DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Atlanta neurological clinic notifies patients of ransomware attack AND an older hack

Posted on July 14, 2017 by Dissent

In the process of investigating a ransomware incident, Peachtree Neurological Clinic discovered an earlier hack going back to February 2016.  They posted the following notice on their web site:

Peachtree Neurological Clinic, P.C. (“PNC”) of Atlanta, Georgia has advised its patients of a privacy event that may have compromised certain personal information. The events are believed to be the result of criminal activity.

PNC’s computer system was recently infected by a ransomware virus that encrypted its electronic medical records (“EMR”) system containing its patients’ medical records. The ransomware demanded monetary payment from PNC in order to decrypt the files and allow them to regain access. PNC did not pay the ransom to the cyber criminals, but was instead able to restore its files and the functionality of its system through backup records. Subsequent scans of PNC’s computer system have shown no additional indications of the ransomware, and its investigation does not show any indication that the ransomware exfiltrated any data off its system. This incident also did not impair PNC’s ability to provide care to its patients.

Through its investigation of this incident, however, PNC discovered that its computer system previously had been accessed without its knowledge by unauthorized individuals not affiliated with PNC between February 2016 and May 2017. PNC is not able to confirm which, if any, files or patient information were accessed by these unauthorized individuals, but it is possible that they could have accessed PNC’s EMR system containing patient names, addresses, telephone numbers, social security numbers, dates of birth, driver’s license numbers, treatment or procedure information, prescription information, and/or healthcare insurance information.

Although the motive of these unauthorized individuals is unclear, and PNC cannot confirm whether they actually accessed or acquired any patient information, PNC has confirmed that they did at least gain access to its system. Therefore, out of an abundance of caution, PNC has notified all potentially affected individuals about this issue and offered them free identify theft protection services. It also has reported the incident to law enforcement and will cooperate with any investigation.

“We take patient privacy seriously, and are very sorry for any concern or inconvenience this incident has caused or may cause to anyone who has been affected,” said Dr. Lawrence Seiden, M.D., managing partner of PNC.

Those who believe they may have been affected by this incident may call PNC’s dedicated, toll-free incident response hotline at (866) 690-0768 for more information.

PNC is a medical care provider located in Atlanta, Georgia that treats a variety of neurological conditions and specializes in the treatment of migraines, dizziness, Parkinson’s disease, and multiple sclerosis.

I do not think I’d relish sending patients a notification of two security incidents like that. The number of patients impacted by each incident was not revealed in their statement, and the incident isn’t up on HHS’s breach tool yet, although it would seem likely that it will be. Actually, we should probably see TWO incident reports on the breach tool as these were separate incidents.

 

Related posts:

  • Peachtree Orthopedics alerts patients to cyberattack; third patient data breach in seven years
Category: HackHealth DataMalwareU.S.

Post navigation

← How about the truth, the WHOLE truth, and….. ?
Ashley Madison parent corp in proposed $11.2 million data breach settlement →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.