DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Pacific Alliance Medical Center notifies 266,123 patients of ransomware incident

Posted on August 19, 2017 by Dissent

From their web site, the following breach notification. According to their report to HHS, 266,123 patients were notified.

Notice of Data Breach

At Pacific Alliance Medical Center (PAMC), we understand that the confidentiality and security of medical and personal information is critically important, and we are committed to protecting it.  The purpose of this post is to notify patients and employees of a recent cyber incident that affected PAMC and may have resulted in a compromise of certain electronic files containing medical or personal information.

What Happened

On June 14, 2017, PAMC became aware that certain of its networked computer systems were being affected by a cyber incident.  PAMC suspects that the incident began on or shortly before that date.  Shortly after becoming aware of the issue, PAMC’s Information Technology Department completed a preliminary assessment and determined that certain networked computer systems had been infected by a computer virus that was encrypting (making unreadable) certain files on PAMC’s computer network.  PAMC promptly shut down its networked computer systems, initiated its incident response and recovery procedures, notified the Federal Bureau of Investigation, and began a forensic investigation under the direction of its counsel.  Since then, PAMC has decrypted (made readable again) the affected files and has taken action to restore the affected systems and prevent similar incidents from occurring.

There is no evidence to date that any unauthorized person has actually viewed, retrieved, copied, or deleted any medical or personal information.  Typically, this type of computer virus, known as ransomware, is used to deny access to data and disrupt operations in order to extract money from the data owners—and not to steal data.  However, this may not always be the case, and, therefore, as a precaution, PAMC has sent letters by mail to patients and employees whose medical or personal information may have been on servers affected by the virus.  PAMC has also notified the California Department of Public Health, the California Attorney General and the U.S. Department of Health and Human Services Office for Civil Rights of this incident.

What Information Was Involved

The medical and personal information on the servers affected by the virus included: names, demographic information, dates of birth, Social Security numbers, employment information, health insurance information, and health information, including, for example, treatment, diagnosis, and related information and medical images.

What We Are Doing

We have strengthened our virus detection and other systems and safeguards to prevent unauthorized persons from gaining access to our systems. We have also taken other steps to try to prevent similar incidents in the future.  As an extra precautionary measure, PAMC has provided potentially affected individuals with access to identity theft protection services for two years at no charge.  Instructions for enrolling in credit monitoring were included in the notification letters and can also be obtained by calling the toll-free number listed below.

What You Can Do

PAMC advises patients and employees to remain vigilant by regularly reviewing their account statements, monitoring free credit reports, and reporting to their financial institutions any suspicious activity.  Patients and employees may obtain a free copy of their credit report online at www.annualcreditreport.com, by calling toll-free 1-877-322-8228, or by mailing an Annual Credit Report Request Form (available at www.annualcreditreport.com) to: Annual Credit Report Request Service, P.O. Box 105281, Atlanta, GA, 30348-5281.

For More Information

PAMC has made available a toll-free number for patients and employees to call if they have any questions or wish to obtain additional information, (877) 890-9332.  The hotline operating hours are from 6am to 6pm PST, Monday through Friday, and 8am to 5pm PST, Saturday and Sunday, excluding major holidays.

PAMC takes the confidentiality and security of medical and personal information very seriously and will continue to take steps to prevent a similar incident from occurring in the future.


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
Category: Health DataMalwareU.S.

Post navigation

← UK: Anonymous hacker claims to have stolen the NHS medical records of 1.2million Brits
HBO hackers obtained all of HBO’s social media logins and GIPHY credentials →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.