DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Another breach raises questions about the security of online health data

Posted on May 4, 2009 by Dissent

First it was an extortion demand made to  Express Scripts in October 2008, followed by similar threats to some of their clients that members’ personal information and prescription data would be exposed on the web if the company didn’t pay up.  Now the Virginia Department of Health Professions is also on the receiving end of an extortion demand, this one posted by a hacker on the secure site of the Virginia Prescription Monitoring Program:

ATTENTION VIRGINIA

I have your shit! In *my* possession, right now, are 8,257,378 patient records and a total of 35,548,087 prescriptions. Also, I made an encrypted backup and deleted the original. Unfortunately for Virginia, their backups seem to have gone missing, too. Uhoh 🙁

For $10 million, I will gladly send along the password. You have 7 days to decide. If by the end of 7 days, you decide not to pony up, I’ll go ahead and put this baby out on the market and accept the highest bid. Now I don’t know what all this shit is worth or who would pay for it, but I’m bettin’ someone will. Hell, if I can’t move the prescription data at the very least I can find a buyer for the personal data (name,age,address,social security #, driver’s license #).

Now I hear tell the Fucking Bunch of Idiots ain’t fond of payin out, but I suggest that policy be turned right the fuck around. When you boys get your act together, drop me a line at [email protected] and we can discuss the details such as account number, etc.

Until then, have a wonderful day, I know I will 😉

The extortion demand was posted on April 30th.

As Thomas Claburn of InformationWeek reports, this type of attack — accessing and acquiring data, encrypting it, then selling access to the former owner — has its own name: cryptoviral extortion. The attack may not be particularly devastating in the sense of losing data if the entity runs daily backups that are not stored on the network, but these attacks are devastating in terms of the acquisition and threat of exposure of tremendous amounts of personal information, even if the information does not contain Social Security numbers.

In the last 6 months, the prescription records of almost 60 million people may have been acquired — and may even be already circulating on the internet via chat rooms or carders’ forums. Neither Express Scripts nor Virginia have provided any additional information.

Under new provisions in the HITECH Act, entities basically need to either encrypt data or destroy it. While the provisions are raising eyebrows and concerns, these two breaches should serve as a cautionary tale of what happens when vast amounts of sensitive health information are left sitting in databases connected to the internet and are not encrypted at rest.


Related:

  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
  • They were victims of a massive data breach in 2009. Interior Health denied it for a decade.
  • Watsonville Community Hospital had a data breach -- or two. It would be helpful to know which.
Category: Health Data

Post navigation

← UK: Stolen laptops held details of 10,000
Ca: Teacher web site exposes student info →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.