DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Was BrightStar Care attacked by two different groups — or was there only one breach?

Posted on February 2, 2024 by Dissent

On January 24, DataBreaches was contacted by a spokesperson for AlphV (“BlackCat”) to see if this site would be interested in reporting on a breach involving BrightStar Care (“BrightStar”). BrightStar had been added to their dark web leak site that day but without any proof of claim. The spokesperson was offering to show DataBreaches data that was described as containing a lot of patient information. Given that BrightStar offers a range of services for different needs, and has locations in most (but not all) states, any breach might involve patient data.  Before viewing any data, though, DataBreaches asked AlphV some questions, and learned that the attack was in early January, but it did not involve any encryption of files. AlphV’s spokesperson stated that they exfiltrated 24 GB of data from all of BrightStar Care’s four brands, obtaining “lots of confidential sensitive patient data.” They would later revise the claim about obtaining a lot of patient data.

Although BrightStar has four brands — BrightStar® Home Care, BrightStar® Senior Living, BrightStar Care Homes™, and BrightStar® Medical Staffing– each franchise office is independently owned and operated.  Whether patient data from all franchises is centrally stored with corporate providing security was, and remains unconfirmed by BrightStar.

In any event, the spokesperson claimed that they sent BrightStar the negotiation chat URL to use, but that BrightStar never responded at all, and so never even saw any price to delete data.  When DataBreaches asked how they could be sure that BrightStar ever saw the communication with the URL, they answered that the used Docusign, which provided a read receipt via email.

Image: DataBreaches.net

When DataBreaches inspected some of the data, it appeared to all be from an account on a server from the directory “Shelly Sun.” Shelly Sun is the CEO and co-founder of BrightStar. While the data appeared to contain some company-related files and documents as well as some personal information, there did not appear to be any patient databases or employee databases in the directory. As breaches went, this did not seem to be a particularly significant one in terms of potential impact.

Image: DataBreaches.net.

But on January 24, the same day AlphV listed BrightStar on their leak site, Sieged Sec posted something on Telegram channel with two screencaps as proof. Their post read, in part:  “oops, accidentally breached a healthcare company~  don’t worry, we won’t be leaking any data from healthcare again ^-^ but this 80GB of client and staff data looks pretty delicious~ ”

They also included a note to BrightStar Care:

dear BrightStar Care,
we’ve left a note in your files so you can secure your data.
yours truly, the gay cats at SiegedSec

DataBreaches reached out to SiegedSec, whose spokeperson expressed surprise. “I’m surprised to hear BlackCat’s breach is unrelated considering the timing, but I also wouldnt be surprised if BrightStar was breached twice,” they wrote.  In response to questions from DataBreaches, they volunteered that they breached the BrightStar Care branch, “specifically in Kentucky.” They were uncertain whether they only accessed an independently owned franchise or a central network for multiple franchises.

Neither SiegedSec nor AlphV were willing to reveal how they gained access to BrightStar.  And neither got any direct response from BrightStar to their communications, but SiegedSec believes that BrightStar “certainly took notice and fixed the initial access method after a couple of days from the attack,” adding, ” BrightStar hasn’t contacted or acknowledged me at all, despite leaving them my contact info. ”  Perhaps they thought thanking SiegedSec would be inappropriate.

When asked, AlphV’s spokesperson said that they, too, no longer had access.

Of note, and despite the wording of SiegedSec’s Telegram post, SiegedSec informed DataBreaches that they did not download any data. “I took a look around their files but I had no intention to keep their data.”

So will BrightStar decide that this is a reportable breach under HIPAA or not?  Unless DataBreaches missed some data, there may not be much PHI in the data AlphV claimed to exfiltrate.  And because DataBreaches did not examine every file in the AlphV data, this site could not determine whether the two files SiegedSec posted were also in the AlphV data.

Was this really one breach or was it, as claimed, two breaches by different threat actors?  DataBreaches would love to know if BrightStar would just respond to inquiries. DataBreaches called BrightStar this week and was told that there was no phone extension for any executives but the customer service representative would take a message and submit it. DataBreaches left a detailed message that this site was inquiring about two alleged data breaches by different criminal groups and that both had provided some data to support their claims.

No call or reply was received.


Related:

  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
Category: Breach IncidentsCommentaries and AnalysesHackHealth DataU.S.

Post navigation

← CT: Groton schools’ internet outage from ‘cyber-attack’ under investigation
Lurie Children’s Hospital took systems offline after cyberattack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • UK sanctions Russian cyber spies accused of facilitating murders
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India’s top exchange
  • Government will ‘robustly defend’ compensation claims from Afghans put at risk by data breach
  • Authorities released free decryptor for Phobos and 8base ransomware
  • Singapore Facing ‘Serious’ Cyberattack by Espionage Group With Alleged China Ties

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • 𝐔𝐠𝐚𝐧𝐝𝐚 𝐨𝐫𝐝𝐞𝐫𝐬 𝐆𝐨𝐨𝐠𝐥𝐞 𝐭𝐨 𝐫𝐞𝐠𝐢𝐬𝐭𝐞𝐫 𝐚𝐬 𝐚 𝐝𝐚𝐭𝐚‑𝐜𝐨𝐧𝐭𝐫𝐨𝐥𝐥𝐞𝐫 𝐰𝐢𝐭𝐡𝐢𝐧 𝟑𝟎 𝐝𝐚𝐲𝐬 𝐚𝐟𝐭𝐞𝐫 𝐥𝐚𝐧𝐝𝐦𝐚𝐫𝐤 𝐩𝐫𝐢𝐯𝐚𝐜𝐲 𝐫𝐮𝐥𝐢𝐧𝐠.
  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations
  • ICE is gaining access to trove of Medicaid records, adding new peril for immigrants
  • Microsoft can’t protect French data from US government access

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.