DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WA: Behavior intervention specialist’s client records exposed in misconfigured database

Posted on January 11, 2016 by Dissent

On her web site, Patricia Mullen describes herself as a “behavior intervention specialist” and a  former special education teacher. According to her site, she has

worked in many school districts and agencies throughout the state of Washington consulting and training. Patricia is also a national trainer having presented to hundreds of foster parents, teachers, and providers throughout the United States and Canada.

Also according to her web site, she has been in private practice for the past 15 years, working with multi-aged children and their families on behavior issues. Her practice is located in Spokane, Washington.

Given the nature of her work, I might expect that although she does not appear to be a HIPAA-covered entity, records she might create involving any school consultation on a specific child might be covered under FERPA.

On December 20, Chris Vickery notified DataBreaches.net that he had discovered a misconfigured MongoDB database with Mullen’s data in it. Her files included data on 258 clients.

The database was not Mullen’s, however. It appeared to contain data from clients of a firm that is no longer in business, ZyphMartin. Other ZyphMartin clients who had data in the database included CDA Realtors, Dr. Culings (a dentist), Energized Learning, Meadow Wood, Modern Drywall, OLP Contracting, Richardson’s Garage, Studio Fit, and Ugly Fish.

Multiple attempts to reach Ms. Mullen by phone and through her on-site contact form beginning on December 20 were unsuccessful. Attempts to track down ZyphMartin led me to Brandon Martin, a former partner who had left ZyphMartin approximately four years ago, he estimated, but who recognized Ms. Mullen’s name as a client at the time he was there. Martin informed DataBreaches.net that after he left ZyphMartin, Todd Zyph became Zyph Design Co., and eventually sold his business to Design Spike, Inc. Whether Ms. Mullen or the other clients continued on as clients of DesignSpike, Inc. is unknown to DataBreaches.net.

After Brandon Martin helpfully reached out to Design Spike, the leaky database was secured, but Will Hall of Design Spike did not respond to several e-mails from DataBreaches.net asking questions about the database and whether Ms. Mullen and the others had been clients of Design Spike and/or were currently clients. The Design Spike web site does not list any of them in their list of clients.

As can be seen in a screen shot of an entry in Ms. Mullens files below, the personal information collected includes referring source, name, date of birth, ethnicity, e-mail address, emergency contact information, the name and phone number of the parent or guardian, information on the party responsible for the bill, the name of any social worker involved in the case and their phone number. Other files and documents are not being included in this report because they also contained personal information and reports.

A client record found in a misconfigured database. Redacted by Chris Vickery.
A client record found in a misconfigured database. Redacted by Chris Vickery.

That the database was the responsibility of Design Spike, Inc. seems very likely from the sequence of events and that when notified by Brandon Martin, the database was then secured.

But why didn’t Ms. Mullen respond to repeated attempts to alert her that her client data was exposed? Realizing that her web site copyright date was 2014, I had to consider the possibility that she might be ill, that the site may be an abandoned site, or that she might even be dead. There were no upcoming events listed on her calendar and a Google search on her name turned up no recent results.

And that led me to thinking about whether enough of us have made arrangements with others to secure or remove our data in the event something happens to us.  I hope Ms. Mullens is okay, but if she is, then why didn’t she respond to multiple notifications? And did she ever know that her client data was (still) in a database under the control of Design Spike. Do the other clients know? Has Design Spike notified them? There are many unanswered questions.

And one of the most important questions is: if these entities were no longer clients of Design Spike, why was their data still online?

 


Related:

  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Cyberattacks Paralyze Major Russian Restaurant Chains
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
Category: Breach IncidentsBusiness SectorExposureHealth DataU.S.

Post navigation

← Databases with voter information and the “database of ruin”
U.S. Education Dept. ripe for breach more devastating than OPM’s →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders
  • Paying cyberattackers is wrong, right? Should Taos County’s incident be an exception?
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Cyberattacks Paralyze Major Russian Restaurant Chains
  • France Travail: At least 340,000 job seekers victims of new hack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.