Ransomware is a major threat to all industries. In recent years, hackers have targeted businesses with ransomware, locking their data unless ransom is paid. In some cases, if the company refuses to comply, as seen in UnitedHealth Breach, where Hackers reportedly demanded $22 million, they threaten to leak stolen data online.
However, ransomware attacks are not limited to companies.
According to the latest FBI warning, they are also targeting employees, particularly business executives.
The agency warns that cybercriminals are sending letters of fear tor and threatens to release sensitive information from the victim unless ransom is paid.
Hackers at work (Kurt “Cyberguy” Knutsson)
What you need to know
The FBI is a warning Companies, particularly in the health sector, about fraud, including physical ransom letters sent via the US Postal Service. These letters falsely claim that they are from ransomware group Bianlian, and in exchange for not leaking data that appears to have been stolen, they request Bitcoin payments ranging from $150,000 to $500,000.
The letter, marked “time sensitive reads,” claims that the attacker gained access through social engineering and sensitive files. However, no evidence was provided, and the investigation found no signs of actual ransomware invasion in affected organizations. The characters appear to be templated only with minor variations and include QR codes linked to the Bitcoin wallet. There are also compromised passwords, which are likely to make the threat appear more reliable.
What is Artificial Intelligence (AI)?
These letters sent from Boston along with US flag stamps differ greatly in tone and wording with known Bian communications. Authorities believe this is a fear-based scam designed to pay ransom for violations that never happened.

People scrolling on their mobile phone (Kurt “Cyberguy” Knutsson)
Data deletion does something VPN doesn't: this is why you need both
The healthcare industry needs to tackle cybersecurity
Ransomware is a hit in healthcare It's even more difficult than ever. It is currently the third most targeted industry since finance and manufacturing, with attacks rising more than 32% between 2023 and 2024. These attacks don't just put data at risk. They also disrupt hospitals, slow care, and create confusion for doctors and patients.
Ascension Cyber Attack May 2024 is a clear example. Hackers have locked medical staff from critical systems and closed down phone lines and blocked tools needed for testing, procedures, and medication. Initially, violations were reported in an estimated 500 affected individuals, but by December, the number had jumped to nearly 5.6 million.
UnitedHealth Change Healthcare Unit Experienced Major data breach In February 2024, we further highlighted sector vulnerabilities. It was initially reported to have affected around 100 million people, but that number later rose to 190 million, making it the biggest medical data breach in US history.
This violation affected almost half the country's population. UnitedHealth argued that the attack was attributed to Russian-speaking ransomware group Alphv/Blackcat, and was later dismantled by law enforcement.
Click here to get your Fox business on the go

Woman using multiple devices (Kurt “Cyberguy” Knutsson)
Huge Healthcare Data Breach reveals confidential information on over 1 million Americans
Seven Ways to Avoid Ransomware Attacks (and Fake Ransomware Scams)
1. Install powerful antivirus software and update the software regularly. The first line of defense against ransomware is to ensure that your system is equipped with the latest security tools. Keep all your software and devices Latest To avoid vulnerabilities that hackers can exploit. Install the firewall and Powerful antivirus software Intrusion detection systems block malicious activities before they cause harm. Patch your operating systems and applications regularly to stay ahead of cybercrime. The best way to protect yourself from malicious links to install malware is to install powerful antivirus software on all your devices, as it may access your personal information. This protection can also warn you that it will phish email and ransomware fraud and keep your personal information and digital assets safe. Get the best 2025 Antivirus Protection Winners picks for Windows, Mac, Android and iOS devices.
2. Implement strong password policies and use a password manager. Make sure all passwords are unique and are at least 15 characters long, and include a mix of uppercase and lowercase letters, numbers and symbols. Also, consider using a password manager to securely generate and store complex passwords. This reduces the risk of password reuse and the weak password. This is a common entry point for ransomware attacks. Get my details Find the best expert reviewed password managers of 2025 here.
3. Educate and train employees on cybersecurity awareness: Many ransomware attacks start with phishing emails and social engineering tactics. As seen in fraud executives, attackers often use fear-based tactics to manipulate victims and act quickly. Train employees, especially high-level executives, to recognize suspicious emails, fraudulent requests, and phishing attempts.
4. Maintain backup data and a secure recovery plan. Data backup is an important protection against ransomware. Regularly back up important data to ensure a secure offline location where ransomware cannot access it. Testing your recovery plan will allow you to recover quickly in the event of an attack with minimal impact on your operations. Additionally, consider using a cloud service with encryption to ensure that your backups remain secure even if an attack occurs.
5. Two-factor authentication (2FA) is used. Two-factor authentication An important security measure that adds an additional layer of protection to sensitive systems and data. With 2FA, even if an attacker is able to obtain login credentials, whether it's a code sent to the phone or biometric authentication, it won't allow you to access critical systems without a second factor of authentication.
6. Check for threats before taking action. If you receive a ransom demand (digital or physical), investigate its validity. In many cases, fraud does not have proof of data breach or network compromise. Consult with a cybersecurity expert or law enforcement before responding.
7. Report suspicious activity: Notify law enforcement agencies or organizations such as the FBI Internet Crime Complaint Center if they encounter a fraud or ransomware threat. Reports will help authorities track and mitigate these activities.
The FBI warns about a dangerous new “smissing” scam targeting your phone
Important points of cart
When it comes to cybersecurity, healthcare is seriously behind. It's strange that so many medical institutions don't have CISOs or dedicated security teams. Instead, IT departments that aren't always trained in cybersecurity are stuck trying to handle everything. With so much delicate data at risk, it's shocking that many healthcare providers still treat cybersecurity as an afterthought.
Cyberattacks will only get worse, and it's only a matter of time before more hospitals, clinics and health systems get hit, unless the industry stepped on the game. It's time to take security seriously.
Click here to get the Fox News app
Do you think these companies are doing enough to protect your data? Is the government doing enough to catch the people behind cyberattacks? Write us and let us know cyberguy.com/contact.
For more information about my tech tips and security alerts, sign up for our free Cyberguy Report Newsletter cyberguy.com/newsletter.
Please ask Cart questions or tell us what stories you would like us to cover.
Follow your cart on his social channels:
Answers to the most accused Cyber Guy questions:
New from Cart:
Copyright 2025 cyberguy.com. Unauthorized reproduction is prohibited.


