This story from Cyber Security firm Huntress hits very close to home for me.

Let me set the stage:

You come to work every day in the medical field and you utilize various pieces of software to conduct patient care. One of those programs is a medical image viewer (xrays, 3D sans etc..). You use it so often that you are at this point dependent on it.

The program you just downloaded and installed is in fact NOT just the image viewer you wanted. It is part of an elaborate and well designed scheme that utilized email, a cloned website, and a co-opted installer to spread malware to your computer...in the office.

Uh oh....

Harden the Target, Stay Vigilant!

#realtechsupport #realcyber

Reflections on article tagged below: