DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

IN: St. Mary's Health: Patient information compromised in Email hack

Posted on March 8, 2015 by Dissent

Max Roll reports:

Around 4,400 people were recently sent letters by St. Mary’s Medical Center informing them of a cyber attack on several hospital employees’ email accounts that happened in January, according to Randy Capehart, St. Mary’s spokesperson.

Hackers gained access to health information contained in the emails, according to Capehart. Patient information was compromised, including name, date of birth, gender, date of service, insurance information, health information and Social Security numbers in some cases. Capehart said St. Mary’s immediately shut down the email accounts

“It’s not clear if their information was shared because the shutdown was so quick,” Capehart said.

Read more on Evansville Courier & Press.

A substitute notice on the medical center’s web site, linked from their home page, reads:

Substitute Notice – Hacking Attack Incident
03/05/2015

The privacy and security of patient information is of utmost importance to St. Mary’s Health (“St. Mary’s”), and it has implemented significant security measures to protect such information.  Regrettably, despite St. Mary’s efforts to safeguard patient information, a hacking attack has affected St. Mary’s patients and employees.

On December 3, 2014, St. Mary’s learned that several employees’ user names and passwords had been compromised as a result of an e-mail hacking attempt.  It immediately shut down the user names and passwords and launched an investigation into the matter.  After careful review, St. Mary’s learned on January 8, 2015, that employee e-mail accounts subject to the hacking attempt contained some personal information for approximately 4,400 individuals.

The personal health information in the e-mail account included patient name, date of birth, gender, date of service, insurance information, limited health information and, in some cases, social security numbers.  The hackers did not gain access to individual medical records or billing records.

Please be assured that St. Mary’s is taking steps to mitigate this incident by notifying affected individuals via letter, posting this substitute notice and providing notice to prominent media outlets in the area. Identity protection and monitoring services will be offered free of charge as appropriate for affected individuals.  Additionally, St. Mary’s is working with its e-mail service provider to evaluate ways to enhance its already robust security program. St. Mary’s will also provide additional education to employees regarding e-mail hacking attacks.

In addition to the steps that St. Mary’s has taken, affected individuals may wish to obtain a free credit report from each of the credit reporting bureaus – Equifax, Experian and TransUnion. The credit bureaus’ information is below:

Equifax                         800-525-6285                www.equifax.com

Experian                       888-397-3742                www.experian.com

TransUnion                   800-680-7289               www.transunion.com

St. Mary’s sincerely apologizes for any inconvenience this unfortunate incident may cause and assures all of its patients and employees that St. Mary’s is taking appropriate measures to avoid an incident of this nature happening in the future.

Should you have any questions regarding this matter, please contact the following toll-free number: 1-877-643-2062.

Category: Uncategorized

Post navigation

← Australia’s charges against Anonymous member accused of government hack changing again
CA: Hackers Breach Perspectives Website for Religious Classes →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.