DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Vice Society claims to have acquired patient files from Atlanta Perinatal Associates

Posted on May 19, 2022 by Dissent

Attacks on small to medium-sized medical entities continue, as this week’s breach posts unfortunately attest. Today, Vice Society added Atlanta Perinatal Associates in Georgia to its leak site. As they have done in the past, Vice Society did not just add the medical practice with a warning or threat. When Vice Society adds an entity, they simultaneously dump a copy of all the data they claim they exfiltrated.

Preliminary inspection of the leaked files reveals that they did not leak any major EMR system or billing system, but they appear to have accessed patient records such as ultrasound testing. The files appeared to be from 2019 to early April 2022.

As is typical of ultrasound reports, the reports contain the patient’s name, date of birth, patient ID number, expected due date of delivery, referring physician, sonographer, and of course, the findings from the ultrasound. Each 6-page report also included the sonographer’s comments and detailed history with a review of systems, notation of any allergies, history of alcohol or smoking, family and social factors, and other health-related issues. The forms do not seem to include insurance information or Social Security numbers.

Top of ultrasound report; 6-page report. Redacted by DataBreaches.net

Other Obstetrics-related records were also found in the leaked files, as were files that included health insurance information. Yet other files included credit card information if the patient paid by credit card at the time of their visit or appointment.

Although the directory of folders included personnel-related or payroll-related folders, those folders appeared to be empty. A few direct deposit or payroll-related files were seen, however.

Atlanta Perinatal Associates was contacted via their website contact form earlier today but no reply has been received. DataBreaches also reached out to Vice Society via email to inquire whether they had encrypted Atlanta Perinatal’s files, and whether they could confirm that exfiltration occurred on or about April 9, 2022. This post will be updated if a response is received from either Atlanta Perinatal or Vice Society.

 


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
Category: Breach IncidentsHealth DataMalware

Post navigation

← [FLASH] #Conti Officially DisCONTInued
NYC Education Dept. will roll out its own online gradebook after security breach and data hack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.