DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Pain Care Specialists may be feeling the pain of a ransomware attack

Posted on September 22, 2023 by Dissent

It appears that Pain Care Specialists in Oregon became the victim of an attack by AlphV. The threat actors added the medical entity to their leak site earlier today with some files with personal information on employees and patients.

AlphV’s listing noted that the breach occurred on September 13, and, “As a result of our hack attack the network has been encrypted and over 150GB of sensitive data were stolen from there. Those data includes patient’s and employee’s medical records, social security numbers, employees ID’s, contracts, drug screens, payments and another sensitive info. In addition we have gained access to portals of federal medical regulation web-resources that allows managing of prescribed medicine and provides access to medical records of various individuals.”

Consistent with other leak site posts, AlphV demonstrates that they look at claims that sites make and then point out how named entities do not adhere to promises the entity makes. In this case, AlphV writes that Dr. Poly Chen:

violates their own policy which states that “Patients can expect that all communications and records about their care will be confidential, unless disclosure is allowed by law” We have faced complete indifference from Poly Chen, Yonguen Cho, David Keen, Donald Winder and other top management representative of this business. They are receiving and reading our messages but still refusing to answer.

AlphV gives Pain Care Specialists until September 26 to contact them or all the data will be freely leaked.

One of the proof of claim files contained prescription information on a named patient. Image and redaction: DataBreaches.net.

In an email to Dr. Chen and others on September 18, AlphV provided them with an update about data leaked from the network. In that email, a copy of which was openly cc:d to DataBreaches, AlphV claimed they had acquired:

– detailed information about employees (contracts, ssn, phone, home address, ID’s, drug screens, etc)
– doctor’s info (contracts, signatures, certificates, ssn, phone, home address, ID’s, etc)
– SCS/PNS/DRG Representative Information (phones, emails, etc)
– patient’s info (medical records, prescriptions, home address, contacts, ssn, etc)
– medical providers and controllers contacts
– partners and other business contacts
– access to electronical medical services (covermymeds, eCW/eMR, ORPDMP, and
– access to sensitive details about patients (phone numbers, SSN, medications given, etc, example below)

In addition to those claims, AlphV warned them that if they did not contact AlphV, “we will start informing contacts we found within your files about their data being leaked from your network. Of course we will make those calls exhausting for the subscribers we will be calling.” A list of names and phones numbers followed that.

AlphV followed that with a version of the carrot and the stick:

We are offering your management to pay us a fee for following services:

– we will provide tool to decrypt your files in case if you had no backup for them
– we guarantee complete deletion of your data from our servers
– we will provide data deletion log for your files from our servers
– we will give network improvement strategy which will help your IT security to become superior
– we will provide independent network penetration test of your network
– we guarantee you will never see us again

In case if management or representatives of “PainCare Specialists” will completely refuse to contact us until September 26th the opportunity to protect their data will expire and all the leaked data will be shared through web. When this happens a dozen of federal regulators will investigate your business slowing down your business processes, working licenses will be issued. Following reputation loss and possible court fines is higher than recovery fee we are offering you to pay.

It may be true that the amount being demanded might be less than certain incident response costs or consequences (the amount was not specified in the email and is not known to DataBreaches), but their statement seems to ignore the fact that the entity still has to notify and pay all those other incident response costs, and paying extortion just adds to the costs of the incident. Paying extortion or ransom demands does not seem to reduce the likelihood of litigation. Nor does it reduce the likelihood that regulators will investigate and either fine and/or impose a corrective action plan.

From the email, however, it is clear that AlphV claims to have locked them, so paying extortion may actually be cheaper than being down for days or weeks if they are unable to recover necessary files (that is, of course, assuming that they would be able to recover all their files if they pay). A maintenance notice on their website today indicates that they may be trying to deal with some issues.

Dear Friends,Please note that we will be experiencing phone and fax system downtime on Friday, September 22, 2023, from 6:00AM to 6:00PM due to system maintenance. Our phone and fax will not be available during this time. However, please use our alternative phone and fax below during the maintenance process. Phone: +1 971-208-9282 Fax: +1 971-600-9009 We apologize in advance for any inconvenience that may occur. Sincerely, Your Team at Pain Care Specialists of Oregon
A “notice of maintenance” appeared on Pain Care Specialists’ website on September 22. Image: DataBreaches.net

DataBreaches sent an email inquiry to Pain Care Specialists early today to ask whether they did have a backup that they could use to restore files, and to ask other questions about the scope of the breach. No reply has been received.


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
Category: Breach IncidentsHealth DataMalwareU.S.

Post navigation

← Leander ISD sends email about students’ vaccination status to over 200 people
National Student Clearinghouse notifies California on behalf of almost 900 schools affected by MOVEit breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • WA: Cyber-attacks problem for small hospitals
  • Florida prison data breach exposes visitors’ contact information to inmates
  • Experian Wins Appeal to Send Data Breach Victim to Arbitration
  • ICANN sends breach notice to domain registrar Webnic about failure to deal with DNS abuse compliants properly
  • Canadian cybercriminal sentenced to a year in prison for NFT theft scheme
  • Oops! Catasauqua employees’ Social Security numbers, other data accidentally sent to government watchdog group
  • EU-wide Breach Notification Template on the Horizon
  • Sex toy maker Lovense caught leaking users’ email addresses and exposing accounts to takeovers
  • Hackers wipe out Rs 384 crore from Bengaluru cryptocurrency firm Neblio Technologies; firm says inside job
  • Intelligence cyberattack on Crimea. Documents confirming abduction of children from Ukraine found

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People
  • Searches of Your Private Data in the Cloud Amount to Illicit State Action
  • How a Tax Subpoena in Ohio Tests European Privacy Law
  • Cambodia moves to enact comprehensive data privacy law
  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.