DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Oregon Sports Medicine allegedly hit by 8Base threat actors

Posted on August 8, 2023 by Dissent

Oregon Sports Medicine was added to 8Base’s leak site today. No files or filetree was offered as any proof of claims, but the threat actors claim that they acquired:

Invoice
Receipts
Accounting documents
Personal data
Certificates
Employment contracts
A huge amount of confidential information
Confidentiality agreements
Personal files of patients
Another

The listing indicates that the data were downloaded today and will be published on August 13 (presumably if there is no payment by then).

DataBreaches sent an inquiry to Oregon Sports Medicine seeking confirmation or denial of the claims and additional information but no reply was received.

SOCRadar has a recent article on 8Base, a group that has been around since 2022 but has seemingly become more publicly active in recent months. The Hacker News also provides coverage that includes links to a number of articles about the group.

Oregon Sports Medicine is not the first medical entity listed by 8Base. They previously claimed to have attacked Redwood Lab Services, ER of Dallas, and Smyrna Pediatrics. All three of those were allegedly attacked in or about November of 2022 and leaked in December — before 8Base had a leak site. The mega.nz links where 8Base claimed to have uploaded the entities’s data was were removed by Mega.nz for gross violation of terms of service.

Listings by 8Base for three medical entities with descriptions of kinds of data exfiltrated.

None of those three victims have any reports on HHS’s public breach tool, and DataBreaches has never seen any press release, substitute notice, or notification from any of the three. Emails or contact form inquiries were sent (again in one case) on August 6, but none of the three have responded.

In addition to the three allegedly attacked last year, 8Base also claimed to have attacked Kansas Medical Center in June of this year. KMC did not respond to an email inquiry sent July 11. On some date unknown to DataBreaches, the listing was removed from 8Base’s site.

8Base claimed to have attacked Kansas Medical Center in June of 2023. The listing was subsequently removed.

No breach report from Kansas Medical Center appears on HHS’s public breach tool, and DataBreaches has found no press release, substitute notice, or any notification by KMC. DataBreaches sent a second inquiry to KMC on August 6, but again, no reply was received.

DataBreaches reached out to 8Base to ask if they still had any data or proof from the three listings that still appear on the leak site. If they provide any evidence, or if any of the named alleged victims reply to inquiries, DataBreaches will update this post,


Related:

  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Large medical lab in South Africa suffers multiple data breaches
  • From bad to worse: Doctor Alliance hacked again by same threat actor (2)
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
Category: Breach IncidentsHealth DataMalware

Post navigation

← Il: Cyberattack shuts down Bnei Brak hospital’s computers
Outrage at massive police data breach that saw the personal details of more than 10,000 PSNI officers and staff accidentally published online →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.