DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

PA: May Eye Care notified 30,000 patients after ransomware incident

Posted on November 10, 2018 by Dissent

Ransomware continues to pose a major threat to covered entities, and not surprisingly, an incident reported to HHS in October by a Hanover, Pennsylvania eye care center turned out to be yet another ransomware incident. The practice kindly sent me a copy of the notification letter they sent to 30,000 patients:

Dear Sir or Madam,

May Eye Care, P.C. d/b/a The May Eye Care Center & Associates (May Eye Care Center) is subject to the breach notification rules of the Health Insurance Portability and Accountability Act of 1996, as amended (“HIPAA”).  HIPAA requires that covered entities provide notice to media outlets in a jurisdiction if that entity discovers a breach of electronic protected health information affecting 500 or more individuals in that jurisdiction. May Eye Care Center believes that such a breach occurred.  Please consider this letter as notice of this situation, as described below:

On July 29, 2018, May Eye Care Center’s server, including its electronic medical records system, was compromised by a ransomware attack.  The kinds of information stored on the server included patients’ names, dates of birth, addresses, diagnoses, clinical and treatment information, insurance details, and a limited number of Social Security numbers.

May Eye Care Center contracted a leading international computer forensics firm to assist with the investigation.  May Eye Care Center also notified the FBI of the ransomware attacks.   We have also engaged an information technology firm that specializes in computer security to review and enhance our security systems and protocols.

At this time, there is no evidence to suggest any patients’ protected health information has been directly accessed or used without their notification. In addition, we have already contacted all patients potentially impacted by this breach via personalized letter to alert them of what occurred and what precautions to take.

Because the breaching party may have had access to protected information, we want patients to take precautions to protect themselves from any potential additional use of this information.  We recommend taking the following steps:

•         Register a fraud alert with the three credit bureaus listed here; and order credit reports:
    Experian: (888) 397-3742; www.experian.com; PO Box 9532, Allen, TX 75013
    TransUnion: (800) 680-7289; www.transunion.com; Fraud Victim Assistance Division, PO Box 6790, Fullerton, CA  92834-6790
    Equifax: (800)525-6285; www.equifax.com; PO 740241, Atlanta, GA 30374-0241
•         Monitor account statements, EOBs, and credit bureau reports closely.   Free credit reports are available once a year by calling 1-877-322-8228 or visiting www.annualcreditreport.com.
•         Access helpful Web links to learn additional information on consumer protection when personal information is compromised. For example, American Health Information Management Association’s Medical Identity Theft Response Checklist for consumers:http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_039114.pdf

Additionally, if anyone believes that their information is being used in any unauthorized or fraudulent manner, immediately take the following steps:

•         Close any personal accounts that have been tampered with or fraudulently opened.
•         Notify your local police department
•         Report the incident to the Pennsylvania Attorney General’s Bureau of Consumer Protection by calling 1-800-441-2555.
•         Contact the Pennsylvania Department of Revenue Fraud Investigation Unit at 717-772-9297 or [email protected] for assistance in regard to any fraudulent tax returns
•         If a Social Security number is suspected of being used inappropriately, contact the Social Security Administration’s fraud hotline at (800) 269-0721.

We apologize for any inconvenience these incidents may cause.  Again, while we believe these attacks were targeted at our office for the purpose of obtaining monetary payments from May Eye Care, our primary concern is to make sure that patients have complete information and take all necessary precautions in the event that any personal information was compromised during this breach.

If you have any questions, please do not hesitate to contact our office at 888-607-0035 or you can send an email to [email protected].

May Eye Care, P.C.

By:
Carl J. May, Jr., MD

In follow-up communications, a spokesperson informed this site that they did not pay any ransom and were able to restore from backups without any data loss, although they lost a few days while addressing the situation.

Category: Health DataMalwareU.S.

Post navigation

← Security breach at Nordstrom involving contract worker breached employee data
Medical records of 1,216 Upstate University Hospital patients breached by former employee →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.