DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Did AssureCare Risk Management have another hacking incident?

Posted on September 20, 2011 by Dissent

Last month I noted a breach involving AssureCare Risk Management (ARM) that affected employees and their dependents at Reznick Group.  ARM had notified Reznick that there had been a series of attempted network intrusions coming from IPs overseas and even domestically.  In response to the intrusions, ARM contracted with Kroll to investigate the attacks that occurred at the beginning of the May.  Their description of the incident and Kroll’s findings are linked from ARM’s web site.  Kroll could not conclusively confirm  that unencrypted protected health information had not been copied by the intruders:

In the course of its analysis, Kroll found that unauthorized access by multiple external intruders was attempted successfully on or around, or between, May 9 and May 10, 2011. It appears likely, based on Kroll’s examination, that the unauthorized access originated from parties in China, Bulgaria and Texas. Kroll further determined that data stored by ARM on the Server included unencrypted personal health information (“PHI”) and possibly PHI in plain text. However, while the forensic examination revealed that the Server was accessed, it does not appear that PHI copied.

But the May intrusions may not have been the end of ARM’s problems with hackers.

An entry on HHS’s breach tool indicates that Ashley Industrial Molding, Inc. in Indiana reported a hacking incident involving ARM that reportedly occurred on August 9 – – months after the May intrusion and one month following Kroll’s report. The August incident reportedly affected 506 of Ashley’s benefits plan enrollees.

ARM’s breach resources do not reflect any additional incidents.

Neither ARM nor Ashley Industrial Molding responded to phone messages requesting information about this incident report, so no firm conclusions can be drawn about whether this really is another incident, and if so, were data actually accessed or acquired this time.

Update of October 13:  I’m beginning to suspect the date of the incident was a typo on HHS’s part as there’s been yet another report – this one from Gypsum Management and Supply – also listing AssureCare that mentions the May 9th date.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
Category: Health Data

Post navigation

← Are medical-data breaches overreported?
Mitsubishi Heavy Industries claims to of been hacked and mass infected →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.