DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Atlantic Dialysis Management Services notifies patients of data security incident

Posted on August 16, 2022 by Dissent

On August 5, Atlantic Dialysis Management Services (ADMS) in New York issued a press release that no longer appears to be available on any of the sites that published it — with one exception. ADMS also posted a security incident notice on its website.

Their website notice reads, in part:

On June 9, 2022, Atlantic Dialysis Management Services, LLC (“ADMS”) discovered certain unauthorized activity within its computer systems.  Upon discovery, ADMS immediately secured its network, reset passwords, and engaged a third-party forensic firm to investigate the incident. Following a thorough investigation, ADMS confirmed that a limited amount of patient information may have been accessed in connection with this incident.  However, at this time, there is no indication whatsoever that any information has been misused or will be in the future.

And:

At this time, ADMS is not aware of any evidence to suggest that any information has been misused. However, ADMS was unable to rule out the possibility that the information could have been accessed. Therefore, in an abundance of caution, ADMS has partnered with third-party computer forensic company to perform a thorough review of the affected information to identify, and subsequently notify all potentially affected individuals.

On June 30, after seeing a listing on a leak site with some proof, DataBreaches had reached out to ADMS via the contact form on their website. They did not reply at all.

On July 20, the threat actors updated the leak site and leaked 812 mb of files from ADMS.  On July 22, DataBreaches reached out to ADMS again.  Again, they did not reply.

Yet on August 5, they issued a statement that did not mention that any patient data had been acquired at all – or leaked?  On August 5, they only stated that some limited patient information may have been accessed?

How can ADMS say that they could not rule out that some patient data had been accessed when they already had proof that not only had it been accessed, but it had been acquired and leaked?

How can they claim that their actions were in “an abundance of caution” when data was not only accessed but acquired and leaked?

The following is a screencap of a file that was leaked well before the date of ADMS’s breach notification. It has been redacted by DataBreaches, even though it appeared unredacted and freely available on a leak site.

This record, redacted by DataBreaches, displayed a patient’s name, address, telephone number, ethnicity, family members’ info, social security number, date of birth, health insurance policy numbers, and details of dialysis service on a specified date. .

ADMS’s press release of August 5 stated, in part:

The type of information contained within the affected data included patient names, addresses, social security numbers, dates of birth, medical diagnosis and treatment information, health insurance information, and prescription information.  Importantly, the information potentially impacted may vary for each individual, and may include all, or just one, of the above-listed types of information

Nowhere does ADMS’s statement of August 5  indicate that there was an extortion attempt in connection with this incident,  that some data had already been leaked on the internet, and that more might be leaked.

On August 14, DataBreaches contacted the group who had leaked the data to ask about ADMS’s claim that a “limited amount” of patient data may have been impacted. Snatch Team responded that they did have patient data, and then followed up by sending DataBreaches a sample with more than 400 files that have not yet been shared on the leak site. They inform DataBreaches that they still have more data from ADMS to leak on their site, although DataBreaches does not know the total amount of data they acquired or might leak.

Many of the files Snatch Team provided are scans of .pdf files. Many of the scanned .pdf files include research protocols with forms reporting “Serious Adverse Events” (SAE) experienced by research participants. Those files did not have patient’s names but from the description of the research protocol on the form, it was clear that the study participants were hemodialysis patients who had chronic kidney disease-associated pruritus. On each SAE report, one can also see the investigator’s name, the date of the report of the adverse event, the age of the participant experiencing the SAE, their date of birth, their gender, height, weight, and race, and what type of medical adverse event(s) they experienced and how they were treated for it.

Other scanned files in the sample included clinical procedure reports where the patients’ name, date of birth, and patient ID had been blacked out. Some files appeared to be batched medication summary reports where each page included a different patient by name, chart number, date, and prescribed medications.  And yet other files  contained more complete records with a patient’s name and details, such as an unredacted 6-page discharge summary for a named patient from a named medical center.

DataBreaches also noted Excel files with patient names, medication name and dosage from what appear to be studies as well .doc files with the names of patients participating in particular studies. Other ,doc files were blank forms used as part of the studies.

The names of patients participating in a few studies have been redacted by DataBreaches. The file also indicates whether the participating patients had any adverse events or serious adverse events.

The ADMS incident does not appear on HHS’s public breach tool at the time of this publication, so we do not know how many patients, total, ADMS has calculated were affected by the incident and require notification under HIPAA and HITECH.

DataBreaches does not know when Snatch Team will leak more data from ADMS, if they do, but as always, DataBreaches continues to urge entities to be more transparent in notifications and to alert people when data has already been leaked or is reasonably likely to be leaked. Saying only that protected health information “may have been accessed” seems deceptive when there is already proof some data has been acquired and leaked.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India's top exchange
Category: Breach IncidentsHack

Post navigation

← Chile: Empresa Nacional Del Petroleo spared from financial losses in BEC attack by alert bank
NY: Practice Resources, LLC notifies 942,138 patients after ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • WA: Cyber-attacks problem for small hospitals
  • Florida prison data breach exposes visitors’ contact information to inmates
  • Experian Wins Appeal to Send Data Breach Victim to Arbitration
  • ICANN sends breach notice to domain registrar Webnic about failure to deal with DNS abuse compliants properly
  • Canadian cybercriminal sentenced to a year in prison for NFT theft scheme
  • Oops! Catasauqua employees’ Social Security numbers, other data accidentally sent to government watchdog group
  • EU-wide Breach Notification Template on the Horizon
  • Sex toy maker Lovense caught leaking users’ email addresses and exposing accounts to takeovers
  • Hackers wipe out Rs 384 crore from Bengaluru cryptocurrency firm Neblio Technologies; firm says inside job
  • Intelligence cyberattack on Crimea. Documents confirming abduction of children from Ukraine found

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People
  • Searches of Your Private Data in the Cloud Amount to Illicit State Action
  • How a Tax Subpoena in Ohio Tests European Privacy Law
  • Cambodia moves to enact comprehensive data privacy law
  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.