Break down the business value of Binary Defense services into dollars and cents

Threat Watch

Share on facebook
Share on twitter
Share on linkedin

Ransomware Operators Threaten to Leak 1.5TB of Supernus Pharmaceuticals Data

Last week, Supernus Pharmaceuticals confirmed they had fallen victim to a ransomware attack. It is believed that the attack took place in mid-November and allowed threat actors to steal large amounts of data from the company. The Hive ransomware group claimed responsibility for the attack on their leak site last week. Representatives from Supernus Pharmaceuticals stated that the attack did not severely impact operations and they were able to recover the impacted files. The company said they did not intend to pay the ransom, although members of the Hive ransomware group said they are still negotiating with the organization.


Organizations should initiate proactive measures to ensure they are protected from ransomware. The US DHS website,, has links to resources that help organizations protect their systems from intrusions that lead to ransomware. To protect against ransomware attacks, organizations should:
• Regularly back up data, air gap, and password protect backup copies offline.
• Ensure copies of critical data are not accessible for modification or deletion from the system where the data resides.
• Implement network segmentation.
• Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, secure location (i.e., hard drive, storage device, the cloud).
• Install updates/patch operating systems, software, and firmware as soon as practical after they are released.
• Implement monitoring of security events on employee workstations and servers, with a 24/7 Security Operations Center to detect threats and respond quickly.
• Use multifactor authentication where possible.
• Use strong passwords and regularly change passwords to network systems and accounts, implementing the shortest acceptable timeframe for password changes.
• Avoid reusing passwords for multiple accounts.
• Focus on cyber security awareness and training.
• Regularly provide users with training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities.