DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Georgia Spine and Orthopaedics of Atlanta notifies 7,012 patients after phishing attack

Posted on November 28, 2018 by Dissent

Another day, another successful phishing attack in the healthcare sector.  From the web site of Georgia Spine and Orthopaedics of Atlanta:

Georgia Spine and Orthopaedics of Atlanta (“GSO”) was a recent victim of an email “phishing” scam that resulted in unauthorized access to an employee’s email account. “Phishing” involves scammers sending emails that look legitimate, but in reality, are fraudulent. The emails often have malicious links or documents within them that, when accessed, allow the scammer to gain the email account/passwords – often without the knowledge of the email account owner. Companies all over the world are faced with the threat of phishing scams every day, as scammers get more and more sophisticated.

Unfortunately, phishing scams are hard to detect. Upon discovery of the incident, we promptly terminated the unauthorized access. We also engaged outside technical and legal experts to investigate the incident thoroughly to determine the full nature and scope of the access, to ensure our information technology systems are truly secure, and to identify (through a very tedious technical assessment and hand document review process) the exact emails that were actually accessed by the third party. After expert analysis, it was determined that the unauthorized access occurred on July 11, 2018. Because of the way the email account was accessed, a desk copy of certain emails was potentially saved onto the computer of the unauthorized third party – likely unintentionally, but we had to assume that the third party retained a copy of that data. As such, we searched the emails to determine whether sensitive data was located within any of the emails that were potentially saved. Individual emails were then hand reviewed to obtain names and mailing addresses.

After completing this extensive review, on October 26, 2018, we were alerted by the reviewers’ final mailing list that the mailbox included patient names and other information typically found in a medical record. A smaller number of the emails contained Social Security numbers and/or driver’s license numbers.

Fortunately, the unauthorized access did not extend beyond the single email account. We have attempted to notify by letter those for whom we had mailing addresses. GSO has advised affected persons to remain vigilant and monitor account statements and credit reports carefully and to report discrepancies to law enforcement. Fraud alerts and security freezes also can be activated to help protect individuals.

GSO has set up a toll free hotline to address any questions or concerns. If you are concerned your information was included in this incident, please call 888-238-5166, Monday through Friday, from 9 am to 9 pm EST for the next 90 days.

Comment:  Look at the cost of this phishing incident in terms of time and labor to investigate it so that proper notifications could be made.  Over 7,000 patients were notified. So let me ask one question:  why was so much email with PHI  in an employee’s inbox or mailbox? Was all of it needed for work that week? Could it/should it have been moved to other storage?

We know that despite training, some employees will fall prey to phishing attacks. So why aren’t you limiting how much data can be held in email accounts?

Category: Health DataPhishingU.S.

Post navigation

← Two Iranian Men Indicted for Deploying Ransomware to Extort Hospitals, Municipalities, and Public Institutions, Causing Over $30 Million in Losses
ElasticSearch server exposed the personal data of over 57 million US citizens →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.