DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Primary Health & Wellness Center, LLC’s public notice of ransomware incident

Posted on January 19, 2024 by Dissent

In the process of researching breach reports submitted to HHS, DataBreaches came across a public notice for an incident affecting Primary Health & Wellness Center, LLC in Maryland. The covered entity is to be commended for the details and transparency in their notice, although they do not name the threat actor/group involved or any details of any ransom demand received.  DataBreaches.net has not found this incident claimed by any ransomware group as yet. The incident was reported to HHS on December 17 as affecting 4,792 patients.


Public Notice

Published in The Baltimore Sun on December 20, 2023

Location

Baltimore County, Maryland

Notice Text

Patient HIPAA Notice Regarding Protected Health Information Primary Health & Wellness Center, LLC On October 20, 2023, Primary Health & Wellness Center, LLC (PHWC) identified that its network server was encrypted with ransomware. The server contained medical records for patients from 2018 to present. The data included patient names, addresses, dates of birth, Social Security Numbers, and medical records.

In response to this incident, PHWC retained a computer forensics incident response team, and the FBI was also notified.

Upon information and belief, the threat actor variant was Phobos, and the threat actor was able to encrypt the server through remote desktop.

The remote access was disabled and secured, and no further vulnerabilities were identified. Following examination, no definitive indicators of exfiltration of patient data or protective health information were observed. In addition, threat actors utilizing the Phobos ransomware are not known to exfiltrate patient data.

Although PHWC has no evidence that any patient data or protected health information was acquired, exfiltrated, or misused for the purpose of committing fraud or identity theft, PHWC is writing to formally report the incident and to provide patients guidance on what they can do to help protect their data. To date, there has been no indication that any patient data or protected health information was improperly utilized by any person.

PHWC has also taken steps to ensure that similar incidents do not occur in the future. However, as a precautionary measure, patients should remain vigilant to protect against potential fraud or identity theft by, among other things, reviewing their account statements and monitoring credit reports closely. Individuals should promptly report any suspected fraudulent activity or identity theft to proper law enforcement authorities. Patients may also wish to review the tips provided by the Federal Trade Commission on fraud alerts, security/credit freezes, and steps that they can take to avoid identity theft. PHWC is fully committed to the preservation of the confidentiality and security of patient data.

We take our responsibilities pursuant to the Health Information Portability and Accountability Act and the Maryland Confidentiality of Medical Records Act very seriously, and we genuinely apologize for this incident and inconvenience. If you have any questions or concerns regarding this matter, additional information is available via a confidential, toll-free inquiry line at 888-721-8267 from 9:00 a.m. to 9:00 p.m. Eastern Standard Time, Monday through Friday.

12/20/23 7549415

Category: Breach IncidentsHealth DataMalwareU.S.

Post navigation

← Raptor Technologies’ unsecured blob exposure was worse than they acknowledged. Here’s what we know — and don’t know — so far.
Owner of BreachedForums sentenced to time served plus 20 years supervised release with special conditions →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Akira doesn’t keep its promises to victims — SuspectFile
  • Fraudsters, murderers, students: who the GRU assembled a team of hacker provocateurs from and why it failed
  • Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack
  • Lower Merion School District says a data breach was caused by a computer glitch
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.