DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Grace Lutheran Communities attacked by BlackCat; employee and resident data acquired

Posted on February 19, 2024 by Dissent

Grace Lutheran Foundation, which does business as Grace Lutheran Communities in Wisconsin, offers a variety of services including rehabilitation services, assisted living, skilled nursing, independent living, adult day services, and childcare. On February 9, they posted a notice about a data breach they discovered on January 22, 2024. They emphasized that there was no indication of misuse of any data, but they also noted that their ongoing investigation had already revealed that patient information was involved: name, address, Social Security number, and health insurance information.

The same day that they posted their notice, BlackCat added Grace Lutheran to their dark web leak site.

According to BlackCat’s blog post, they acquired 70 GB of data but allegedly after a few weeks of negotiations, Grace Lutheran Communities “refused to protect data of its employees and patients/customers unfortunately. That is why these data is being shared right now to public for free.”

BlackCat’s characterization of Grace Lutheran as “refusing to protect” is misleading. A chat log provided to DataBreaches with the understanding it would not be published or quoted directly does not show Grace Lutheran refusing to pay. It showed them agreeing to pay but then asking for more time to make the payment — and the negotiations falling apart after that.

Grace Lutheran stopped responding on February 6 and posted its breach notice three days later.

DataBreaches was also given access to preview the data leak. As claimed by BlackCat, it does appear to involve both employee and resident/patient personal and sensitive information. Many files incorporated patient names and dates as part of the filenames.

 Image: DataBreaches.net

Skimming the files in the tranche, DataBreaches found clinical notes on named patients and also complete records in .pdf format. For some patients, the medical record would be hundreds of pages long in .pdf format and with personal and protected health information.  Other patient files were briefer records. Employee-related records were also spotted in the tranche.

DataBreaches sent an inquiry to Grace Lutheran on February 17. They have not replied, but appear to have silently updated their security incident notice to include:

On February 17, 2024, we learned an unauthorized actor published data relating to the incident, to possibly include the personal information of Grace Lutheran employees and residents. We are working with our cybersecurity firm to address and remediate the publication of this data. We will promptly contact any individuals affected by this or any future release of confidential information by the actor.

Based on information on its website, Grace Lutheran appears to be a HIPAA-covered entity. There is no report listed on HHS at this time, but they are still within the 60-day window to notify. According to a spokesperson for BlackCat, the attack occurred on December 22, and they gained access through phishing and social engineering.  DataBreaches could not independently confirm that claim, nor BlackCat’s description of their security as being “like a piece of cake to us.”  In response to questions from DataBreaches, the spokesperson claimed they locked the network successfully without being detected.  “Several top level employees were contacted through calls to make them talk. No patients or employees being informed yet, because of our organisation’s internal reasons.”

One of the questions DataBreaches put to BlackCat was whether they regretted not taking Grace Lutheran’s offer during negotiations.

“The sum which was demanded was based upon company’s financial documents. We are not sure whether it was their purpose to stall negotiation process or not, but it definitely took to long for them to answer every single questions, which is unacceptable in such cases,” the spokesperson replied. According to the spokesperson, the initial price had been set at $750,000.  When Grace offered $435,000, BlackCat asked for $100k more. After that, there was a bit more negotiation and repeated mentions of needing more time. And then Grace Lutheran just stopped responding.

BlackCat’s spokesperson tells DataBreaches they have sent emails once again to Grace Lutheran management, but haven’t received any reply.

 

 

 


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
Category: Breach IncidentsHackHealth Data

Post navigation

← Developing: LockBit disrupted by law enforcement
Updating: In “Cronos,” law enforcement took down 34 Lockbit servers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app
  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.