DICT: Hacked PhilHealth data spreading on app contains malware | Inquirer

DICT: Hacked PhilHealth data spreading on app contains malware

/ 11:48 AM October 10, 2023

DICT warns public that the leaked data of Philhealth contains malware

Cybercrime/hacking. STOCK IMAGE/INQUIRER FILES

MANILA, Philippines — The Department of Information and Communications Technology (DICT) is warning the public against accessing leaked data of the Philippine Health Insurance Corp. (PhilHealth) as it contains malicious software (malware).

DICT Secretary Ivan John Uy confirmed Tuesday that hackers used the messaging platform Telegram to spread the digitally stolen information from the system of PhilHealth to allow hackers to stay anonymous and difficult to trace.

Article continues after this advertisement

Uy said data with malware may put gadgets, apps, and other information at risk. A malware is an intrusive software used by cybercriminals to steal data or damage computer systems.

FEATURED STORIES

“Ang abiso ko po sa public ay ‘wag pong mag-access at ‘wag pong i-download ‘yung mga files na ‘yan dahil may na-diskubre po kami na mayroong backdoor at mayroong malware po ‘yung mga files na ‘yan,” Uy said in an interview with Radyo 630.

(My notice to the public is that do not access and do not download those files because we have discovered that there is a backdoor and that those files contain malware.)

Article continues after this advertisement

READ: PhilHealth data breach largest since ‘Comeleak’

Article continues after this advertisement

“So kung may mga tao na mag-download noon dahil curious sila at gustong malaman kung anong nandidiyan, ay mapapasukan po ‘yung sistema nila. May virus po na naka-karga sa mga files na ‘yan,” he also explained.

(So if there are people who download because they are curious and want to know what is there, their system will be breached. There is a virus loaded in those files.)

Article continues after this advertisement

Uy refused to give further details on how hackers sent the malware-loaded messages in an effort to keep the public away from harm: “Pinost nila sa Telegram, pero mas mabuti po siguro ‘wag na nating ituro at hahanapin nila [public] ‘yon.”

(They posted it on Telegram, but maybe it’s better not to point it out because they [public] will search for it.)

READ: PhilHealth pressed more to explain data theft, leakage

The DICT chief said that so far, they have not received any report regarding illegal usage of PhilHealth’s hacked data.

Uy further pointed out that the DICT has no means to take down tainted links, explaining: “In-app po kasi ‘yon. Ang mangyayari po diyan, magre-request tayo sa Telegram na sila ang mag-take down noon,” Uy noted.

(That’s because it’s in-app. What will happen there, we will make a request to Telegram that they should take it down.)

READ: PhilHealth blames hack on new procurement rules

He likewise reminded the public to ignore suspicious emails and texts because they might be phishing attempts.

PhilHealth shut down its website and online services on September 22 in response to a ransomware attack on its system. Clandestine group Medusa admitted hacking into PhilHealth computers and held the information it stole for a $300,000 (about P17 million) ransom.

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the and acknowledge that I have read the .

READ: Leaked PhilHealth data ‘staggering,’ says NPC

The DICT said PhilHealth’s website remains partially operational because the state insurer still needs to plug some vulnerabilities in the system to avoid another hacking incident.

kga
MOST READ
www
business
www
business
globalnation
TAGS: cybercrimes, DICT, malware, PhilHealth hacking, Telegram

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the and acknowledge that I have read the .

© Copyright 1997-2024 | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies.