DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

More breach news from the U.S. healthcare sector

Posted on May 11, 2023October 24, 2024 by Dissent

A small roundup of incidents from the past 24 hours, including some dark web disclosures

Uintah Basin Healthcare notifies patients of data breach discovered in November

Uintah Basin Healthcare (“UBH”) in Utah became aware of unusual activity in their network on November 7, 2022. They are first notifying patients who received care at UBH between March 2012 and November 2022 and whose information may have been accessed or acquired. 

The following personal and protected health information varied between individuals but may have been involved in the incident: name, date of birth, address, Social Security number, health insurance information, and certain clinical details including diagnosis/conditions, medications, test results, and procedure information.

Their full press notification can be found on their website.

Oyate Health Center notifies pharmacy patients of accidental disclosure

On March 8, Oyate Health Center in South Dakota discovered that some office supplies they had donated the previous day to a local non-profit contained a report of patients who used the center’s pharmacy during August 31, 2021 – September 8, 2021. The recipient realized the error and contacted them promptly. Information in the report included patients’ name, chart number, date of the pharmacy visit, and a diagnosis code related to the prescription the patient was refilling.

ASAS Health notifies 25,527 about cybersecurity incident

ASAS Health has notified 25,527 people of a cybersecurity incident on January 26, 2023. According to a copy of the notification provided by their external counsel to the Maine Attorney General’s Office, the Texas-based medical group has been unable to definitively determine whether and what information was actually accessed or subsequently compromised, but the types of information potentially include:

Name • Date of birth • Address • Phone number • Email address • Driver’s license number • SSN • Diagnosis • Disability Code • Medicare ID number • Health Plan Carrier Information • Financial information

BianLian Reveals Identity of More Victims, Still Masks Others

BianLian has been proving itself to be a serious threat to the healthcare sector in terms of the number of its attacks. This week, BianLian named Synergy Hematology Oncology Medical Associates in California on their leak site, claiming to have almost 200 GB of data from them. This medical group doesn’t seem to have a website and DataBreaches has not seen any press releases or anything by them about any breach.

BianLian also named Mercy Home in New York on their leak site and claims to have 553 GB of their data. There is no notice on mercyhomeny.org‘s website about any incident.

Although BianLian claims to have leaked the data from both of the above entities, neither download was working as of this morning.

BianLian has also named other medical entities from other countries. They have not yet named all of the U.S. medical entities on their site, including Murfreesboro Medical Clinic in Tennessee or the one DataBreaches suspects is North Shore Medical Labs. BianLian claims to have 60 GB of data from them. DataBreaches has emailed NSML to ask whether they were attacked because there is no notice on their site even though BianLian added the obfuscated listing on April 18. No reply was immediately available.

BianLian also hasn’t publicly named Earlens Corporation, although one of the listings appears to relate to that firm. They claim to have 2 TB of data from that victim.

AlphV (BlackCat) Starts Leaking Essen Medical Associates

AlphV appears to have started leaking data from Essen Medical Associates on its leak site. Originally added to the site on April 6, the bad actors posted an update this week that says, ‘We gave you time and went to a meeting. Our patience has run out.” They claim to have 2.6 TB of data.

Sadly, as soon as we hit “send” on this post, we’ll probably find yet more breaches in the healthcare sector.

 


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
Category: Breach IncidentsExposureHackHealth DataMalwarePaperU.S.

Post navigation

← NC: Gaston College still investigating February cyberattack; personal information stolen still being determined
Ransomware Encryption Rates Reach New Heights →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • BlackSuit ransomware site seized as part of Operation Checkmate
  • The day after XSS.is forum was seized, it struggles to come back online — but is it really them?
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders
  • Paying cyberattackers is wrong, right? Should Taos County’s incident be an exception? (1)
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.