DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Another business associate attack results in theft of patient data — Panorama Eyecare

Posted on July 11, 2023 by Dissent

Panorama Eyecare in Colorado is a physician-owned firm providing business associate services to vision care providers:

Services include information technology, human resources, finance, revenue cycle management, credentialing and payor contracting, marketing, and more. Image: Panoramaeyecare.com

Earlier today, the firm was added to LockBit’s leak site with a claim that 798 GB of data had been exfiltrated from four of the firm’s clients:

  • Eye Center of Northern Colorado
  • Denver Eye Surgeons
  • Cheyenne Eye Clinic & Surgery Center; and
  • 2020 Vision Center
    .
Listing on LockBit showed less than 4 days left on a countdown clock for Panorama Eyecare to pay or data would be leaked.
Listing shows that Panorama Eyecare has less than four days to pay an unspecified amount before data are leaked. Image: DataBreaches.net.

LockBit posted a number of screencaps as proof of claims and a number of them revealed patient information. Of the four entities/clients named by LockBit in the post, DataBreaches did not see any screencaps with patient data from either the Cheyenne Eye Clinic or the 2020 Vision Center, but “CEC” was a folder in a drive that LockBit claimed to have accessed. Skynet was also a folder on that drive, but LockBit made no claims about them.

Because some affiliates may lock and exfiltrate while others may skip the encryption and just exfiltrate data, it is not clear what happened in this case yet. None of the entities have posted any notices on their websites or issued any statements addressing the claimed attack as yet.

DataBreaches has sent inquiries to Panorama Eyecare, the Eye Center of Northern Colorado, Denver Eye Surgeons, and the 2020 Vision Center, but no replies have been received by publication.


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
Category: Breach IncidentsHealth DataMalwareSubcontractorU.S.

Post navigation

← Why gay furry hackers are leaking state government documents
8Base claims to have stolen patient data and employee info from Kansas Medical Center →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.