DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Atlanta orthopedic group investigating whether they are TheDarkOverlord’s victim

Posted on June 29, 2016 by Dissent

On Sunday, DataBreaches.net reported on healthcare databases that are up for sale on the darknet in the RealDealMarket. The seller is “TheDarkOverlord,” who provided descriptions of the databases and samples, but did not name the victim entities. In a number of encrypted chats with the hacker since then, DataBreaches.net obtained additional information about the identity of the entity and emails sent to them.

Several days ago, DataBreaches.net reached out to the Athens Orthopedic Clinic in Atlanta after some investigating by this journalist and Justin Shafer suggested that AOC might be the victim identified as Healthcare Database (397,000 Patients) from Atlanta, Georgia.

DataBreaches.net provided AOC with some of the sample data as well as information derived from lightly redacted screenshots TheDarkOverlord had provided to this blogger (some of which were subsequently redacted more and included in my reporting for the Daily Dot).

At this time, I am not going to be specific about all the evidence/indicators I sent AOC, but today, DataBreaches.net received a statement from them:

“In the last 48 hours, we were made aware of a potential data breach relating to our online patient records. Today, we also received an email requesting that we comply with the hacker’s request (which has been published in various forms online.) We take the privacy of our patients very seriously, as well as the laws that guide patient privacy, and we are investigating what may have happened through the proper channels. When we have more information to share with you and your readers, we will be in touch.”
Kayo Elliott, CEO, Athens Orthopedic Center

DataBreaches.net asked them to clarify whether the email requesting compliance with the hacker’s request came from the alleged hacker (TheDarkOverlord) or another party. A spokesperson replied that, “The email sender did not identify him or herself as the hacker.”

AOC’s response appears inconsistent with TheDarkOverlord’s previous statements to this blogger and other journalists that the entities whose databases were up for sale are those who had not paid ransom demands. From AOC’s statement today, it might appear that AOC had no idea of anything until DataBreaches.net contacted them two days ago. But if they had previously received – and read – a ransom demand, they should have known already.

DataBreaches.net was able to contact TheDarkOverlord and asked for a response to AOC’s statement. He (they) acknowledged that they had sent a reminder email about the ransom earlier today, and that they had made it clear in the email that they were the hackers. They also disputed AOC’s statement that they first became aware of the breach 48 hours ago.

For now, DataBreaches.net is going to leave it there, but other than noting that we are convinced that AOC is the entity tied to the exposed database, I would note that  TheDarkOverlord was asked if he/they would provide this blogger with some proof that AOC had been aware of the breach before two days ago. If and when such proof is provided, DataBreaches.net will report on it. Any suggestion or possibility that AOC knew about this before this week and may have ignored it – or worse, tried to cover it up – is certainly a troubling one.

In the meantime, TheDarkOverlord informed DataBreaches.net that he intends to release another database today from a major Atlanta sports team.

 


Related:

  • UN Cybercrime Convention to be signed in Hanoi to tackle global offences
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Kaufman County's data breach was their second one in three weeks
  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
Category: Breach IncidentsHackHealth DataOf Note

Post navigation

← FTC closes 70 percent of data security investigations
TheDarkOverlord names the Farmington victim and releases data →

2 thoughts on “Atlanta orthopedic group investigating whether they are TheDarkOverlord’s victim”

  1. Jordana Ari says:
    June 29, 2016 at 4:02 pm

    What are the authorities doing to to stop thedarkoverlord?!?!?? This is getting so f$%ked up insane already.

    1. Justin Shafer says:
      June 29, 2016 at 6:48 pm

      How? The onion network? I heard you have to stay online for a LONG time for them to be able to out your ip address, and for all you know he has Tor ran through another computer, and more networks. Not easy to catch a guy like this, technologically speaking.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.