DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Atlanta neurological clinic notifies patients of ransomware attack AND an older hack

Posted on July 14, 2017 by Dissent

In the process of investigating a ransomware incident, Peachtree Neurological Clinic discovered an earlier hack going back to February 2016.  They posted the following notice on their web site:

Peachtree Neurological Clinic, P.C. (“PNC”) of Atlanta, Georgia has advised its patients of a privacy event that may have compromised certain personal information. The events are believed to be the result of criminal activity.

PNC’s computer system was recently infected by a ransomware virus that encrypted its electronic medical records (“EMR”) system containing its patients’ medical records. The ransomware demanded monetary payment from PNC in order to decrypt the files and allow them to regain access. PNC did not pay the ransom to the cyber criminals, but was instead able to restore its files and the functionality of its system through backup records. Subsequent scans of PNC’s computer system have shown no additional indications of the ransomware, and its investigation does not show any indication that the ransomware exfiltrated any data off its system. This incident also did not impair PNC’s ability to provide care to its patients.

Through its investigation of this incident, however, PNC discovered that its computer system previously had been accessed without its knowledge by unauthorized individuals not affiliated with PNC between February 2016 and May 2017. PNC is not able to confirm which, if any, files or patient information were accessed by these unauthorized individuals, but it is possible that they could have accessed PNC’s EMR system containing patient names, addresses, telephone numbers, social security numbers, dates of birth, driver’s license numbers, treatment or procedure information, prescription information, and/or healthcare insurance information.

Although the motive of these unauthorized individuals is unclear, and PNC cannot confirm whether they actually accessed or acquired any patient information, PNC has confirmed that they did at least gain access to its system. Therefore, out of an abundance of caution, PNC has notified all potentially affected individuals about this issue and offered them free identify theft protection services. It also has reported the incident to law enforcement and will cooperate with any investigation.

“We take patient privacy seriously, and are very sorry for any concern or inconvenience this incident has caused or may cause to anyone who has been affected,” said Dr. Lawrence Seiden, M.D., managing partner of PNC.

Those who believe they may have been affected by this incident may call PNC’s dedicated, toll-free incident response hotline at (866) 690-0768 for more information.

PNC is a medical care provider located in Atlanta, Georgia that treats a variety of neurological conditions and specializes in the treatment of migraines, dizziness, Parkinson’s disease, and multiple sclerosis.

I do not think I’d relish sending patients a notification of two security incidents like that. The number of patients impacted by each incident was not revealed in their statement, and the incident isn’t up on HHS’s breach tool yet, although it would seem likely that it will be. Actually, we should probably see TWO incident reports on the breach tool as these were separate incidents.

 

Category: HackHealth DataMalwareU.S.

Post navigation

← How about the truth, the WHOLE truth, and….. ?
Ashley Madison parent corp in proposed $11.2 million data breach settlement →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.