DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Inova Health notifies patients after law enforcement alerts them to breach that began in 2016 [UPDATED]

Posted on November 8, 2018 by Dissent


Inova Health has been notifying patients of a breach that law enforcement first alerted them to on September 5.

According to a notice on the Northern Virginia – Washington, D.C. – metro area health system’s site:

On September 5, 2018, we were advised by law enforcement that some of our patient records may have been accessed by an unauthorized person. Upon learning this, we immediately began an investigation to determine how the access occurred and engaged a leading forensic firm to determine what happened and what information may have been accessed. Our investigation determined that the unauthorized person obtained the login credentials of an Inova employee and used those credentials to access our billing system in January 2017 and between July and October 2017. The individual also accessed a limited number of paper billing records in December of 2016. The individual accessed certain patients’ information, including patient names, addresses, dates of birth, medical record numbers, and Social Security numbers. For a small number of patients, treatment information also may have been accessed.

In response to the incident, and in addition to offering free credit monitoring and identity protection services, Inova writes that they deeply regret the incident and are

enhancing our security processes, have put in place additional monitoring tools, are retraining employees about password security and securing sensitive information before leaving their desks unattended, have updated our policies regarding password complexity and limitations on transmission of information, and we are reviewing our policies and procedures.

Hopefully they are also going to be imposing stricter and more frequent password reset policies, as if the bad actor could access the billing system in January 2017 as well as July – October of 2017, it tells us that the employee did not change their password during that time period and the system did not require the employee to change their password.

DataBreaches.net called and emailed Inova yesterday to request clarification on a few points, including the number of patients affected or notified, and how the unauthorized individual was able to access paper records in 2016 — were they an employee or was there some other way in which they gained access?

DataBreaches.net received a pro forma response about the incident that did not answer either of the questions above, despite a second request. If Inova does answer those questions, this post will be updated.

UPDATE 1:  I heard back from Inova after publication of this post. It seems that  the unauthorized individual is alleged to be a former independent contractor. According to Inova’s spokesperson, his last day with Inova was in November of 2017. Their spokesperson adds,

We cannot provide specific information about the individual responsible, except that we are working with law enforcement in their on-going investigation. Inova serves more than two million patients each year and only a small percentage of that patient population was affected. Inova values its relationship with our patients and understands the importance of protecting patients’ information.

So maybe their password reset policies were adequate but the contractor’s access made those policies and passwords ineffective as a defense.

UPDATE 2:  The incident now appears on HHS’s breach tool as impacting 12,331 patients.

Inova’s notification to the Montana Attorney General’s Office appears below.

Inova-Health-System-Inova

Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Breach IncidentsHealth DataU.S.

Post navigation

← Sugar City recall petition delayed by county malware attack
Altus Baytown Hospital system hit by Dharma ransomware →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.