What's new

Trivia Medusa X PhilHealth -- Stolen PhilHealth Data Has Been Released

Philippine government agencies were not competent enough to secure their databases and this incident tells that our government cannot keep up with the digitalization.
 
Baka kinulang sa budget o redirected yung pambili ng antivirus kaya walang pambili ng antivirus? :unsure:

Stolen... Three points... Shoot sa bulsa... :oops:

Hindi natin sure..

Aayyy.. meron naman daw pala. Hahahaha

View attachment 2775007
Pala shoot... na naman... IT three points...

Dapat iyan ay planned ahead. Before mag-expire.

Foul. :whistle: Negligence violation...

Mag-change ka ba ng password 10 days before mag-expire ang password o gagawin mo sa 10 days +1...
 
Last edited:
Hindi naman sigoro magkaka virus kahit walang antivirus diba. Unless may privilege vulnerability o yung admin mismo nag run ng software na may palaman.
Ransomware attacks typically follow these steps to target and attack its victims:
1. Initial infection: The attacker gains access to the victim's device or network by exploiting a vulnerability, tricking the user into clicking on a malicious link or attachment, or through other means such as phishing emails or drive-by downloads.
2. Malware deployment: The attacker deploys the ransomware onto the victim's device or network. The malware can be hidden within seemingly harmless files, software, or even legitimate-looking websites.
3. Encryption: Once the ransomware is deployed, it begins encrypting the victim's files. It scans the system, identifying and locking files using a strong encryption algorithm. The encryption process often targets valuable files such as documents, images, videos, databases, etc.
4. Ransom note: After the encryption is complete, the ransomware displays a ransom note on the victim's screen. It informs the victim that their files have been encrypted and demands a ransom payment, typically in cryptocurrency, to provide the decryption key necessary to restore the files.
5. Contact and negotiation: The attacker may provide contact information (email, chat, etc.) for the victim to reach out to discuss the ransom payment and decryption process. Negotiations may occur on the ransom amount, payment method, and deadlines.
6. Ransom payment: If the victim agrees to pay the ransom, they follow the instructions provided by the attacker to make the payment, usually in Bitcoin or other cryptocurrencies that are difficult to trace. The payment is sent to the attacker's wallet.
7. Decryption: Once the attacker receives the payment, they may provide the decryption key, allowing the victim to regain access to their encrypted files. However, there is no guarantee that the attacker will provide the decryption key even after the payment.
It is important to note that paying the ransom does not guarantee the retrieval of files or complete removal of the ransomware. It is recommended to not negotiate or pay the ransom and instead seek professional advice, report the incident to authorities, and focus on restoring systems from backups.
 
Philippine government agencies were not competent enough to secure their databases and this incident tells that our government cannot keep up with the digitalization.
They can if they wanted to, but they don't because they don't care. If the government were treated the same as a commercial corporation, there should be a performance report based on customer feedback. However, there is nothing like that, and public funds are spoon-fed to them. If they could earn them through public points, there would be more quality.
 
Last edited:
They can if they wanted to, but they don't because they don't care. If the government were treated the same as a commercial corporation, there should be a performance report based on customer feedback. However, there is nothing like that, and public funds are spoon-fed to them. If they could earn them through public points, there would be more quality.
Lack of funding and corruption is the reason by which of course the blame pointed to the people who elected these corrupt officials.
 
Lack of funding and corruption is the reason by which of course the blame pointed to the people who elected these corrupt officials.
It's the system, not the people. It operates based on a set of rules that require updates for increased productivity. It's as if the Philippine system is still running on Windows XP while other nations have upgraded to Windows 10.
 
It's the system, not the people. It operates based on a set of rules that require updates for increased productivity. It's as if the Philippine system is still running on Windows XP while other nations have upgraded to Windows 10.
It was the people who manned the system hold accountable for the data leaks.
 
It's the system, not the people. It operates based on a set of rules that require updates for increased productivity. It's as if the Philippine system is still running on Windows XP while other nations have upgraded to Windows 10.
tas mahihirapan sila mag hire at kita ko parang Php 50k lang max pasahod nila. yung iba talaga sa abroad nalang may benefits din naman sila dun. Kahit sabihin na 50k + madaming gov benefits mas malaki parin ata kikitain nung nasa abroad, dagdag mo pa na mas ok na infra dun ng mga company vs ph gov infra.

It was the people who manned the system hold accountable for the data leaks.
sana paps may magbayad at may makulong. lalo yung nagsabi na 'bluff' lang yung nakuha ng medusa ransomware.
 
tas mahihirapan sila mag hire at kita ko parang Php 50k lang max pasahod nila. yung iba talaga sa abroad nalang may benefits din naman sila dun. Kahit sabihin na 50k + madaming gov benefits mas malaki parin ata kikitain nung nasa abroad, dagdag mo pa na mas ok na infra dun ng mga company vs ph gov infra.


sana paps may magbayad at may makulong. lalo yung nagsabi na 'bluff' lang yung nakuha ng medusa ransomware.
Kung may action sa senado, mapapanagot yan.
 

Similar threads

Back
Top