DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Parathon by JDA eHealth Systems hit by Akira? They haven’t responded to inquiries.

Posted on August 6, 2023 by Dissent

Visitors to Akira’s dark web leak site are greeted with a message:

Well, you are here. It means that you’re suffering from cyber incident right now. Think of our actions as an unscheduled forced audit of your network for vulnerabilities. Keep in mind that there is a fair price to make it all go away.

Do not rush to assess what is happening – we did it to you. The best thing you can do is to follow our instructions to get back to your daily routine, by cooperating with us you will minimize the damage that might be done.

Those who choose different path will be shamed here publicly. The functionality of this blog is extremely simple – enter the desired command in the input line and enjoy the juiciest information that corporations around the world wanted to stay confidential.

Remember. You are unable to recover without our help. Your data is already gone and cannot be traced to the place of final storage nor deleted by anyone besides us.

On August 1, Parathon by JDA eHealth Systems was added to Akira’s site with a note from Akira:  “We’re almost ready to share the 560GB of data we’ve taken from their network. Contracts, employee personal information, and confidential documents will be posted shortly.”

Listing on Akira’s leak site, Aug. 1. Image: DataBreaches.net

Akira did not reply to an inquiry sent to them by DataBreaches. Neither did Parathon, who was sent contact form inquiries on August 1 and again yesterday. So there is no proof from Akira and no denial or confirmation from Parathon.

Parathon is a revenue cycle management (RCM) business associate used by covered entities in the healthcare sector for billing patients and insurers and handling claims. Their software is available in a desktop model or web-tool model. It is not yet clear what Akira may have acquired in the way of personally identifiable information and/or protected health information of employees or patients.

If Parathon is a business associate to HIPAA-covered entities, their obligation is to notify any affected covered entities, who, in turn, have a duty to notify HHS of any reportable breach and to notify any affected patients. Depending on their contracts, Parathon might contact patients and/or HHS on behalf of one or more of the covered entities, but then again, maybe the covered entities will opt to do their own disclosures if there are any disclosures required.

A recent article by Arctic Wolf provides some helpful background on Akira. The firm’s incident response team notes, “In nearly all intrusions, the threat actors leveraged compromised credentials to obtain initial access to the victim’s environment. Notably, the majority of victim organizations did not have multi-factor authentication (MFA) enabled on their VPNs. It is unclear how the threat actors obtained the compromised credentials; however, it is plausible the threat actors purchased access or credentials on the dark web.”

Also of note, although Akira follows the Ransomware-as-a-Service (RaaS) model, they do not insist their victims pay for both a decryption key and the deletion of data they exfiltrated. According to Arctic Wolf, “Instead, Akira offers victims the opportunity to pick and choose what they would like to pay for. However, if a victim does not pay the ransom (ranging from $200K USD to over $4M USD based on Arctic Wolf® Incident Response’s insights) the victim’s name and data are published to Akira’s leak site.”

DataBreaches will continue to monitor the listing on the leak site and will update this post if more information becomes available. Inquiries were also sent yesterday to  NorthShore University HealthSystem and HonorHealth, two entities whose praise Parathon cites on its website, to ask them if Parathon had recently alerted them to any breaches. No replies have been received.

 


Related:

  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Breach IncidentsHealth DataMalwareSubcontractorU.S.

Post navigation

← Massive data breach could impact many who attended or worked for public schools in Colorado
New acoustic attack steals data from keystrokes with 95% accuracy →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.