DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Atlanta neurological clinic notifies patients of ransomware attack AND an older hack

Posted on July 14, 2017 by Dissent

In the process of investigating a ransomware incident, Peachtree Neurological Clinic discovered an earlier hack going back to February 2016.  They posted the following notice on their web site:

Peachtree Neurological Clinic, P.C. (“PNC”) of Atlanta, Georgia has advised its patients of a privacy event that may have compromised certain personal information. The events are believed to be the result of criminal activity.

PNC’s computer system was recently infected by a ransomware virus that encrypted its electronic medical records (“EMR”) system containing its patients’ medical records. The ransomware demanded monetary payment from PNC in order to decrypt the files and allow them to regain access. PNC did not pay the ransom to the cyber criminals, but was instead able to restore its files and the functionality of its system through backup records. Subsequent scans of PNC’s computer system have shown no additional indications of the ransomware, and its investigation does not show any indication that the ransomware exfiltrated any data off its system. This incident also did not impair PNC’s ability to provide care to its patients.

Through its investigation of this incident, however, PNC discovered that its computer system previously had been accessed without its knowledge by unauthorized individuals not affiliated with PNC between February 2016 and May 2017. PNC is not able to confirm which, if any, files or patient information were accessed by these unauthorized individuals, but it is possible that they could have accessed PNC’s EMR system containing patient names, addresses, telephone numbers, social security numbers, dates of birth, driver’s license numbers, treatment or procedure information, prescription information, and/or healthcare insurance information.

Although the motive of these unauthorized individuals is unclear, and PNC cannot confirm whether they actually accessed or acquired any patient information, PNC has confirmed that they did at least gain access to its system. Therefore, out of an abundance of caution, PNC has notified all potentially affected individuals about this issue and offered them free identify theft protection services. It also has reported the incident to law enforcement and will cooperate with any investigation.

“We take patient privacy seriously, and are very sorry for any concern or inconvenience this incident has caused or may cause to anyone who has been affected,” said Dr. Lawrence Seiden, M.D., managing partner of PNC.

Those who believe they may have been affected by this incident may call PNC’s dedicated, toll-free incident response hotline at (866) 690-0768 for more information.

PNC is a medical care provider located in Atlanta, Georgia that treats a variety of neurological conditions and specializes in the treatment of migraines, dizziness, Parkinson’s disease, and multiple sclerosis.

I do not think I’d relish sending patients a notification of two security incidents like that. The number of patients impacted by each incident was not revealed in their statement, and the incident isn’t up on HHS’s breach tool yet, although it would seem likely that it will be. Actually, we should probably see TWO incident reports on the breach tool as these were separate incidents.

 

Category: HackHealth DataMalwareU.S.

Post navigation

← How about the truth, the WHOLE truth, and….. ?
Ashley Madison parent corp in proposed $11.2 million data breach settlement →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.