DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

BianLian hits a community services organization for adults with serious disabilities

Posted on September 7, 2022 by Dissent

Alegria Family Services (AFS) provides residential and community services to adults with developmental disabilities in New Mexico under a contract with the New Mexico Department of Health.

They are not a large organization with vast resources, yet BianLian decided they would target them with a ransomware attack. Maybe they saw a ZoomInfo listing showing $7 million in revenue and didn’t understand that funds from the state and federal government under Medicaid or other programs are not revenue the agency can reallocate. Providing community inclusion programs for severely disabled adults is not something people go into to make a profit or buy a Lambo. I wish ransomware groups learned to lay off these entities trying to make a real difference in people’s lives.

In a listing on their leak site, BianLian claimed they had acquired internal records, personnel-related files, and client data. They did not list how much data they exfiltrated in total.

BianLian’s listing did not provide any proof of claims, but AFS confirmed that they had suffered a ransomware attack by the group.

DataBreaches spoke with someone from AFS today. AFS was not sure they knew how BianLian had managed to gain access, but they knew that BianLian managed to evade AV protections by breaking files into small units. They also know that BianLian succeeded in locking AFS’s current files and even their cloud-based backup. And they say they know that they cannot pay BianLian’s ransom demand.

AFS was in the middle of running a backup when the ransomware was triggered, which was how the cloud backup was locked. They tell DataBreaches that they have a usable Windows backup created three days before the attack, but all archived files and records going back six years are in the locked cloud backup.

Despite the challenges, AFS made a somewhat extraordinary decision to personally call every single client to explain what happened to them. Given their clients’ cognitive challenges, they felt that a letter would not be appropriate, and they want to ensure that their clients and caretakers understand what happened.

Given their current caseload, they have about 100 phone calls to make to explain and ensure their clients understand.

And then, when that’s done, they’ll start trying to call every client they’ve had for the past six years. Locating those clients’ phone numbers to call them may not always be possible, and they may have to send letters or post a substitute notice, but they intend to try.

As of publication time, BianLian has not leaked data from AFS or a second entity in the healthcare space that it also claims to have attacked.


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Authorities released free decryptor for Phobos and 8base ransomware
Category: Health DataMalwareU.S.

Post navigation

← “Computer hacker steals sensitive information from 20,000 Christchurch hot pools customers” — NO. That’s NOT what happened.
“Bad faith, misunderstanding, or indifference?” Why do ransomware teams falsely insist victims have “revenue?” →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Justice Department Announces Coordinated Disruption Actions Against BlackSuit (Royal) Ransomware Operations
  • NL: Hackers breach cancer screening data of almost 500,000 women
  • Violent Crypto Crimes Surge in 2025 Amid Massive Data Leaks
  • Why Ransomware Attacks Are Decreasing in 2025
  • KR: Yes24, the largest Internet bookstore in Korea, suffered its second ransomware attack in two months
  • Korea wins world’s top hacking contest for 4th consecutive year
  • 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)
  • Bank of America Refused To Reimburse Georgia Customer After Hackers Hit Account. Then a News Station Showed Up.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Navigating Privacy Gaps and New Legal Requirements for Companies Processing Genetic Data
  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.