{"id":8646,"date":"2009-05-05T20:58:57","date_gmt":"2009-05-06T00:58:57","guid":{"rendered":"http:\/\/www.hothardware.com\/News\/Virginia-Patient-Records-Held-Hostage-by-Hackers"},"modified":"2009-05-05T20:58:57","modified_gmt":"2009-05-06T00:58:57","slug":"virginia-patient-records-held-hostage-by-hackers","status":"publish","type":"post","link":"https:\/\/computerhunter.us\/?p=8646","title":{"rendered":"Virginia Patient Records Held Hostage by Hackers"},"content":{"rendered":"<p>What we have here is a data breach of major proportions that&#8217;s been turned into data-napping, as well. According to a post on WikiLeaks, which you may recall is an online database of leaked documents, the hackers are asking for $10,000,000 to release 8,257,378 patient records and a total of 35,548,087 prescriptions. The hackers replaced the (more or less) secure site for the Virginia Prescription Monitoring Program with the following ransom demand: &#8220;I have your sh*t! In *my* possession, right now, are 8,257,378<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What we have here is a data breach of major proportions that&#8217;s been turned into data-napping, as well. According to a post on WikiLeaks, which you may recall is an online database of leaked documents, the hackers are asking for $10,000,000 to release 8,257,378 patient records and a total of 35,548,087 prescriptions. The hackers replaced the (more or less) secure site for the Virginia Prescription Monitoring Program with the following ransom demand: &#8220;I have your sh*t! In *my* possession, right now, are 8,257,378 <a href=\"https:\/\/computerhunter.us\/?p=8646\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8646","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/8646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8646"}],"version-history":[{"count":0,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/8646\/revisions"}],"wp:attachment":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}