DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

“Team Orangeworm” claims to be dumping CarePartners’ data from 2018 breach

Posted on February 6, 2019 by Dissent

CarePartners Logo

In June, 2018, CarePartners, a home care service provider to Ontario’s Local Health Integration Networks (LHINs) and an Ontario-based community health care agency, revealed that they had been breached. The following month, after being contacted by the hackers, CBC News provided more details and reported that there was an extortion demand made by the hackers. At that time,  CBC reported

The company says its forensic investigation has so far identified 627 patient files and 886 employee records that were accessed. But the sample provided to CBC News appears to contain names and contact information for more than 80,000 patients alone.

CarePartners’ statement in July,  2018 indicated that they couldn’t confirm the accuracy of CBC’s claims.

Since July,  this blog did not spot any updates -until last night,  when DataBreaches.net was contacted by “team_orangeworm” who provided a link to a paste.  The CBC story had not named the hackers, and the “orangeworm” name is one used by Symantec in an April, 2018 report.  According to those contacting this site:

last year CarePartners was hacked by our group
all of their patient and company data was stolen as a result.

[…]

after giving CarePartners the benefit of the doubt, we have still not receieved the requested payment to not leak patients medical files. it seems they are not concerned with their patients privacy.

The hackers released two data dumps.  The first, an 891 MB compressed archive, was described as containing:

Company Financial documents
Hundreds of employee T4 statements (with SINS,DOB,Name,Address)
company banking information, accounts payable and wire transfers

That dump was described as  “just the first of 4 data dumps, the other 3 will be released soon.”  DataBreaches.net was unable to successfully download that dump after several attempts, and has emailed the hackers to ask if there is a mirror site.  Until data are obtained that can be examined and validated, it is still unconfirmed as to what the hackers may possess.

The second dump was described as an encrypted dump of  “CarePartners Patient Data” that includes:

over 80,000 complete patient medical files.
SINS, address, fullname, DOB, phone, health card numbers, medical conditions and treatments.

That patient file is  encrypted and “Team Orangeworm” advertises that the encryption key can be purchased for 5 BTC  by contacting them via a protonmail email address that they provide in the paste.

DataBreaches.net contacted CarePartners and requested comment on this latest development as well as some additional details about the original attack.  A spokesperson would not go beyond their media statements,  however, which now includes a statement on February 4 that states:

CarePartners reminds patients and employees that they continue to monitor their personal and personal health information, including online accounts.

The statement does not mention that the alleged hackers have been publicly dumping data or putting it up for sale.

CarePartners’ spokesperson declined to confirm or deny whether CarePartners would now pay any extortion demand or “request.”  He also declined to answer this site’s questions about whether the attack last year involved the kwampir trojan and whether the attackers had ever identified themselves as “Orangeworm,” or if that is something new.

Maybe the hackers will give me more information that CarePartners did. If they do, this post will be updated.

Update of February 8:  please see this post for more information on what was in the first data dump, which this site has now obtained.

 


Related:

  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Romanian prisoner hacks prison IT system in plot made for a Netflix movie
Category: HackHealth DataNon-U.S.

Post navigation

← Outdated software left municipal worker information exposed in 200 towns
Huddle House payment card breach could potentially impact 300,000 customers – researchers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.