DataBreaches.net

DataBreaches.net

The Office of Inadequate Security

Menu
  • Breach Laws
  • About
  • Donate
  • Contact
  • Privacy
  • Transparency Reports
Menu

Kudos to North Mississippi Health Services for fast detection and disruption of attack

Posted on September 3, 2023 by Dissent

Kudos to the North Mississippi Health Services for rapid detection and interruption of a phishing attack.

In a website notice dated September 1, NMHS explains that on July 3, they discovered unauthorized access through an employee’s email account after a phishing email was unintentionally opened.

“Our Security Operation Committee (SOC) promptly shut down the system, ending the unauthorized access within 17 minutes. Upon investigation, it was determined some of the employee’s emails, which may have included attachments, were potentially accessed.,” they write.

The information in the attachments that may have been accessed was limited to patients’ names, dates of birth, primary physicians’ names, and diagnoses or dispositions upon recent discharge from North Mississippi Medical Center-Tupelo.

NMHS reports there is no evidence of misuse, and that they are notifying all affected patients and regulators.

You can read their entire website notice at https://www.nmhs.net/policies-notices/notice-of-data-incident/. And while they did not prevent the attack, their rapid detection and response really limited an attack that could have been much worse, so congratulations to them on that.

Related Posts:

  • Health Quest phishing incident in 2018 results in…
  • OH: UC Health to Notify Patients of Phishing Incident
  • CA: Notice to Individuals Regarding Privacy Incident…
  • NC: University of North Carolina at Chapel Hill…
  • Baptist Health Louisville notifies 880 patients…

Post navigation

← Maker of ‘smart’ chastity cage left users’ emails, passwords, and locations exposed
Update: Leak site with plastic surgery patients’ data and sexually explicit videos removed →

2 thoughts on “Kudos to North Mississippi Health Services for fast detection and disruption of attack”

  1. TOM Tracy says:
    September 8, 2023 at 9:28 am

    Which system was No. Miss using to detect the malware code that executed?

    1. Dissent says:
      September 8, 2023 at 9:58 am

      Good question. They usually don’t want to reveal details about their defenses, though.

Comments are closed.

Sponsored or Paid Posts

This site doesn’t accept sponsored posts and doesn’t respond to requests about them.

Have a News Tip?

Email:

Breaches[at]Protonmail.ch
Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Telegram: @DissentDoe

Browse by News Section

Latest Posts

  • Seeking clarification on Maine’s data breach notification statute
  • East River Medical Imaging notifies 605,809 patients of breach
  • Russian hackers exploiting Outlook bug to hijack Exchange accounts
  • Britain dismisses report claiming Sellafield nuclear site hacking, says no malware exists on our system
  • 23andMe data breach: Hackers accessed data of 6.9 million users
  • AlphV claims they have started contacting some of Tipalti’s clients (1)
  • Research: Privacy as Pretense: Empirically Mapping the Gap Between Legislative & Judicial Protections of Privacy
  • What it means — CitrixBleed ransomware group woes grow as over 60 credit unions, hospitals, financial services and more breached in US.

Please Donate

If you can, please donate XMR to our Monero wallet because the entities whose breaches we expose are definitely not supporting our work and are generally trying to chill our speech!

Donate- Scan QR Code   Donate!

Social Media

Find me on Infosec.Exchange.

I am also on Telegram @DissentDoe.

RSS

Grab the RSS Feed

Copyright

© 2009 – 2023, DataBreaches.net and DataBreaches LLC. All rights reserved.

HIGH PRAISE, INDEED!

“You translate “Nerd” into understandable “English” — Victor Gevers of GDI Foundation, talking about DataBreaches.net

©2023 DataBreaches.net