DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Follow-up: Investigation Confirms No Patient or Employee Information Compromised in Cyberattack on Appalachian Regional Health system

Posted on November 15, 2016 by Dissent

ARH has issued an update to its report of a ransomware attack that occurred in August:

After a thorough investigation into the late August cyberattack on the Appalachian Regional Healthcare (ARH) system, findings from independent computer forensic experts as well as federal authorities have determined that no ARH patient or employee health or financial information was compromised in the attack.

According to Mainstream Security (MS), the expert digital forensic team contracted to provide incident response and forensic investigation services during the incident, the ransomware incident that occurred on August 27 and kept the ARH  computer system down for nearly two weeks was identified through a combined forensics analysis by Mainstream Security, the United States Department of Homeland Security and the Federal Bureau of Investigation as a new malware that had not been previously observed by the DHS or the FBI.

The investigation determined that the malware which was used in the attack on ARH was designed to affect only computers that run on the Windows operating system. Mainstream Security says the malware was only able to access files on one ARH test server used to test certain software programs before they are rolled out to ARH’s hospital locations.  This test server did not house any health or personal information for ARH patients or employees.

According to Mainstream Security’s findings, the malware did not gain access to information on computers on the ARH network, which do not run on the Windows operating system, and no personal or protected health information (PHI) was accessed on those computers throughout ARH’s locations in eastern Kentucky and southern West Virginia.

The Mainstream Security team says that based on all factors they used in the investigation, “it is reasonable to conclude that no ARH PHI was acquired or viewed by the threat actors. Issues that caused the attack to be successful have been remediated and the threat actors no longer have access to the system. MS determined that there was no malware implanted that would allow future access. The threat actors only had access one day before the discovery and that access was only to a very limited set of files and none of these files included PHI of ARH.”

As the health system continues to move forward tighter security measures are in place, and ARH has contracted with SDG Blue, an experienced IT security organization with a focus on the recent Office for Civil Rights (OCR) Phase II HIPAA audits. SDG Blue will be completing annual HIPAA Security Risk Assessments, periodic firewall penetration testing, and upgrades to all the layers of security protection engineered to forestall threats and exposures in the internet of today.

“In this electronic age in which we operate, these types of occurrences are unfortunately becoming increasingly sophisticated, and no company – large or small – is fully immune. Thanks to the swift response of our ARH Information Technology team, this malware was quickly detected, and as a safeguard all ARH computers and web-based services were immediately shut down and remained down until we could fully investigate the nature and source of the attack,” ARH President and CEO Joe Grossman said. “We are proud of the manner in which our team handled this incident as well as the dedication and teamwork that was shown by our employees working throughout our ARH facilities as they rose to the occasion and demonstrated just how resilient our healthcare team can be no matter what challenge may come our way.”

SOURCE: Appalachian Regional Health, Nov. 15

Related posts:

  • Incident response shouldn’t include threatening the media, Saturday edition
  • Ca: Arnprior Regional Health determines Arnprior and District Family Health Team data caught up in IT system breach
Category: Health DataOf NoteU.S.

Post navigation

← Emblem Health notifies GHI members whose SSN was exposed in mailing labels
In: Data of 34 million Keralites leaked in massive data breach; govt had ignored vulnerability reports →

2 thoughts on “Follow-up: Investigation Confirms No Patient or Employee Information Compromised in Cyberattack on Appalachian Regional Health system”

  1. Theresa Defino says:
    November 25, 2016 at 8:28 pm

    Please provide a link to this statement. Thanks.

    1. Dissent says:
      November 25, 2016 at 8:42 pm

      You can find it on their web site.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Qantas customers involved in mammoth data breach
  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people
  • Terrible tales of opsec oversights: How cybercrooks get themselves caught
  • International Criminal Court hit with cyber attack during NATO summit
  • Pembroke Regional Hospital reported canceling appointments due to service delays from “an incident”
  • Iran-linked hackers threaten to release emails allegedly stolen from Trump associates
  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.