DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

22,000 dental patients’ info exposed on unsecured Eaglesoft FTP server

Posted on February 15, 2016 by Dissent

Eaglesoft software by Patterson Dental is a popular patient management system.  But just as one security researcher had concerns about patient data security in Henry Schein’s Dentrix G5 software, he’s also had concerns about Eaglesoft, albeit for different reasons.  He contacted this site on February 6 and notified CERT of  his concern:

Eaglesoft does seem to use a Connection String in the registry, and this can be changed, but it must also be changed in the database, and I can promise you NOBODY will change this. Eaglesoft has been using “dba” as a username and “sql” as a password for years and years and years. Changing this involves a bit of work, most dental IT guys will not ever be asked to change the BACKEND database password.

CERT has now issued a VU number for the report -VU#344432 – and will be contacting Eaglesoft to discuss the concern.

Also of concern, in the process of looking into Eaglesoft, the researcher discovered that some of Patterson Dental clients’ patient databases were unsecured on Eaglesoft’s FTP server.

DataBreaches.net sent a security alert/notification about the situation to Patterson Dental on February 6, and receiving no substantive acknowledgement, emailed them twice more over the next few days.  DataBreaches.net also notified – or attempted to notify – affected Eaglesoft clients to alert them that their patients’ data was exposed.

Information provided by the researcher indicated that the exposed databases included two from Canadian dental practices, one from a U.S. dental group, and one from a U.S. dentist employed by Patterson:

Timberlea Dental Clinic (Alberta, Canada): Approximately 2,300 patients had their information exposed, including patient ID, first and last name, age, responsible party, home telephone number, date of last visit, recall date, LPA, NPA, NRA, recall type, and recall status. DataBreaches.net attempted notification via their contact form but got no response. The researcher spoke to them a few days later.

Dr. M Stemalschuk (Canada): There were two files. One was password-protected. The other was a zip file with an Eaglesoft database with health and insurance information on approximately 15,000 patients: name, date of birth, address, telephone number, gender, marital status, employer, insurance carrier, and insurance member ID. The researcher also noted 10 SSN. Note: DataBreaches.net did not contact this practice because they had no email address on their website or contact form. The researcher called them.

Massachusetts General Hospital Dental Group had protected health information on some of its patients exposed in a transaction log. The data included patient first and last names, the provider’s name, the patient’s ID number, their date of birth, their Social Security number, gender, and chart ID number. All of the data were plain text. The researcher informs DataBreaches.net that there were 5,424 unique patient names in the database with 4,396 Social Security numbers. Their HIPAA compliance office thanked DataBreaches.net for notifying them and immediately launched an investigation.

Rob McCanon (CEREC specialist, Patterson Dental): a directory of almost three dozen named patients from 2009 was exposed. The files were image files (CDT), and the index was last updated in 2011. Because the researcher did not download or explore any of the individual CDT files, it is not known whether the image files also contained PHI such as patient names or if they were only images. DataBreaches.net notified Dr. McCanon via email, but received no response or acknowledgement.

By February 8, the FTP server was taken offline, but Patterson Dental has not responded to inquiries from this site asking:

  • For how long patient data had been left unsecured on the server,
  • How this happened,
  • How many patients, total, had PHI exposed or left vulnerable because of
    this error,
  • What Patterson Dental was doing in the way of notification and harm
    mitigation, and
  • Whether Patterson Dental would be reporting this incident to HHS.

If Patterson Dental does provide more information or if any of the affected clients provide more details, this post will be updated.

Correction: This post previously noted that the researcher had found 90 plaintext user passwords in Dr. Stemalschuk’ data. Post-publication, the researcher clarified that the plaintext passwords table found in Dr. M Stemalschuk’ database have been present in every Eaglesoft database he has analyzed, and that Eaglesoft version 17 and below stored these passwords in plaintext. There is no indication in this case, however, that Dr. Stemalshuk used these passwords. 



			
Category: Breach IncidentsExposureHealth DataSubcontractor

Post navigation

← The second rule of incident response is to follow the plan
FL: Radiology Regional Center Notifies Patients After Paper Records Fell Out of Vendor’s Truck →

3 thoughts on “22,000 dental patients’ info exposed on unsecured Eaglesoft FTP server”

  1. Darrell Pruitt says:
    February 15, 2016 at 11:45 am

    Good job, both of you.

  2. vlade says:
    February 22, 2016 at 4:44 pm

    In what circumstance would we use the FTP site

    1. Dissent says:
      February 22, 2016 at 7:14 pm

      If you’re a client of Patterson Dental using Eaglesoft, I suggest you ask them that question.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.