargo. This relatively new group claims to have encrypted AAP’s systems and stolen 1.5TB of sensitive data. Reports suggest that AAP paid $1.3 million to decrypt its systems, but the attackers now demand an additional $1.3 million to prevent the stolen data from being leaked on the dark web.
The company has not publicly confirmed the attack but has responded by resetting user passwords on its platforms, APIRx.com and RxAAP.com. According to Tech Radar, AAP said: “All user passwords associated with both APIRx.com and RxAAP.com have been reset, so existing credentials will no longer be valid to access the sites. Please click ‘forgot password’ on the login screen and follow the prompts accordingly to reset your password.”
The AAP case demonstrates the growing prevalence of double extortion attacks, where cybercriminals encrypt systems and steal sensitive data. This tactic increases the pressure on victims to pay, as the threat of public exposure looms large.
Read more: Report shows healthcare ransomware attacks are increasing
AAP’s response, password resets, is a necessary step, but it shows the importance of proactive measures over-reactive fixes. With the healthcare sector increasingly targeted, robust security protocols are essential.
Read more: Tips for cybersecurity in healthcare
The AAP case demonstrates that paying a ransom doesn’t guarantee an end to the crisis. Embargo’s additional demand for payment shows how attackers can exploit victims further.
The sensitive nature of healthcare data makes organizations like AAP attractive to ransomware groups. Stolen data can include patient records, financial details, and intellectual property, all of which can lead to lawsuits and regulatory scrutiny.
See also: HIPAA Compliant Email: The Definitive Guide
While no defense is foolproof, taking proactive measures can significantly reduce your risk and improve your ability to recover if an attack occurs.
Related: OCR releases ransomware prevention guidance
Ransomware can move laterally across a network, infecting multiple devices or servers. This is why disconnecting affected systems immediately is critical during an attack.
Learn more: Stopping the spread of a healthcare cyber attack
Recovery time depends on the extent of the attack, the availability of backups, and the robustness of the incident response plan. It can range from a few days to several weeks or months.